0% found this document useful (0 votes)
2K views60 pages

Network Security Multiple Choice Questions and Answers With MCQ

The document contains 65 multiple choice questions about network security and related topics like TCP/IP, ports, protocols, cryptography, IP addressing, and internet basics. The questions cover a wide range of topics including TCP/IP layers, protocols like TCP, IP, HTTP, FTP, protocols used for encryption like DES, symmetric and asymmetric ciphers, IP addressing classes, subnet masking, internet service providers, and web technologies like URLs, servers, and browsers.

Uploaded by

vikes singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views60 pages

Network Security Multiple Choice Questions and Answers With MCQ

The document contains 65 multiple choice questions about network security and related topics like TCP/IP, ports, protocols, cryptography, IP addressing, and internet basics. The questions cover a wide range of topics including TCP/IP layers, protocols like TCP, IP, HTTP, FTP, protocols used for encryption like DES, symmetric and asymmetric ciphers, IP addressing classes, subnet masking, internet service providers, and web technologies like URLs, servers, and browsers.

Uploaded by

vikes singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

MCQ's on Network Security

Home  (index.html) Computer Science & Engineering 

You will find the correct answer of all the questions after you will submit the quiz. You will also get a report of your
performance after you will submit the quiz.
Unlimited attempts possible to practice. On each attempts you will get a set of 25 questions.

Enter Your Name

MCQ 1:

TCP/IP is a _____________.

Network Hardware

Network Software

Protocol

None of the above

MCQ 2:

TCP / IP mainly used for _____________.

File transfer
Email

Remote Login System

All of the above

MCQ 3:

NetBIOS is developed by _____________.

Microsoft

IBM

Sun

None of the above

MCQ 4:

Which IEEE standard is developed for CSMA/CD.

IEEE802.1

IEEE802.2

IEEE802.3

IEEE802.4

MCQ 5:

Which is the part of data link layer.

LLC (Logical Link Control)

MAC (Media Access Control) Address

Both A and B

None of the above

MCQ 6:

Which Network Architecture is developed by IBM.

Protocols

Models

Gateways
Ports

MCQ 7:

Which is the lowest layer of TCP/IP Model.

Host to Host layer

Netword Access layer

Internet layer

Application Layer

MCQ 8:

_______________ is an access channel for computers to exchange informations.

Port

Socket

Gateways

Protocol

MCQ 9:

How many ports a computer may have?

256

128

1024

65535

MCQ 10:

Which is the type of port?

Serial

Parallel

AGP

All of the above


MCQ 11:

OSI stands for _____________.

Open system interface

Out system interface

Out system inter connection

Open system inter connection

MCQ 12:

IPX/SPX is used for?

Linux

Unix

Novel Net ware

Windows

MCQ 13:

Parallel port can transfer ______________ bits of data at a time.

16

MCQ 14:

Parallel port cannot connect to _____________.

Printers

Scanners

Telephones

Monitors

MCQ 15:

In computer which range is in registered ports.


0 to 1083

1024 to 49151

49151 to 65535

All of the above

MCQ 16:

USB stands for ?

Universal Serial Bus

Universal Serial Bypass

Universal System Bus

Universal Serial Bypass

MCQ 17:

Which is the fastest port for data transfer?

USB

Serial

Parallel

FireWire

MCQ 18:

What is the port number of http?

23

80

25

21

MCQ 19:

Which is not the part of the UDP diagram?

Source port

Destination port

Checksum

None of the above

MCQ 20:

Which is the type of a socket?

Datagram

Stream

Raw

All of the above

MCQ 21:

In which layer of OSI model IP is available.

layer 1

layer 2

layer 3

layer 4

MCQ 22:

IP is defined in _____________.

RFC 790

RFC 791

RFC 792

RFC 793

MCQ 23:

DES stands for?

Data Encryption Standard

Data Encryption Statistics

Data Encryption System

Data Encryption Sequence


MCQ 24:

Which protocol is used to report error message?

TCP

IP

ICMP

SMTP

MCQ 25:

What is the use of IP source routing?

Mapping the network drive

Troubleshooting

Performance

All of the above

MCQ 26:

Which is the IP source routing method?

SSR

LSR

LLR

Both A and B

MCQ 27:

In a TCP header source and destination header contains _____________.

