

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Animation SY (BSC [animation]) , Bachelor of Science in Animation (BSc animation) .
251. |
The procedure to add bits to the last block is termed as |
A. | decryption |
B. | hashing |
C. | tuning |
D. | padding |
Answer» D. padding |
252. |
Cryptanalysis is used |
A. | to find some insecurity in a cryptographic scheme |
B. | to increase the speed |
C. | to encrypt the data |
D. | to make new ciphers |
Answer» A. to find some insecurity in a cryptographic scheme |
253. |
Conventional cryptography is also known as or symmetric-key encryption. |
A. | secret-key |
B. | public key |
C. | protected key |
D. | primary key |
Answer» A. secret-key |
254. |
is the art & science of cracking the cipher-text without knowing the key. |
A. | cracking |
B. | cryptanalysis |
C. | cryptography |
D. | crypto-hacking |
Answer» B. cryptanalysis |
255. |
In cryptography, what is cipher? |
A. | algorithm for performing encryption and decryption |
B. | encrypted message |
C. | both algorithm for performing encryption and decryption and encrypted message |
D. | decrypted message |
Answer» A. algorithm for performing encryption and decryption |
256. |
In asymmetric key cryptography, the private key is kept by __________ |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | all the connected devices to the network |
Answer» B. receiver |
257. |
In cryptography, the order of the letters in a message is rearranged by __________ |
A. | transpositional ciphers |
B. | substitution ciphers |
C. | both transpositional ciphers and substitution ciphers |
D. | quadratic ciphers |
Answer» A. transpositional ciphers |
258. |
Cryptanalysis is used __________ |
A. | to find some insecurity in a cryptographic scheme |
B. | to increase the speed |
C. | to encrypt the data |
D. | to make new ciphers |
Answer» A. to find some insecurity in a cryptographic scheme |
259. |
Which one of the following is a cryptographic protocol used to secure HTTP connection? |
A. | stream control transmission protocol (sctp) |
B. | transport layer security (tls) |
C. | explicit congestion notification (ecn) |
D. | resource reservation protocol |
Answer» B. transport layer security (tls) |
260. |
Voice privacy in GSM cellular telephone protocol is provided by _______ |
A. | a5/2 cipher |
B. | b5/4 cipher |
C. | b5/6 cipher |
D. | b5/8 cipher |
Answer» A. a5/2 cipher |
261. |
ElGamal encryption system is __________ |
A. | symmetric key encryption algorithm |
B. | asymmetric key encryption algorithm |
C. | not an encryption algorithm |
D. | block cipher method |
Answer» B. asymmetric key encryption algorithm |
262. |
Cryptographic hash function takes an arbitrary block of data and returns _________ |
A. | fixed size bit string |
B. | variable size bit string |
C. | both fixed size bit string and variable size bit string |
D. | variable sized byte string |
Answer» A. fixed size bit string |
263. |
In the above figure from left to right, the correct order of the shaded levels are |
A. | network level, application level, transport level |
B. | application level, network level, transport level |
C. | transport level, application level, network level |
D. | network level, transport level, application level |
Answer» D. network level, transport level, application level |
264. |
In the above figure, which of the above shaded block is transparent to end users and applications? |
A. | ip/ipsec |
B. | ssl |
C. | kerberos |
D. | s/mime |
Answer» A. ip/ipsec |
265. |
In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack. |
A. | true |
B. | false |
Answer» B. false |
266. |
Which one of the following is not a higher –layer SSL protocol? |
A. | alert protocol |
B. | handshake protocol |
C. | alarm protocol |
D. | change cipher spec protocol |
Answer» C. alarm protocol |
267. |
In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes. |
A. | 216 |
B. | 232 |
C. | 214 |
D. | 212 |
Answer» C. 214 |
268. |
The full form of SSL is |
A. | serial session layer |
B. | secure socket layer |
C. | session secure layer |
D. | series socket layer |
Answer» B. secure socket layer |
269. |
Which protocol is used to convey SSL related alerts to the peer entity? |
A. | alert protocol |
B. | handshake protocol |
C. | upper-layer protocol |
D. | change cipher spec protocol |
Answer» A. alert protocol |
270. |
Which protocol consists of only 1 bit? |
A. | alert protocol |
B. | handshake protocol |
C. | upper-layer protocol |
D. | change cipher spec protocol |
Answer» D. change cipher spec protocol |
271. |
Which protocol is used for the purpose of copying the pending state into the current state? |
A. | alert protocol |
B. | handshake protocol |
C. | upper-layer protocol |
D. | change cipher spec protocol |
Answer» D. change cipher spec protocol |
272. |
In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively. |
A. | select, alarm |
B. | alert, alarm |
C. | warning, alarm |
D. | warning, fatal |
Answer» D. warning, fatal |
273. |
Pretty good privacy (PGP) security system uses |
A. | public key cryptosystem |
B. | private key cryptosystem |
C. | public & private key cryptosystem |
D. | none of the mentioned |
Answer» C. public & private key cryptosystem |
274. |
