Network Security Multiple Choice Questions and Answers With MCQ
Network Security Multiple Choice Questions and Answers With MCQ
You will find the correct answer of all the questions after you will submit the quiz. You will also get a report of your
performance after you will submit the quiz.
Unlimited attempts possible to practice. On each attempts you will get a set of 25 questions.
MCQ 1:
TCP/IP is a _____________.
Network Hardware
Network Software
Protocol
MCQ 2:
File transfer
Email
MCQ 3:
Microsoft
IBM
Sun
MCQ 4:
IEEE802.1
IEEE802.2
IEEE802.3
IEEE802.4
MCQ 5:
Both A and B
MCQ 6:
Protocols
Models
Gateways
Ports
MCQ 7:
Internet layer
Application Layer
MCQ 8:
Port
Socket
Gateways
Protocol
MCQ 9:
256
128
1024
65535
MCQ 10:
Serial
Parallel
AGP
MCQ 12:
Linux
Unix
Windows
MCQ 13:
16
MCQ 14:
Printers
Scanners
Telephones
Monitors
MCQ 15:
1024 to 49151
49151 to 65535
MCQ 16:
MCQ 17:
USB
Serial
Parallel
FireWire
MCQ 18:
23
80
25
21
MCQ 19:
Source port
Destination port
Checksum
MCQ 20:
Datagram
Stream
Raw
MCQ 21:
layer 1
layer 2
layer 3
layer 4
MCQ 22:
IP is defined in _____________.
RFC 790
RFC 791
RFC 792
RFC 793
MCQ 23:
TCP
IP
ICMP
SMTP
MCQ 25:
Troubleshooting
Performance
MCQ 26:
SSR
LSR
LLR
Both A and B
MCQ 27:
8 Bits
16 Bits
32 Bits
128 Bits
MCQ 28:
MCQ 29:
FTP
S/MIME
PGP
HTTP
MCQ 30:
____________ is the science and art of transforming messages to meke them secure and immune to attacks.
Cryptoanalysis
Cryptography
MCQ 31:
cipher text
plain text
secure text
MCQ 32:
cipher text
plain text
secure text
MCQ 33:
MCQ 34:
MCQ 35:
MCQ 36:
21
23
25
80
MCQ 37:
description
encryption
Both A and B
MCQ 38:
description
encryption
Both A and B
MCQ 39:
key
plain text
cipher text
raw text
MCQ 40:
In an _____________ cipher, the same key is used by both the sender and the receiver.
Symmetric Key
Asymmetric Key
Neither A nor B
Either A or B
MCQ 41:
Transportion technique
Both A and B
Either A or B
MCQ 42:
private key
public key
Either A or B
Neither A nor B
MCQ 43:
private key
public key
Either A or B
Neither A nor B
MCQ 44:
Transportion technique
Substitution Technique
Both A and B
Either A or B
MCQ 45:
Symmetric Key
Asymmetric Key
Neither A nor B
Either A or B
MCQ 46:
The modern cipher is usually a complex ____________ cipher made of a combination of different simple ciphers.
square
secret
round
plain
MCQ 47:
Block Cipher
Stream cipher
Both A and B
MCQ 48:
16 bit
32 bits
48 bit
64 bit
MCQ 49:
Asymmetric Key
Symmetric Key
Secret Key
Either A or B
MCQ 50:
IEEE
ANSI
ICANN
BSNL
MCQ 51:
Physical layer
Presentation layer
Application layer
Network layer
MCQ 52:
192.168.0.0
127.0.0.0
127.0.0.1
MCQ 53:
Class A
Class B
Class C
Class D
MCQ 54:
32 Bits
64 Bits
128 Bits
MCQ 55:
Netid
Subnetid
Hosted
MCQ 56:
Class A
Class B
Class C
Class D
MCQ 57:
TCP
ISP
FTP
HTTP
MCQ 58:
Dial up
SLIP
PPP
MCQ 59:
MCQ 60:
JSP
ASP
Javascript
PHP
MCQ 61:
Unix
Linus
Windows
MCQ 62:
Simpe
Secure
Server
Operating System
Web browser
DOS
Modem
MCQ 64:
32 kbps
56 kbps
64 kbps
128 kbps
MCQ 65:
TCP
HTTP
FTP
TFTP
MCQ 66:
Internet Explorer
Opera
Mozila
MCQ 67:
Bing
Yahoo
MCQ 68:
Yahoo messanger
Google Earth
MCQ 69:
Google Earth
Wikipedia
Skype
MCQ 70:
Virus
Worms
Trojan Horses
MCQ 71:
Communication
Banking
Shopping
Sleeping
MCQ 72:
In the SSL Protocol, each upper layer message if fragmented into a maximum of _______________ bytes.