8 Bits

16 Bits

32 Bits

128 Bits

MCQ 28:

Which statement is incorrect?


TCP enables dataflow for monitoring

It avoid network saturation

TCP makes communication between server and client

In TCP/IP model Internet layer is closed to the user

MCQ 29:

Which is not the application level protocol?

FTP

S/MIME

PGP

HTTP

MCQ 30:

____________ is the science and art of transforming messages to meke them secure and immune to attacks.

Cryptoanalysis

Cryptography

Either (a) or (b)

Neither (a) nor (b)

MCQ 31:

The ______________ is the original message before transformation.

cipher text

plain text

secure text

None of the above

MCQ 32:

The ______________ is the message after transformation.

cipher text

plain text

secure text

None of the above

MCQ 33:

Which is the false statement?

Talnet is used for remote login

FTP can transfer files between two hosts

TFTP relay on TCP

SMTP used to send mail message

MCQ 34:

What is the full form of SMTP?

Simple mail transfer protocol

MCQ 35:

Full form of POP is _____________.

post office protocol

MCQ 36:

The port number of SMTP (Simple mail transfer protocol) is.

21

23

25

80
MCQ 37:

An ____________ algorithm transforms plain text to cipher text

description

encryption

Both A and B

None of the above

MCQ 38:

An ____________ algorithm transforms cipher text to plain text

description

encryption

Both A and B

None of the above

MCQ 39:

A combination of an encryption and descryption algorithm is called a _____________.

key

plain text

cipher text

raw text

MCQ 40:

In an _____________ cipher, the same key is used by both the sender and the receiver.

Symmetric Key

Asymmetric Key

Neither A nor B

Either A or B

MCQ 41:

Which method replace one character with another character?


Substitution Technique

Transportion technique

Both A and B

Either A or B

MCQ 42:

In an asymmetric key cipher, both the sender uses _____________.

private key

public key

Either A or B

Neither A nor B

MCQ 43:

In an asymmetric key cipher, both the receivers uses _____________.

private key

public key

Either A or B

Neither A nor B

MCQ 44:

Which can be divided into monoalphabetic and polyalphabetic.

Transportion technique

Substitution Technique

Both A and B

Either A or B

MCQ 45:

In an ____________ ciphert text , a pair of keys is used.

Symmetric Key

Asymmetric Key

Neither A nor B

Either A or B

MCQ 46:

The modern cipher is usually a complex ____________ cipher made of a combination of different simple ciphers.

square

secret

round

plain

MCQ 47:

ECB and CBC are ?

Block Cipher

Stream cipher

Both A and B

None of the above

MCQ 48:

How many round keys generated by DES?

16 bit

32 bits

48 bit

64 bit

MCQ 49:

In an ________________ , the key is known as SECRET Key.

Asymmetric Key

Symmetric Key

Secret Key

Either A or B
MCQ 50:

Which agency assigns IP address

IEEE

ANSI

ICANN

BSNL

MCQ 51:

An example of a layer that is absent in broadcast networks is _____________.

Physical layer

Presentation layer

Application layer

Network layer

MCQ 52:

Which IP address is reserved for loop back of localhost.

192.168.0.0

127.0.0.0

127.0.0.1

None of the above

MCQ 53:

Which class for IP is used in smaller organizations.

Class A

Class B

Class C

Class D

MCQ 54:

The size of the IPV4 is _____________.


16 Bits

32 Bits

64 Bits

128 Bits

MCQ 55:

Which is the part of IP_____________.

Netid

Subnetid

Hosted

All of the above

MCQ 56:

The subnet Mask 255.255.0.0 belongs to _____________.

Class A

Class B

Class C

Class D

MCQ 57:

Who provide us internet?

TCP

ISP

FTP

HTTP

MCQ 58:

In which method we can connect to internet protocol.

Dial up

SLIP

PPP

All of the above

MCQ 59:

URL stands for _____________.

Universal Resource Locator

Uniform Resource Locator

Uniform Radio Locator

None of the above

MCQ 60:

Which is not the server side programming language.

JSP

ASP

Javascript

PHP

MCQ 61:

FTP runs on _____________.

Unix

Linus

Windows

All of the above

MCQ 62:

https stands for _____________.