Data compression includes |
A. | removal of redundant character |
B. | uniform distribution of characters |
C. | removal of redundant character & uniform distribution of characters |
D. | none of the mentioned |
Answer» C. removal of redundant character & uniform distribution of characters |
275. |
PGP offers _____ block ciphers for message encryption. |
A. | triple-des |
B. | cast |
C. | idea |
D. | all of the mentioned |
Answer» D. all of the mentioned |
276. |
Which of the following is not a secured mail transferring methodology? |
A. | pop3 |
B. | ssmtp |
C. | mail using pgp |
D. | s/mime |
Answer» A. pop3 |
277. |
__________ is used for encrypting data at network level. |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» A. ipsec |
278. |
S/MIME is abbreviated as __________________ |
A. | secure/multimedia internet mailing extensions |
B. | secure/multipurpose internet mailing extensions |
C. | secure/multimedia internet mail extensions |
D. | secure/multipurpose internet mail extensions |
Answer» D. secure/multipurpose internet mail extensions |
279. |
PGP encrypts data by using a block cipher called ______ |
A. | international data encryption algorithm |
B. | private data encryption algorithm |
C. | internet data encryption algorithm |
D. | local data encryption algorithm |
Answer» A. international data encryption algorithm |
280. |
When were VPNs introduced into the commercial world? |
A. | early 80’s |
B. | late 80’s |
C. | early 90’s |
D. | late 90’s |
Answer» D. late 90’s |
281. |
What protocol is NOT used in the operation of a VPN? |
A. | pptp |
B. | ipsec |
C. | ymum |
D. | l2tp |
Answer» C. ymum |
282. |
Which of the following statements is NOT true concerning VPNs? |
A. | financially rewarding compared to leased lines |
B. | allows remote workers to access corporate data |
C. | allows lan-to-lan connectivity over public networks |
D. | is the backbone of the internet |
Answer» D. is the backbone of the internet |
283. |
Traffic in a VPN is NOT ____________ |
A. | invisible from public networks |
B. | logically separated from other traffic |
C. | accessible from unauthorized public networks |
D. | restricted to a single protocol in ipsec |
Answer» C. accessible from unauthorized public networks |
284. |
Which layer 3 protocols can be transmitted over an L2TP VPN? |
A. | only ip |
B. | only ipx |
C. | only icmp |
D. | ip and ipx |
Answer» D. ip and ipx |
285. |
ESP (Encapsulating Security Protocol) is defined in which of the following standards? |
A. | ipsec |
B. | pptp |
C. | ppp |
D. | l2tp |
Answer» A. ipsec |
286. |
L2F was developed by which company? |
A. | microsoft |
B. | cisco |
C. | blizzard entertainment |
D. | ietf |
Answer» B. cisco |
287. |
Which layer of the OSI reference model does PPTP work at? |
A. | layer 1 |
B. | layer 2 |
C. | layer 3 |
D. | layer 4 |
Answer» B. layer 2 |
288. |
Which layer of the OSI reference model does IPsec work at? |
A. | layer 1 |
B. | layer 2 |
C. | layer 3 |
D. | layer 4 |
Answer» C. layer 3 |
289. |
Firewalls can be of _______ kinds. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 |
290. |
_________________ is the kind of firewall is connected between the device and the network connecting to internet. |
A. | hardware firewall |
B. | software firewall |
C. | stateful inspection firewall |
D. | microsoft firewall |
Answer» A. hardware firewall |
291. |
_________ is software that is installed using an internet connection or they come by-default with operating systems. |
A. | hardware firewall |
B. | software firewall |
C. | stateful inspection firewall |
D. | microsoft firewall |
Answer» B. software firewall |
292. |
Which of the following is not a software firewall? |
A. | windows firewall |
B. | outpost firewall pro |
C. | endian firewall |
D. | linksys firewall |
Answer» D. linksys firewall |
293. |
Firewall examines each ____________ that are entering or leaving the internal network. |
A. | emails users |
B. | updates |
C. | connections |
D. | data packets |
Answer» D. data packets |
294. |
A firewall protects which of the following attacks? |
A. | phishing |
B. | dumpster diving |
C. | denial of service (dos) |
D. | shoulder surfing |
Answer» C. denial of service (dos) |
295. |
There are ______ types of firewall. |
A. | 5 |
B. | 4 |
C. | 3 |
D. | 2 |
Answer» B. 4 |
296. |
Packet filtering firewalls are deployed on ________ |
A. | routers |
B. | switches |
C. | hubs |
D. | repeaters |
Answer» A. routers |
297. |
In the ______________ layer of OSI model, packet filtering firewalls are implemented. |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | network layer |
Answer» D. network layer |
298. |
The __________ defines the packet filtering firewall rules. |
A. | access control list |
B. | protocols |
C. | policies |
D. | ports |
Answer» A. access control list |
299. |
ACL stands for _____________ |
A. | access condition list |
B. | anti-control list |
C. | access control logs |
D. | access control list |
Answer» D. access control list |
300. |
When a packet does not fulfil the ACL criteria, the packet is _________ |
A. | resend |
B. | dropped |
C. | destroyed |
D. | acknowledged as received |
Answer» B. dropped |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.