McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Animation SY (BSC [animation]) , Bachelor of Science in Animation (BSc animation) .
151. |
In tunnel mode, IPSec protects the ______ |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» A. entire ip packet |
152. |
Pretty good privacy (PGP) is used in ______ |
A. | browser security |
B. | email security |
C. | ftp security |
D. | wifi security |
Answer» B. email security |
153. |
PGP encrypts data by using a block cipher called ______ |
A. | international data encryption algorithm |
B. | private data encryption algorithm |
C. | internet data encryption algorithm |
D. | local data encryption algorithm |
Answer» A. international data encryption algorithm |
154. |
IKE creates SAs for _____. |
A. | ssl |
B. | pgp |
C. | ipsec |
D. | vp |
Answer» C. ipsec |
155. |
SSL provides _________. |
A. | message integrity |
B. | confidentiality |
C. | compression |
D. | all of the above |
Answer» D. all of the above |
156. |
IKE uses _______ |
A. | oakley |
B. | skeme |
C. | isakmp |
D. | all of the above |
Answer» D. all of the above |
157. |
In ______, there is a single path from the fully trusted authority to any certificate. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» A. x509 |
158. |
_______ uses the idea of certificate trust levels. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» B. pgp |
159. |
________ provides privacy, integrity, and authentication in e-mail. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» C. pgp |
160. |
In _____, there can be multiple paths from fully or partially trusted authorities. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» B. pgp |
161. |
______ provides authentication at the IP level. |
A. | ah |
B. | esp |
C. | pgp |
D. | ssl |
Answer» A. ah |
162. |
In _______, the cryptographic algorithms and secrets are sent with the message. |
A. | ipsec |
B. | ssl |
C. | tls |
D. | pgp |
Answer» D. pgp |
163. |
______ was invented by Phil Zimmerman. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» C. pgp |
164. |
ISAKMP stands for ______ |
A. | internet system association and key management packet |
B. | internet security association and key management protocol |
C. | interchange system and key modeling protocol |
D. | internet security association and key modeling protocol |
Answer» B. internet security association and key management protocol |
165. |
PGP makes use of which cryptographic algorithm? |
A. | des |
B. | aes |
C. | rsa |
D. | rabin |
Answer» C. rsa |
166. |
What is the key size allowed in PGP? |
A. | 1024-1056 |
B. | 1024-4056 |
C. | 1024-4096 |
D. | 1024-2048 |
Answer» C. 1024-4096 |
167. |
In SSL, what is used for authenticating a message? |
A. | mac (message access code) |
B. | mac (message authentication code) |
C. | mac (machine authentication code) |
D. | mac (machine access code) |
Answer» B. mac (message authentication code) |
168. |
S/MIME is abbreviated as __________________ |
A. | secure/multimedia internet mailing extensions |
B. | secure/multipurpose internet mailing extensions |
C. | secure/multimedia internet mail extensions |
D. | secure/multipurpose internet mail extensions |
Answer» D. secure/multipurpose internet mail extensions |
169. |
Security Measures Needed to protect ________ during their transmission |
A. | file |
B. | data |
C. | packet |
D. | all of above |
Answer» B. data |
170. |
__________ means knowledge obtained from investigation, study , intelligence new ,facts . |
A. | security |
B. | data |
C. | information |
D. | none of these |
Answer» C. information |
171. |
Prevention of the unauthorised used of Resources refers too? |
A. | data integrity |
B. | data confidentiality |
C. | acess control |
D. | none of these |
Answer» C. acess control |
172. |
Protection against Denial by one of these parties in a communication refers to? |
A. | non-repudiation |
B. | data integrity |
C. | authentication |
D. | none of these |
Answer» A. non-repudiation |
173. |
Which One of them is Passive attack? |
A. | denial of service |
B. | modify message in transit |
C. | replay previous message |
D. | obtain message contain |
Answer» D. obtain message contain |
174. |
What is lying of IP address called as? |
A. | ip spoofing |
B. | ip scamming |
C. | ip lying |
D. | none of theses |
Answer» A. ip spoofing |
175. |
What is full form of DDoS? |
A. | derived denial of service |
B. | distributed denial of service |