Simpe

Secure

Server

None of the above


MCQ 63:

Which is not the requirement of internet.

Operating System

Web browser

DOS

Modem

MCQ 64:

What is the maximum speed of modem is _____________.

32 kbps

56 kbps

64 kbps

128 kbps

MCQ 65:

Which protocol is used for browsing website _____________.

TCP

HTTP

FTP

TFTP

MCQ 66:

Which is not the browser?

Internet Explorer

Opera

Mozila

Google

MCQ 67:

Which is a search engine?


Google

Bing

Yahoo

All of the above

MCQ 68:

Which is the chatting application?

Yahoo messanger

Google Earth

You Yube Application

None of the above

MCQ 69:

Which service provide 3D view of the earth?

Google Earth

Wikipedia

Skype

None of the above

MCQ 70:

Which is the threads for clients?

Virus

Worms

Trojan Horses

All of the above

MCQ 71:

Which is not the application of internet.

Communication

Banking

Shopping

Sleeping

MCQ 72:

In the SSL Protocol, each upper layer message if fragmented into a maximum of _______________ bytes.

216

232

214

212

MCQ 73:

The full form of SSL is _____________.

Series Socket Layer

Session Secure Layer

Secure Socket Layer

Serial Session Layer

MCQ 74:

After the encryption stage in SSL, the maximum length of each fragment is.

216+2048

216+1028

214+1028

214+2048

MCQ 75:

If the sender and receiver use different keys, the system is referred to as conventional cipher system.

True

False

Cant say

None of the above


MCQ 76:

Caesar Cipher is an example of _____________.

Multi-alphabetic Cipher

Bi-alphabetic Cipher

Poly-alphabetic Cipher

Mono-alphabetic Cipher

MCQ 77:

Which are the most frequently found letters in the English language?

e, a

e, o

e, t

e, i

MCQ 78:

DES (Data Encryption Standard) follows.

Feistel Cipher Structure

Caesars Cipher

Hash Algorithm

SP Networks

MCQ 79:

Which of the following slows the cryptographic algorithm -

1) Increase in Number of rounds

2) Decrease in Block size

3) Decrease in Key Size

4) Increase in Sub key Generation

1 and 3

2 and 3

3 and 4

2 and 4
MCQ 80:

Which protocol is used to convey SSL related alerts to the peer entity?

Alert Protocol

Upper-Layer Protocol

Handshake Protocol

Change Cipher Spec Protocol

MCQ 81:

The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.

12

16

MCQ 82:

SSL provies _______________.

compression

confidentiality

message integrity

All of the above

MCQ 83:

Which one of the following is true for asymmetric-key cryptography?

Both private key and public key are kept by the receiver

Both private key and public key are announced to the public

Private key is kept by the receiver and public key is announced to the public

Public key is kept by the receiver and private key is announced to the public
MCQ 84:

Which of the following is not a secured mail transferring methodology?

FTP

Mail by PGP

POP3

S/MIME

MCQ 85:

One security protocol for the email system is ________________.

IPSec

SSL

PGP

None of the above

MCQ 86:

Which of these is not a proper method of maintaining confidentiality?

Biometric verification

ID and password based verification

switching off the phone

2-factor authentication

MCQ 87:

AES stands for ________________.

Advanced Encryption Security

Advanced Encryption Standard

Advanced Encrypted Standard

Active Encryption Standard

MCQ 88:

________________ provides privacy, integraty, and authentication in email.


IPSec

PGP

SSL

None of the above

MCQ 89:

DES stands for _____________________.

Data Encryption Slots

Data Encryption Solutions

Data Encryption Subscription

Data Encryption Standard

MCQ 90:

In the DES algorithm the round key is ________________ bit and the Round Input is ___________________ bits.

48, 32

64, 32

56, 24

32, 32

MCQ 91:

_________________ is a term used in cryptography that refers to a message before encryption or after decryption.

Original text

Cipher text

Plain script

Plain text

MCQ 92:

A substitution cipher substitutes one symbol with ______________.

Keys

Others

Multi Parties

Single Party

MCQ 93:

An asymmetric-key (or public-key) cipher uses.

1 Key

2 Key

3 Key

4 Key

MCQ 94:

A straight permutation cipher or a straight P-box has the same number of inputs as.

