

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Animation SY (BSC [animation]) , Bachelor of Science in Animation (BSc animation) .
351. |
Diffie-Hellman algorithm is widely known as |
A. | key exchange algorithm |
B. | key agreement algorithm |
C. | only a |
D. | both a and b |
Answer» D. both a and b |
352. |
Hash function is used for |
A. | message authentication |
B. | digital signature |
C. | both a and b |
D. | only a |
Answer» C. both a and b |
353. |
RSA algorithm is best example of |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | elliptic curve cryptography |
D. | all of the above |
Answer» A. asymmetric key cryptography |
354. |
IPSec is designed to provide security at the |
A. | transport layer |
B. | network layer |
C. | application layer |
D. | session layer |
Answer» B. network layer |
355. |
In tunnel mode, IPSec protects the |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» A. entire ip packet |
356. |
HTTPS is abbreviated as |
A. | secured hyper hypertexts transfer text transfer protocol secured protocol |
B. | none of the mentioned |
C. | hyperlinked text transfer protocol secured |
D. | hyper text transfer protocol secure |
Answer» D. hyper text transfer protocol secure |
357. |
An attempt to make a computer resource unavailable to its intended users is called |
A. | denial-of-service attack |
B. | virus attack |
C. | worms attack |
D. | botnet process |
Answer» A. denial-of-service attack |
358. |
SSL primarily focuses on Pretty good privacy (PGP) is used in |
A. | integrity and authenticity |
B. | integrity and non- repudiation |
C. | authenticity and privacy |
D. | confidentiality and integrity |
Answer» A. integrity and authenticity |
359. |
is used for encrypting data at network level |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» A. ipsec |
360. |
WPA2 is used for security in |
A. | ethernet |
B. | wi-fi |
C. | bluetooth |
D. | |
Answer» B. wi-fi |
361. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection. |
A. | true |
B. | false |
Answer» A. true |
362. |
SET stands for |
A. | set electronic transaction |
B. | secure electronic transaction |
C. | simple electronic transaction |
D. | none of the above |
Answer» B. secure electronic transaction |
363. |
length of the IPv6 acddress is .... |
A. | 32 bits |
B. | 64 bits |
C. | 16 bits |
D. | 128 bit |
Answer» B. 64 bits |
364. |
SSL provides . |
A. | message integrity |
B. | confidentiality |
C. | compression |
D. | all of the above |
Answer» D. all of the above |
365. |
According to the CIA Triad, which of the below-mentioned element is not considered in the triad? |
A. | confidentiality |
B. | integrity |
C. | authenticity |
D. | availability |
Answer» C. authenticity |
366. |
Which of the following are not security policies? |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» C. availability |
367. |
Examples of User Policies is/are: |
A. | password policies |
B. | internet usage |
C. | system use |
D. | all of the above |
Answer» D. all of the above |
368. |
Policy ensures that the organization is maintaining standards set by specific industry regulation. |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» A. regulatory |
369. |
Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» B. advisory |
370. |
What defines the restrictions on employees such as usage? |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» D. user policies |
371. |
Which of the following attack can actively modify communications or data? |
A. | both active and passive attacks |
B. | neither active and passive attacks |
C. | active attacks |
D. | passive attacks |
Answer» C. active attacks |
372. |
Categories of Security Service |
A. | 1 |
B. | 1 &3 |
C. | 2& 3 |
D. | 1,2,3 |
Answer» D. 1,2,3 |
373. |
Release of Message Content and Traffic analysis are type of : |
A. | both active and passive attacks |
B. | neither active and passive attacks |
C. | active attacks |
D. | passive attacks |
Answer» D. passive attacks |
374. |
means when an attacker pretends to be authentic user |
A. | masquerade |
B. | replay |
C. | modification |
D. | traffic analysis |
Answer» A. masquerade |
375. |
attack is when original data is modified and malicious data is inserted |
A. | masquerade |
B. | replay(rewrite) |
C. | modification |
D. | traffic analysis |
Answer» B. replay(rewrite) |
376. |
When original data is changed to make it non-meaningful by attacker it is known as |
A. | masquerade |
B. | replay |
C. | modification of messages |
D. | traffic analysis |
Answer» C. modification of messages |
377. |
Which is the type of attack when Network is made unavailable for user |
A. | masquerade |
B. | replay |
C. | modification |
D. | denial of service |
Answer» D. denial of service |
378. |
Modification of Data is done in: |
A. | both active and passive attacks |
B. | neither active and passive attacks |
C. | active attacks |
D. | passive attacks |
Answer» A. both active and passive attacks |
379. |
A process of making the encrypted text readable again. |
A. | decryption |
B. | encryption |
C. | network security |
D. | information hiding |
Answer» A. decryption |
380. |
Assurance that authentic user is taking part in communication is: |
A. | authentication |
B. | authorization |
C. | access control |
D. | auditing |
Answer» A. authentication |
381. |
ATM pin while withdrawing money is an example of using: |
A. | authentication |
B. | authorization |
C. | access control |
D. | auditing |
Answer» A. authentication |
382. |
In asymmetric key cryptography, the private key is kept by |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | all the connected devices to the network |
Answer» B. receiver |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.