216
232
214
212
MCQ 73:
MCQ 74:
After the encryption stage in SSL, the maximum length of each fragment is.
216+2048
216+1028
214+1028
214+2048
MCQ 75:
If the sender and receiver use different keys, the system is referred to as conventional cipher system.
True
False
Cant say
Multi-alphabetic Cipher
Bi-alphabetic Cipher
Poly-alphabetic Cipher
Mono-alphabetic Cipher
MCQ 77:
Which are the most frequently found letters in the English language?
e, a
e, o
e, t
e, i
MCQ 78:
Caesars Cipher
Hash Algorithm
SP Networks
MCQ 79:
1 and 3
2 and 3
3 and 4
2 and 4
MCQ 80:
Which protocol is used to convey SSL related alerts to the peer entity?
Alert Protocol
Upper-Layer Protocol
Handshake Protocol
MCQ 81:
The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.
12
16
MCQ 82:
compression
confidentiality
message integrity
MCQ 83:
Both private key and public key are kept by the receiver
Both private key and public key are announced to the public
Private key is kept by the receiver and public key is announced to the public
Public key is kept by the receiver and private key is announced to the public
MCQ 84:
FTP
Mail by PGP
POP3
S/MIME
MCQ 85:
IPSec
SSL
PGP
MCQ 86:
Biometric verification
2-factor authentication
MCQ 87:
MCQ 88:
PGP
SSL
MCQ 89:
MCQ 90:
In the DES algorithm the round key is ________________ bit and the Round Input is ___________________ bits.
48, 32
64, 32
56, 24
32, 32
MCQ 91:
_________________ is a term used in cryptography that refers to a message before encryption or after decryption.
Original text
Cipher text
Plain script
Plain text
MCQ 92:
Keys
Others
Multi Parties
Single Party
MCQ 93:
1 Key
2 Key
3 Key
4 Key
MCQ 94:
A straight permutation cipher or a straight P-box has the same number of inputs as.
Bits
Cipher text
Outputs
Frames
MCQ 95:
16 Bits
64 Bits
128 Bits
32 Bits
MCQ 96:
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to.
Others
Each other
Keys
Data
MCQ 97:
two groups
four groups
MCQ 98:
65535
65515
65495
65475
MCQ 99:
cipher text
cipher scricpt
secret text
secret script
MCQ 100:
Monoalphabetic Cipher
Cryptography
MCQ 101:
public key
unique key
private key
MCQ 102:
35
63
25
65
MCQ 103:
SSL
TLS
Either A or B
Both A and B
MCQ 104:
https
ssl
smtp
sftp
MCQ 105:
Cipher text
Cipher
Shift cipher
Caesar cipher
MCQ 106:
_______________ can retrive application data from application layer protocol, but the protocol is normally HTTP.
TLS
SSL
Either A or B
Both A and B
MCQ 107:
Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to
Physical
Data-link
Transport
Application
MCQ 108:
It provides one time session keys between two parties or persons joins each other.