Bits

Cipher text

Outputs

Frames

MCQ 95:

The DES algorithm has a key length of _________________.

16 Bits

64 Bits

128 Bits

32 Bits

MCQ 96:

In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to.

Others

Each other

Keys

Data
MCQ 97:

The cryptography algorithms (ciphers) are divided into __________________.

two groups

four groups

one single group

None of the above

MCQ 98:

The maximum payload of a TCP segment is :

65535

65515

65495

65475

MCQ 99:

The __________________ is encrypted text.

cipher text

cipher scricpt

secret text

secret script

MCQ 100:

An encryption technique with 2 keys is ______________.

Monoalphabetic Cipher

Cryptography

Private key cryptography

Public key cryptography

MCQ 101:

In public key cryptography, a key that decrypts the message.


security key

public key

unique key

private key

MCQ 102:

On which port will the server generally listen to for SMTP?

35

63

25

65

MCQ 103:

________________ provides security at the tansport layer.

SSL

TLS

Either A or B

Both A and B

MCQ 104:

Which of the following is not a strong security protocol?

https

ssl

smtp

sftp

MCQ 105:

The shift cipher is sometimes referred to as the

Cipher text

Cipher

Shift cipher

Caesar cipher

MCQ 106:

_______________ can retrive application data from application layer protocol, but the protocol is normally HTTP.

TLS

SSL

Either A or B

Both A and B

MCQ 107:

Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to

'ensure correct re-composition from end to end of the network?'

Physical

Data-link

Transport

Application

MCQ 108:

It provides one time session keys between two parties or persons joins each other.

Diffie Hellman

RSA (Rivest Shamir Adleman Algorithm)

DES (Data Encryption Standard)

AES (Advanced Encryption Standard)

MCQ 109:

Public key cryptography used in

RSS Algorithm

RAS Algorithm

RSA Algorithm
RAA Algorithm

MCQ 110:

Match the following List 1 and List 2 :

List 1 - A. Application layer , B. Transport layer, C. Network layer, D. Data link layer

List 2 - 1. HDLC, 2. TCP, 3. HTTP, 4. BGP

Application layer ---> HDLC, Transport layer ---> TCP, Network layer ---> BGP, Data link layer ---> HTTP

Application layer ---> HDLC, Transport layer ---> BGP, Network layer ---> TCP, Data link layer ---> HTTP

Application layer ---> HTTP, Transport layer ---> BGP, Network layer ---> HTTP, Data link layer ---> HDLC

Application layer ---> HTTP, Transport layer ---> TCP, Network layer ---> BGP, Data link layer ---> HDLC

MCQ 111:

The substitutional cipers are _____________________.

polyalphabetic

mono alphabetic

Sami alphabetic

Both A and C

MCQ 112:

An HTTP connection uses port ________________ whereas HTTPS uses port ________________ and invokes SSL.

40; 80

60; 620

80; 443

620; 80

MCQ 113:

How many keys does the Triple DES algorithm use?

2 or 3

3 and 4
MCQ 114:

Using RSA algorithm, convert the plain text AAAAAAA into cypher text using the conversion values as p=3, q=11, n=pq, d=7.

BUTAEEZ

ABCDXYZ

SUZANNE

XYZABCD

MCQ 115:

The combination of key exchange, hash, and algorithms defines a ___________ for each SSL section.

list of keys

cipher suite

list of protocols

None of the above

MCQ 116:

An electronic document that establishes your credentials when you are performing transactions.

Digital code

Email

OTP

Digital Certificate

MCQ 117:

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

They help understanding hacking better

They are key elements to a security breach

They help understands security and its components better

They help to understand the cyber-crime better


MCQ 118:

Data which is easily readable & understandable without any special algorithm or method is called _________________.

cipher-text

plain text

raw text

encrypted text

MCQ 119:

Data Encryption Techniques are particularly used for _______________.

protecting data in Data Communication System

reduce Storage Space Requirement

enhances Data Integrity

decreases Data Integrity

MCQ 120:

_______________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another

letter in creating the cipher-text.

Polyalphabetic Cipher

Caesar Cipher

Playfair Cipher

Monoalphabetic Cipher

MCQ 121:

Which 2 protocols are used in the Transport layer of the TCP/IP model?

