McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Animation SY (BSC [animation]) , Bachelor of Science in Animation (BSc animation) .
201. |
For RSA to work, the value of P must be less than the value of |
A. | p |
B. | q |
C. | n |
D. | r |
Answer» C. n |
202. |
In RSA, Ф(n) = _______ in terms of p and q. |
A. | (p)/(q) |
B. | (p)(q) |
C. | (p-1)(q-1) |
D. | (p+1)(q+1) |
Answer» C. (p-1)(q-1) |
203. |
In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n). |
A. | true |
B. | false |
Answer» B. false |
204. |
RSA is also a stream cipher like Merkel-Hellman. |
A. | true |
B. | false |
Answer» A. true |
205. |
USENET falls under which category of public key sharing? |
A. | public announcement |
B. | publicly available directory |
C. | public key authority |
D. | public key certificate |
Answer» A. public announcement |
206. |
PGP makes use of which cryptographic algorithm? |
A. | rsa |
B. | aes |
C. | des |
D. | robin |
Answer» A. rsa |
207. |
Public key cryptography also called as________ |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | both a and b |
D. | none of the above |
Answer» A. asymmetric key cryptography |
208. |
ECC stands for |
A. | elliptic curve cryptography |
B. | elliptic cryptography curve |
C. | error correcting code |
D. | none of the above |
Answer» A. elliptic curve cryptography |
209. |
Diffie-Hellman algorithm is widely known as_________ |
A. | key exchange algorithm |
B. | key agreement algorithm |
C. | only a |
D. | both a and b |
Answer» D. both a and b |
210. |
Hash function is used for________ |
A. | message authentication |
B. | digital signature |
C. | both a and b |
D. | only a |
Answer» C. both a and b |
211. |
RSA algorithm is best example of_______ |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | elliptic curve cryptography |
D. | all of the above |
Answer» A. asymmetric key cryptography |
212. |
In tunnel mode, IPSec protects the ______ |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» A. entire ip packet |
213. |
HTTPS is abbreviated as _________ |
A. | hypertexts transfer protocol secured |
B. | secured hyper text transfer protocol |
C. | hyperlinked text transfer protocol secured |
D. | hyper text transfer protocol secure |
Answer» D. hyper text transfer protocol secure |
214. |
An attempt to make a computer resource unavailable to its intended users is called ______ |
A. | denial-of-service attack |
B. | virus attack |
C. | worms attack |
D. | botnet process |
Answer» A. denial-of-service attack |
215. |
SSL primarily focuses on _______ |
A. | integrity and authenticity |
B. | integrity and non-repudiation |
C. | authenticity and privacy |
D. | confidentiality and integrity |
Answer» A. integrity and authenticity |
216. |
Pretty good privacy (PGP) is used in ______ |
A. | browser security |
B. | email security |
C. | wifi security |
D. | ftp security |
Answer» B. email security |
217. |
__________ is used for encrypting data at network level |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» A. ipsec |
218. |
WPA2 is used for security in _______ |
A. | ethernet |
B. | wi-fi |
C. | bluetooth |
D. | |
Answer» B. wi-fi |
219. |
Which of the following is not a strong security protocol |
A. | ssl |
B. | httpl |
C. | smtp |
D. | sftp |
Answer» C. smtp |
220. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection. |
A. | true |
B. | false |
Answer» A. true |
221. |
IPSec operates in..... different modes |
A. | 3 |
B. | 2 |
C. | 4 |
D. | 5 |
Answer» B. 2 |
222. |
length of the IPv4 address is .... |
A. | 32 bits |
B. | 64 bits |
C. | 16 bits |
D. | 128 bit |
Answer» A. 32 bits |
223. |
Internet Key Exchange has .... phases and modes of operations |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 5 |
Answer» C. 2 |
224. |
PGP is abbreviated as |
A. | pretty good privacy |
B. | pretty good policy |
C. | policy good privacy |
D. | pretty good protection |
Answer» A. pretty good privacy |
225. |
SET stands for |
A. | set electronic transaction |
B. | secure electronic transaction |
C. | simple electronic transaction |
D. | none of the above |
Answer» B. secure electronic transaction |
226. |
Transport layer Protocol consists of ... main components |
A. | 2 |
B. | 1 |
C. | 3 |
D. | 4 |
Answer» A. 2 |
227. |
length of the IPv6 acddress is .... |
A. | 32 bits |
B. | 64 bits |
C. | 16 bits |
D. | 128 bit |
Answer» D. 128 bit |
228. |
IPSec provides ....protocols for network layer |
A. | 7 |
B. | 3 |
C. | 1 |
D. | 4 |
Answer» A. 7 |
229. |
length of the IPv6 header is.... |
A. | 64 bits |
B. | 16 bits |
C. | 32 bits |
D. | 8 bits |
Answer» C. 32 bits |
230. |
