McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) .
1. |
Message ________ means privacy that the sender and reciever expect privacy. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | Authorization |
Answer» A. confidentiality |
2. |
Message_____ means that the data must arrive at the reciever exactly as sent |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | Authorization |
Answer» B. integrity |
3. |
Message _______ means that the receiver is ensured that the message message is coming from the indended sender not an imposter. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | Authorization |
Answer» C. authentication |
4. |
__________means that a sender must not be able to deny sending a message that he sent. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Nonrepudiation |
Answer» D. Nonrepudiation |
5. |
A(n) can be used to preserve the integrity of a document or a message. |
A. | message digest |
B. | message summary |
C. | encrypted message |
D. | ENCRYPTION |
Answer» A. message digest |
6. |
A(n) function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | integrity |
Answer» C. hash |
7. |
A hash function must meet criteria. |
A. | two |
B. | three |
C. | four |
D. | ten |
Answer» B. three |
8. |
Password-based authentication can be divided into two broad categories: and _____ |
A. | fixed; variable |
B. | time-stamped; fixed |
C. | fixed; one-time |
D. | none of the above |
Answer» C. fixed; one-time |
9. |
_ creates a secret key only between a member and the center. |
A. | CA |
B. | KDC |
C. | KDD |
D. | CD |
Answer» B. KDC |
10. |
The secret key between members needs to be created as a ________ key when two members contact KDC. |
A. | public |
B. | session |
C. | complimentary |
D. | private |
Answer» B. session |
11. |
is a popular session key creator protocol that requires an authentica |
A. | KDC |
B. | Kerberos |
C. | CA ion server and a ticket-granting server. |
D. | CD |
Answer» A. KDC |
12. |
A(n) is a hierarchical system that answers queries about key certification. |
A. | KDC |
B. | PKI |
C. | CA |
D. | CD |
Answer» C. CA |
13. |
Firewalls are to protect against |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Unauthorized Attacks |
Answer» D. Unauthorized Attacks |
14. |
The ________criterion ensures that we cannot find two messages that hash to the same digest |
A. | one-wayness |
B. | weak-collision-resistance |
C. | strong-collision-resistance |
D. | Keyless |
Answer» B. weak-collision-resistance |
15. |
_______________________ is a term used in cryptography that refers to a message before encryption or after decryption. |
A. | Cipher text |
B. | Plain text |
C. | Plain script |
D. | Original text |
Answer» B. Plain text |
16. |
The ________ is encrypted text |
A. | cipher text |
B. | cipher scricpt |
C. | secret text |
D. | secret script |
Answer» C. secret text |
17. |
_______________________ ensures that information are in a format that is true and correct to its original purposes. |
A. | Availability |
B. | Confidentiality |
C. | Cryptography |
D. | Integrity |
Answer» A. Availability |
18. |
_____________________ ensures that information and resources are available to those who need them. |
A. | Availability |
B. | Confidentiality |
C. | Cryptography |
D. | Integrity |
Answer» D. Integrity |
19. |
_______________________ is the process of identifying an individual, usually based on a username and password. |
A. | Authentication |
B. | Authorization |
C. | integrity |
D. | crytography |
Answer» A. Authentication |
20. |
___________________ is the process of giving individuals access to system objects based on their identity. |
A. | Authentication |
B. | Authorization |
C. | key |
D. | Confidentiality |
Answer» B. Authorization |
21. |
In symmetric-key cryptography, the key locks and unlocks the box is |
A. | Same |
B. | shared |
C. | private |
D. | Public |
Answer» A. Same |
22. |
The ciphers of today are called round ciphers because they involve |
A. | Single Round |
B. | Double Rounds |
C. | Multiple Round |
D. | Round about |
Answer» C. Multiple Round |
23. |
Symmetric-key cryptography started thousands of years ago when people needed to exchange |
A. | Files |
B. | Packets |
C. | Secrets |
D. | Tr |
Answer» A. Files |
24. |
The Advanced Encryption Standard (AES) was designed |
A. | National Institute of Standards and Technology |
B. | IBM |
C. | HP |
D. | Intel |
Answer» A. National Institute of Standards and Technology |
25. |
The Mobile Application Protocol (MAP) typically runs on top of which protocol ? |
A. | SNMP (Simple Network Management Protocol) |
B. | SMTP (Simple Mail Transfer Protocol) |
C. | SS7 (Signalling System 7) |
D. | HTTP (Hyper Text Tr |
Answer» C. SS7 (Signalling System 7) |
26. |
If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment. |
A. | First |
B. | Middle |
C. | Last |
D. | Four |
Answer» A. First |
27. |
The design issue of Datalink Layer in OSI Reference Model is |
A. | Framing |
B. | Representation of bits |
C. | Synchronization of bits |
D. | Connection control |
Answer» A. Framing |
28. |
Data Encryption Techniques are particularly used for _______. |
A. | protecting data in Data Communication System |
B. | reduce Storage Space Requirement |
C. | enhances Data Integrity |
D. | decreases Data Integrity |
Answer» A. protecting data in Data Communication System |
29. |
An example of a layer that is absent in broadcast networks is: |
A. | Physical layer |
B. | Presentation layer |
C. | Network layer Application layer |
D. | none |
Answer» C. Network layer Application layer |
30. |
Encryption and Decryption is the responsibility of ___ Layer. |
A. | Physical |
B. | Network |
C. | Application |
D. | Datalink |
Answer» C. Application |
31. |
The VLF and LF bauds use propagation for communication |
A. | Ground |
B. | Sky |
C. | Line of sight |
D. | Space |
Answer» A. Ground |
32. |
The start and stop bits are used in serial communication for |
A. | error detection |
B. | error correction |
C. | Synchronization |
D. | slowing down the communication |
Answer» C. Synchronization |
33. |
___________ is a type of transmission impairment in which the Signal looses strength due to The resistance of the transmission medium. |
A. | Attenuation |
B. | Distortion |
C. | Noise |
D. | Decible |
Answer» A. Attenuation |
34. |
________________ is a bit-oriented protocol for communication over point-to-point and multi-point links . |
A. | Stop-and-wait |
B. | HDLC |
C. | Sliding window |
D. | Go-back-N |
Answer» A. Stop-and-wait |
35. |
In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text. |
A. | polyalphabetic |
B. | mono alphabetic |
C. | Transpositional |
D. | multialphabetic |
Answer» B. mono alphabetic |
36. |
Which of the following is not associated with the session layer ? |
A. | Dialog control |
B. | Token management |
C. | Semantics of the information transmitted |
D. | Synchronization |
Answer» C. Semantics of the information transmitted |
37. |
What is the size of the 'total length' field in IPv4 datagram ? |
A. | 4 bits |
B. | 8 bits |
C. | 16 bits |
D. | 32 bits |
Answer» C. 16 bits |
38. |
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called : |
A. | Strobing |
B. | Amplification |
C. | Conditioning |
D. | Quantization |
Answer» D. Quantization |
39. |
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender. |
A. | Broadcasting |
B. | Unicasting |
C. | Packet switching |
D. | Circuit switching |
Answer» D. Circuit switching |
40. |
Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? |
A. | FIN |
B. | RST |
C. | SYN |
D. | PSH |
Answer» A. FIN |
41. |
Which are the two modes of IP security? |
A. | Transport and certificate |
B. | Transport and tunnel |
C. | Certificate and tunnel |
D. | Preshared and tr |
Answer» A. Transport and certificate |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.