UDP and HTTP

ICMP and HTTP

HTTP and TCP

TCP and UDP

MCQ 122:

Plain text are also called _____________.

cipher-text

raw text

clear-text

encrypted text

MCQ 123:

_____________ is data interception method used by hackers.

Phishing

DoS

Sniffing

MiTM

MCQ 124:

A __________ is actually at IETF version of ________________.

SSL, TLS

TLS, TTS

SSL, SLT

TLS, SSL

MCQ 125:

Sniffing is also known as ___________________.

network-tapping

wiretapping

net-tapping

wireless-tapping

MCQ 126:

Which of the protocol is not used in the network layer of the TCP/IP model?
ICMP

IP

IGMP

HTTP

MCQ 127:

A message COMPUTERNETWORK encrypted using columnar transposition cipher with a key LAYER. The encrypted

message is

CTTOEWMROPNRUEK

MROUEKCTTPNROEW

OEWPNRCTTUEKMRO

UEKPNRMROOEWCTT

MCQ 128:

TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of

4 layers that work together.

TRUE

FALSE

Cant say

None of the above

MCQ 129:

_____________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the

Internet.

Architectural security

Internet Security

Data mining

Encryption

MCQ 130:

TCP/IP is composed of ________________ number of layers.


2

MCQ 131:

A cryptosystem is also termed as ______________.

secure system

cipher system

cipher-text

secure algorithm

MCQ 132:

An _____________ is a network that allows and authorised access from outside users of the whole world.

extranets

internets

intranets

None of the above

MCQ 133:

An _____________ is a private network that uses the internet model.

internets

extranets

intranets

None of the above

MCQ 134:

A ______________ network is used inside an organisation.

private

public

semi-private

semi-public

MCQ 135:

Which of them is not an objective of sniffing for hackers?

Fetching passwords

Email texts

Types of files transferred

Geographic location of a user

MCQ 136:

________________ ensures the integrity and security of data that are passing over a network.

Antivirus

Network-security protocols

Pentesting Tools

Firewall

MCQ 137:

S/MIME is abbreviated as __________________.

Secure/Multimedia Internet Mailing Extensions

Secure/Multipurpose Internet Mailing Extensions

Secure/Multimedia Internet Mail Extensions

Secure/Multipurpose Internet Mail Extensions

MCQ 138:

There are ______________ types of cryptographic techniques used in general.

5
MCQ 139:

_____________ are programs or devices that capture the vital information from the target network or particular network.

Trappers

Routers

Sniffers

Wireless-crackers

MCQ 140:

When integrity is lacking in a security system, _________ occurs.

Database hacking

Data deletion

Data leakage

Data tampering

MCQ 141:

An ______________________ along with a key is used in the encryption and decryption of data.,

cryptography algorithm

decryption algorithm

encryption algorithm

plain text algorithm

MCQ 142:

A _______________ layer securiy protocol provides end to end security services for applications.

data link

network

transport

None of the above

MCQ 143:

A substitution cipher replaces one symbol with the ________________.


same symbol

another

provide two symbols for each

All of tbe above

MCQ 144:

__________ is used for encrypting data at network level.

S/MIME

smtp

IPSec

https

MCQ 145:

Which of the protocol is not susceptible to sniffing?

http

smtp

pop

tcp

MCQ 146:

There are _______________ types of sniffing.

MCQ 147:

IP address 123.23.156.4 belongs to ____________ format.

A class

B class

C class

D class

MCQ 148:

Is the statement "Active sniffing is difficult to detect." is true or false.

True

False

Can't say

None of the above

MCQ 149:

In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways

to accomplish the attack.

passive

active

network

None of the above

MCQ 150:

The internet aothorities have recrived the address for ________________.

interanets

internets

extranets

None of the above

MCQ 151:

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

Encryption key

Decryption key

Authorised key
Primary key

MCQ 152:

The design issue of Datalink Layer in OSI Reference Model is

Framing

Representation of bits

Synchronization of bits

Connection control

MCQ 153:

______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential

information.

Phishing attack

DoS attack

Website attack

Trappers

MCQ 154:

_______________ provide security at the transport layer.

SSL

TLS

Either A or B

Both A and B

MCQ 155:

_______________________________ ensures that sensitive information are accessed only by an authorized person and

kept away from those not authorized to possess them.