C. | denial of service |
D. | none of these |
Answer» B. distributed denial of service |
176. |
A hacker guessing suggested password to a program is call as? |
A. | password guessing |
B. | dictionary attack |
C. | default password attack |
D. | none of these |
Answer» C. default password attack |
177. |
Symmetric key encryption is also called as? |
A. | public key encryption |
B. | private key encryption |
C. | both of these |
D. | none of these |
Answer» B. private key encryption |
178. |
Conversion of Cypher text to plain text? |
A. | encryption |
B. | decryption |
C. | simple text |
D. | none of these |
Answer» B. decryption |
179. |
__is used to create the organisation's overall security program. |
A. | program policy |
B. | purpose |
C. | security |
D. | none of these |
Answer» A. program policy |
180. |
An act of protecting information from unauthorised disclouser to an entity.- |
A. | intergrity |
B. | avability |
C. | confidentiality |
D. | none of these |
Answer» C. confidentiality |
181. |
A way to ensure that the entity is indeed what it claims to be.- |
A. | authentication |
B. | accountability |
C. | identification |
D. | security |
Answer» A. authentication |
182. |
The__model is 7 layer architecture where each layer is having some specific functionality to perform. |
A. | tcp |
B. | osi |
C. | ois |
D. | none of these |
Answer» B. osi |
183. |
The full form of OSI is OSI model__. |
A. | open systems interconnection |
B. | open software interconnection |
C. | open connection |
D. | open system internet |
Answer» A. open systems interconnection |
184. |
The technique in which when one character is replaced by another Character is called as? |
A. | transposition |
B. | substitution |
C. | combinational |
D. | none of these |
Answer» B. substitution |
185. |
Conversion of plain text into Cipher text is called as________. |
A. | encryption |
B. | decryption |
C. | hidden text |
D. | none of above |
Answer» A. encryption |
186. |
In Symmetric schemes requires both parties to share how many secret key? |
A. | one |
B. | two |
C. | three |
D. | four |
Answer» A. one |
187. |
Blum Blum Shub Generator is based on which Algorithm? |
A. | private key |
B. | public key |
C. | both a & b |
D. | none of these |
Answer» B. public key |
188. |
In DES step both LPT and RPT undergoes in how much key Rounds? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» B. 16 |
189. |
What is the 4th step in DES Algorithm? |
A. | key transformation |
B. | s-box substitution |
C. | p-box permutation |
D. | expansion permutation |
Answer» C. p-box permutation |
190. |
In AES in which Round Subkeys are Generated from Original key for each round? |
A. | key expansion |
B. | initial round |
C. | finale round |
D. | none of these |
Answer» A. key expansion |
191. |
AES stands for? |
A. | authorized encryption standard |
B. | advance encryption standard |
C. | advance encryption strategy |
D. | none of these |
Answer» B. advance encryption standard |
192. |
Which of them is type of Cipher? |
A. | stream cipher |
B. | block cipher |
C. | both of them |
D. | none of these |
Answer» C. both of them |
193. |
The message which is not understandable is called as? |
A. | cipher text |
B. | plain text |
C. | hidden text |
D. | both a & c |
Answer» A. cipher text |
194. |
The__is a polygraphic substitution cipher based on linear algebra. |
A. | hill cipher |
B. | playfair cipher |
C. | affine cipher |
D. | none of these |
Answer» A. hill cipher |
195. |
__is the practice of concealing a message within another message,image or file. |
A. | steganography |
B. | cryptography |
C. | cipher |
D. | receiver |
Answer» A. steganography |
196. |
In asymmetric key cryptography, the private key is kept by __________ |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | none of these |
Answer» B. receiver |
197. |
In cryptography the original message before being transform is called |
A. | simple text |
B. | plain text |
C. | empty text |
D. | filled text |
Answer» B. plain text |
198. |
An asymmetric-key (or public-key) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» A. 1 key |
199. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
A. | short |
B. | flat |
C. | long |
D. | thin |
Answer» C. long |
200. |
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to |
A. | other |
B. | data |
C. | keys |
D. | each other |
Answer» D. each other |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.