CIA triad is also known as |
A. | nic (non-repudiation, integrity, confidentiality) |
B. | aic (availability, integrity, confidentiality) |
C. | ain (availability, integrity, non-repudiation) |
D. | aic (authenticity, integrity, confidentiality) |
Answer» B. aic (availability, integrity, confidentiality) |
231. |
of information means, only authorised users are capable of accessing the information. |
A. | confidentiality |
B. | integrity |
C. | non-repudiation |
D. | availability |
Answer» A. confidentiality |
232. |
means the protection of data from modification by unknown users. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | non-repudiation |
Answer» B. integrity |
233. |
When you use the word it means you are protecting your data from getting disclosed. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | availability |
Answer» A. confidentiality |
234. |
When integrity is lacking in a security system, occurs. |
A. | database hacking |
B. | data deletion |
C. | data tampering |
D. | data leakage |
Answer» C. data tampering |
235. |
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? |
A. | they help understanding hacking better |
B. | they are key elements to a security breach |
C. | they help understands security and its components better |
D. | they help to understand the cyber-crime better |
Answer» C. they help understands security and its components better |
236. |
This helps in identifying the origin of information and authentic user. This referred to here as |
A. | confidentiality |
B. | integrity |
C. | authenticity |
D. | availability |
Answer» C. authenticity |
237. |
Data is used to ensure confidentiality. |
A. | encryption |
B. | locking |
C. | deleting |
D. | backup |
Answer» A. encryption |
238. |
Data integrity gets compromised when and are taken control off. |
A. | access control, file deletion |
B. | network, file permission |
C. | access control, file permission |
D. | network, system |
Answer» C. access control, file permission |
239. |
is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction. |
A. | network security |
B. | database security |
C. | information security |
D. | physical security |
Answer» C. information security |
240. |
From the options below, which of them is not a threat to information security? |
A. | disaster |
B. | eavesdropping |
C. | information leakage |
D. | unchanged default password |
Answer» D. unchanged default password |
241. |
Compromising confidential information comes under |
A. | bug |
B. | threat |
C. | vulnerability |
D. | attack |
Answer» B. threat |
242. |
The full form of OSI is OSI model is |
A. | open systems interconnection |
B. | open software interconnection |
C. | open systems internet |
D. | open software internet |
Answer» A. open systems interconnection |
243. |
In layer, vulnerabilities are directly associated with physical access to networks and hardware. |
A. | physical |
B. | data-link |
C. | network |
D. | application |
Answer» A. physical |
244. |
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as: |
A. | release of message content-passive attack |
B. | traffic analysis -passive attacks |
C. | release of message content- active attacks |
D. | traffic analysis -active attacks |
Answer» A. release of message content-passive attack |
245. |
If communication between 2 people is overheard by a third person without extraction of any data, it is called as: |
A. | release of message content-passive attack |
B. | traffic analysis -passive attacks |
C. | release of message content- active attacks |
D. | traffic analysis -active attacks |
Answer» D. traffic analysis -active attacks |
246. |
The information that gets transformed in encryption is |
A. | plain text |
B. | parallel text |
C. | encrypted text |
D. | decrypted text |
Answer» A. plain text |
247. |
A unique piece of information that is used in encryption. |
A. | cipher |
B. | plain text |
C. | key |
D. | cipher |
Answer» C. key |
248. |
Study of creating a d using encryption and decryption techniques. |
A. | cipher |
B. | cryptography |
C. | encryption |
D. | decryption |
Answer» B. cryptography |
249. |
An attack in which the user receives unwanted amount of e- mails. |
A. | smurfing |
B. | denial of service |
C. | e-mail bombing |
D. | ping storm |
Answer» C. e-mail bombing |
250. |
In same keys are implemented for encrypting as well as decrypting the information. |
A. | symmetric key encryption |
B. | asymmetric key encryption |
C. | asymmetric key decryption |
D. | hash-based key encryption |
Answer» A. symmetric key encryption |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.