Availability

Confidentiality

Cryptography

Integrity
MCQ 156:

____________ protocol attack is done in the data-link layer.

POP

HTTP

TCP/IP

DNS

MCQ 157:

Algorithm-Based Phishing was developed in the year ______________.

1988

1989

1990

1991

MCQ 158:

Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ &

_____________.

address, name

address, location

network, name

network, location

MCQ 159:
Which of the following is not an example or type of phishing?

Spear phishing

Whaling

Deceptive phishing

Monkey in the Middle


MCQ 160:

Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI
model?

Physical layer

Data-link Layer

Session layer

Presentation layer

MCQ 161:

Users are able to see a pad-lock icon in the address bar of the browser when there is _________________ connection.

HTTP

HTTPS

SMTP

SFTP

MCQ 162:

Which of the following is not an example of presentation layer issues?

Weak or non-existent authentication mechanisms

Unintentional or ill-directed use of superficially supplied input

Cryptographic flaws in the system may get exploited to evade privacy

Poor handling of unexpected input can lead to the execution of arbitrary instructions

MCQ 163:

Using the following values of a character M = 5, p = 3, q = 11 & d = 7, Find the the value of cipher text C by RSA Algorithm.

16

21

26

31
MCQ 164:

Which of the following is not a vulnerability of the application layer?

Application design bugs may bypass security controls

Inadequate security controls force ?all-or-nothing? approach

Inadequate security controls force ?all-or-nothing? approach

Inadequate security controls force ?all-or-nothing? approach

MCQ 165:

Encryption and Decryption is the responsibility of __________________ Layer.

Application

Datalink

Network

Physical

MCQ 166:

Which of the following is an example of application layer vulnerability?

Cryptographic flaws lead to the privacy issue

MAC Address Spoofing

Weak or non-existent authentication

Very complex application security controls

MCQ 167:

Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple

Mail Transfer Protocol (SMTP).

TRUE

FALSE

Cant Say

None of the above


MCQ 168:

Cryptography offers a set of required security services. Which of the following is not among that 4 required security
services?

Encryption

Message Authentication codes

Hash functions

Steganography

MCQ 169:

_______________ is the art & science of cracking the cipher-text without knowing the key.

Cracking

Cryptanalysis

Cryptography

Crypto-hacking

MCQ 170:

_______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext.

Encryption Algorithm

Hashing Algorithm

Tuning Algorithm

Decryption Algorithm

MCQ 171:

_______________ takes the plain text and the key as input for creating cipher text.

Encryption Algorithm

Hashing Algorithm

Tuning Algorithm

Decryption Algorithm
MCQ 172:

A _____________ provides privacy for LANs that must communicate through the global internet

VNN

VPN

VNP

VPP

MCQ 173:

The full form of OSI is OSI model is ______________

Open Systems Interconnection

Open Software Interconnection

Open Systems Internet

Open Software Internet

MCQ 174:

The Internet authorities have reserved addresses for ____________.

extranets

internets

intranets

None of the above

MCQ 175:

__________________ is the process of identifying an individual, usually based on a username and password.

Authentication

Either authentication or authorization

Authorization

Neither authentication nor authorization

MCQ 176:

__________________ ensures that information are in a format that is true and correct to its original purposes.
Cryptography

Integrity

Availability

Confidentiality

MCQ 177:

________________ provides either authentication or encryption, or both, for packets at the IP level.

AH

ESP

PGP

SSL

MCQ 178:

When plain text is converted to unreadable format, it is termed as _____________.

rotten text

cipher-text

ciphen-text

raw text

MCQ 179:

Conventional cryptography is also known as _____________ or symmetric-key encryption.

secret-key

public key

protected key

primary key

MCQ 180:

___________________ is the process of giving individuals access to system objects based on their identity.

Authentication

Authorization

Neither congestion control nor quality of service

Either authentication or authorization

MCQ 181:

In general how many key elements constitute the entire security structure?

MCQ 182:

____________________ is a mathematical algorithm that produces a unique plain text for a given cipher text along with a

decryption key.

Decryption Algorithm

Encryption Algorithm

Tuning Algorithm

Hashing Algorithm

MCQ 183:

The procedure to add bits to the last block is termed as _________________.

decryption

tuning

padding

hashing

MCQ 184:

A type of cipher that uses multiple alphabetic strings.