Diffie Hellman
MCQ 109:
RSS Algorithm
RAS Algorithm
RSA Algorithm
RAA Algorithm
MCQ 110:
List 1 - A. Application layer , B. Transport layer, C. Network layer, D. Data link layer
Application layer ---> HDLC, Transport layer ---> TCP, Network layer ---> BGP, Data link layer ---> HTTP
Application layer ---> HDLC, Transport layer ---> BGP, Network layer ---> TCP, Data link layer ---> HTTP
Application layer ---> HTTP, Transport layer ---> BGP, Network layer ---> HTTP, Data link layer ---> HDLC
Application layer ---> HTTP, Transport layer ---> TCP, Network layer ---> BGP, Data link layer ---> HDLC
MCQ 111:
polyalphabetic
mono alphabetic
Sami alphabetic
Both A and C
MCQ 112:
An HTTP connection uses port ________________ whereas HTTPS uses port ________________ and invokes SSL.
40; 80
60; 620
80; 443
620; 80
MCQ 113:
2 or 3
3 and 4
MCQ 114:
Using RSA algorithm, convert the plain text AAAAAAA into cypher text using the conversion values as p=3, q=11, n=pq, d=7.
BUTAEEZ
ABCDXYZ
SUZANNE
XYZABCD
MCQ 115:
The combination of key exchange, hash, and algorithms defines a ___________ for each SSL section.
list of keys
cipher suite
list of protocols
MCQ 116:
An electronic document that establishes your credentials when you are performing transactions.
Digital code
OTP
Digital Certificate
MCQ 117:
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
Data which is easily readable & understandable without any special algorithm or method is called _________________.
cipher-text
plain text
raw text
encrypted text
MCQ 119:
MCQ 120:
_______________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another
Polyalphabetic Cipher
Caesar Cipher
Playfair Cipher
Monoalphabetic Cipher
MCQ 121:
Which 2 protocols are used in the Transport layer of the TCP/IP model?
MCQ 122:
cipher-text
raw text
clear-text
encrypted text
MCQ 123:
Phishing
DoS
Sniffing
MiTM
MCQ 124:
SSL, TLS
TLS, TTS
SSL, SLT
TLS, SSL
MCQ 125:
network-tapping
wiretapping
net-tapping
wireless-tapping
MCQ 126:
Which of the protocol is not used in the network layer of the TCP/IP model?
ICMP
IP
IGMP
HTTP
MCQ 127:
A message COMPUTERNETWORK encrypted using columnar transposition cipher with a key LAYER. The encrypted
message is
CTTOEWMROPNRUEK
MROUEKCTTPNROEW
OEWPNRCTTUEKMRO
UEKPNRMROOEWCTT
MCQ 128:
TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of
TRUE
FALSE
Cant say
MCQ 129:
_____________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the
Internet.
Architectural security
Internet Security
Data mining
Encryption
MCQ 130:
MCQ 131:
secure system
cipher system
cipher-text
secure algorithm
MCQ 132:
An _____________ is a network that allows and authorised access from outside users of the whole world.
extranets
internets
intranets
MCQ 133:
internets
extranets
intranets
MCQ 134:
private
public
semi-private
semi-public
MCQ 135:
Fetching passwords
Email texts
MCQ 136:
________________ ensures the integrity and security of data that are passing over a network.
Antivirus
Network-security protocols
Pentesting Tools
Firewall
MCQ 137:
MCQ 138:
5
MCQ 139:
_____________ are programs or devices that capture the vital information from the target network or particular network.
Trappers
Routers
Sniffers
Wireless-crackers
MCQ 140:
Database hacking
Data deletion
Data leakage
Data tampering
MCQ 141:
An ______________________ along with a key is used in the encryption and decryption of data.,
cryptography algorithm
decryption algorithm
encryption algorithm
MCQ 142:
A _______________ layer securiy protocol provides end to end security services for applications.
data link
network
transport
MCQ 143:
another
MCQ 144:
S/MIME
smtp
IPSec
https
MCQ 145:
http
smtp
pop
tcp
MCQ 146:
MCQ 147:
A class
B class
C class
D class
MCQ 148:
True
False
Can't say
MCQ 149:
In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways
passive
active
network
MCQ 150:
interanets
internets
extranets
MCQ 151:
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
Encryption key
Decryption key
Authorised key
Primary key
MCQ 152:
Framing
Representation of bits
Synchronization of bits
Connection control
MCQ 153:
______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential
information.