Polyalphabetic substitution based

Transposition-based

Mono alphabetic substitution based


Polyalphabetic substitution based

MCQ 185:

The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is

called _________________.

cryptanalysis

decryption

reverse engineering

encryption

MCQ 186:

The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as

________________.

cryptanalysis

decryption

reverse engineering

encryption

MCQ 187:

The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and

_________________.

Data Size

Round Size

Encryption Size

key Size

MCQ 188:

_________________ is the concept that tells us about the replacement of every alphabet by another alphabet and the

entire series gets ?shifted? by some fixed quantity.

Rolling Cipher

Shift Cipher

Playfair Cipher

Block Cipher

MCQ 189:

In which of the following encryption key is used to encrypt and decrypt the data ?

Asymmetric key

Public key

Private key

Symmetric key

MCQ 190:

Data integrity gets compromised when ____________ and ____________ are taken control off.

Access control, file deletion

Network, system

Access control, file permission

Network, file permission

MCQ 191:

Encryption is the study of creating and using decryption techniques.

True

False

May be

Can't say

MCQ 192:

A set of all probable decryption keys are collectively termed as ____________.

key-stack

key pack

key bunch

key space
MCQ 193:

In Cryptography, the original message, before being transformed, is called ____________________.

Simple Text

Plain Text

Cipher text

Empty Text

MCQ 194:

These ciphers replace a character or characters with a different character or characters, based on some key.

Polyalphabetic substitution based

Transposition-based

Substitution based

Mono alphabetic substitution based

MCQ 195:

Cryptographic algorithms are based on mathematical algorithms where these algorithms use _____________ for a secure

transformation of data.

secret key

external programs

add-ons

secondary key

MCQ 196:

In symmetric-key cryptography, the same key is used by

One Party

Multi Party

Third Party

Both Party
MCQ 197:

Data Encryption Standard is an example of a _____________ cryptosystem.

conventional

public key

hash key

asymmetric-key

MCQ 198:

Which of the following is not the primary objective of cryptography?

Data Redundancy

Confidentiality

Authentication

Non-repudiation

MCQ 199:

Which of the following is not the primary objective of cryptography?

Authentication

Data Redundancy

Data Integrity

Confidentiality

MCQ 200:

_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable

text & vice-versa.

Malware Analysis

Cryptography

Exploit writing

Reverse engineering

MCQ 201:

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the

message is

Short

Long

Thin

Flat

MCQ 202:

Encryption-decryption in cryptosystem is done in ___________________ ways.

MCQ 203:

Which of the following is not an example of a block cipher?

DES

IDEA

Caesar cipher

Twofish

MCQ 204:

Data Encryption Standard (DES), was designed by

Intel

IBM

HP

Sony
MCQ 205:

__________________ cryptography has always been focussing on the concept of ?security through obscurity?.

Modern

Asymmetric

Classic

Latest

MCQ 206:

The keys used in cryptography are

public key

secret key

private key

All of the above

MCQ 207:

In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to

encrypt the plaintext.

Shift Cipher

Playfair Cipher

Rolling Cipher

Block Cipher

MCQ 208:

In symmetric key cryptography, the key used by the sender and the receiver is

shared

two keys are used

none keys are used

different
MCQ 209:

A cipher in which the order is not preserved.

Public key based

Polyalphabetic substitution based

Transposition-based

Substitution based

MCQ 210:

Cryptography can be divided into __________________ types.

MCQ 211:

Study of creating a d using encryption and decryption techniques.

Decryption

Encryption

Cryptography

Cipher

MCQ 212:

In symmetric-key cryptography, the key locks and unlocks the box is

same

shared

private

public
MCQ 213:

________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain

text remains fixed all through the encryption procedure.

Polyalphabetic Cipher

Playfair Cipher

Monoalphabetic Cipher

Caesar Cipher

MCQ 214:

Why can a message encrypted with the Public Key only be decrypted with the receiver?s appropriate Private Key?

(Assymmetric Encryption)

A so called "one way function with back door" is applyed for the encryption

Not true, the message can also be decrypted with the Public Key

The Public Key contains a special function which is used to encrypt the message and which can only be reversed

by the appropriate Private Key

The encrypted message contains the function for decryption which identifies the Private Key

MCQ 215:

The ciphers of today are called __________________________.

Transposition Cipher

Round ciphers

Substitution Cipher

All of the above

MCQ 216:

In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.

Symmetric Key Encryption

Asymmetric Key Encryption

Asymmetric Key Decryption

Hash-based Key Encryption


MCQ 217:

In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating

a block of cipher-text bits.

Hash functions

One-time pad

Block Cipher

Playfair Cipher

MCQ 218:

In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one

bit of cipher-text.

Block Cipher

Stream cipher

One-time pad

Playfair Cipher

MCQ 219:

The ________________ has piece of the keyword that has the same length as that of the plaintext.

Block Cipher

One-time pad

Hash functions

Playfair Cipher

MCQ 220:

A process of making the encrypted text readable again.

Decryption

Information Hiding

Encryption

Network Security
MCQ 221:

The process of transforming plain text to unreadable text.

Decryption

Encryption

Network Security

Information Hiding

MCQ 222:

The relationship between a character in the plaintext to a character is

many-to-many relationship

one-to-one relationship

many-to-one relationship

one-to-many relationship

MCQ 223:

The Cryptography can provide

entity authentication

confidentiality

nonrepudiation of messages

All of the above

MCQ 224:

The Data Encryption Standard (DES) was designed by

Microsost

Apple

IBM

Oracle

MCQ 225:

In ________________ same keys are implemented for encrypting as well as


Symmetric Key Encryption

Asymmetric Key Encryption

Asymmetric Key Decryption

Hash-based Key Encryption

MCQ 226:

The original message, before being transformed, is

Cipher text

plaintext

decryption

None of the above

MCQ 227:

RSA stands for

Rivest, Shamir, Adleman

Roger, Shamir, Adrian

Robert, Shamir, Anthoney

Rivest, Shaw, Adleman

MCQ 228:

An encryption algorithm transforms the plaintext into

Empty Text

Cipher text

Plain Text

Simple Text

MCQ 229:

A set of all probable decryption keys are collectively termed as key space.

True
MCQ 230:

Cryptography, a word with Greek origins, means

Secret Writing

Corrupting Data

Open Writing

Closed Writing

MCQ 231:

Full form of SET.

Secure Electronic Transaction

MCQ 232:

Full form of TSP.

Time stamping Protocol

MCQ 233:

Full form of SHTTP.

Secure Hyper Text Transfer Protocol


MCQ 234:

Full form of PEM.

Privacy Enhanced Mail

MCQ 235:

Full form of PGP.

Pretty good privacy

MCQ 236:

Full form of S/MIME.

Secure multipurpose secure Internet mail Extensions

MCQ 237:

Cookies were originally designed for _______________.

Client-side programming

Server-side programming

Both Client-side & Server-side programming

Web programming

MCQ 238:

A digital signature needs a _________________.


public key system

private key system

shared key system

All of the above

MCQ 239:

A session symmetric key between two persons or parties is used

Two Times

Only once

Multiple Times

Depends on situation occues

MCQ 240:

Message Confidently is using ______________.

Cipher Text

Asymmetric key

Symmetric key

Plain Text

MCQ 241:

The message digest needs to be _______________.

private

public

keep secret

All of the above

MCQ 242:

The message must be encrypted at the sender site and decrypted at the

sender site

receiver site
Both site

Neither A nor B

MCQ 243:

EMAIL is?

Electronic Mail

File Upload on server

Used to send files and message

Both A and C

MCQ 244:

In Computer which range is in registered ports.

0 to 1083

1024 to 49151

49151 to 65535

All of the above

MCQ 245:

What is the port number of http.

23

80

25

21

MCQ 246:

In which layer of OSI model IP is available.

layer 1

layer 2

layer 3

layer 4
MCQ 247:

What is the full form of FTP

File Transfer port

File transverse port

File Transfer Protocol

File Time protocol

MCQ 248:

Always https protocol is used as

Simpe

Secure

Server

None of the above

MCQ 249:

Which is the lowest layer of TCP/IP Model.

Host to Host layer

Netword Access layer

Internet layer

Application Layer

MCQ 250:

What is the port number of http.

23

80

25

21

Submit

You might also like