Phishing attack
DoS attack
Website attack
Trappers
MCQ 154:
SSL
TLS
Either A or B
Both A and B
MCQ 155:
_______________________________ ensures that sensitive information are accessed only by an authorized person and
Availability
Confidentiality
Cryptography
Integrity
MCQ 156:
POP
HTTP
TCP/IP
DNS
MCQ 157:
1988
1989
1990
1991
MCQ 158:
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ &
_____________.
address, name
address, location
network, name
network, location
MCQ 159:
Which of the following is not an example or type of phishing?
Spear phishing
Whaling
Deceptive phishing
Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI
model?
Physical layer
Data-link Layer
Session layer
Presentation layer
MCQ 161:
Users are able to see a pad-lock icon in the address bar of the browser when there is _________________ connection.
HTTP
HTTPS
SMTP
SFTP
MCQ 162:
Poor handling of unexpected input can lead to the execution of arbitrary instructions
MCQ 163:
Using the following values of a character M = 5, p = 3, q = 11 & d = 7, Find the the value of cipher text C by RSA Algorithm.
16
21
26
31
MCQ 164:
MCQ 165:
Application
Datalink
Network
Physical
MCQ 166:
MCQ 167:
Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple
TRUE
FALSE
Cant Say
Cryptography offers a set of required security services. Which of the following is not among that 4 required security
services?
Encryption
Hash functions
Steganography
MCQ 169:
_______________ is the art & science of cracking the cipher-text without knowing the key.
Cracking
Cryptanalysis
Cryptography
Crypto-hacking
MCQ 170:
_______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext.
Encryption Algorithm
Hashing Algorithm
Tuning Algorithm
Decryption Algorithm
MCQ 171:
_______________ takes the plain text and the key as input for creating cipher text.
Encryption Algorithm
Hashing Algorithm
Tuning Algorithm
Decryption Algorithm
MCQ 172:
A _____________ provides privacy for LANs that must communicate through the global internet
VNN
VPN
VNP
VPP
MCQ 173:
MCQ 174:
extranets
internets
intranets
MCQ 175:
__________________ is the process of identifying an individual, usually based on a username and password.
Authentication
Authorization
MCQ 176:
__________________ ensures that information are in a format that is true and correct to its original purposes.
Cryptography
Integrity
Availability
Confidentiality
MCQ 177:
________________ provides either authentication or encryption, or both, for packets at the IP level.
AH
ESP
PGP
SSL
MCQ 178:
rotten text
cipher-text
ciphen-text
raw text
MCQ 179:
secret-key
public key
protected key
primary key
MCQ 180:
___________________ is the process of giving individuals access to system objects based on their identity.
Authentication
Authorization
MCQ 181:
In general how many key elements constitute the entire security structure?
MCQ 182:
____________________ is a mathematical algorithm that produces a unique plain text for a given cipher text along with a
decryption key.
Decryption Algorithm
Encryption Algorithm
Tuning Algorithm
Hashing Algorithm
MCQ 183:
decryption
tuning
padding
hashing
MCQ 184:
Transposition-based
MCQ 185:
The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is
called _________________.
cryptanalysis
decryption
reverse engineering
encryption
MCQ 186:
The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as
________________.
cryptanalysis
decryption
reverse engineering
encryption
MCQ 187:
The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and
_________________.
Data Size
Round Size
Encryption Size
key Size
MCQ 188:
_________________ is the concept that tells us about the replacement of every alphabet by another alphabet and the
Rolling Cipher
Shift Cipher
Playfair Cipher
Block Cipher
MCQ 189:
In which of the following encryption key is used to encrypt and decrypt the data ?
Asymmetric key
Public key
Private key
Symmetric key
MCQ 190:
Data integrity gets compromised when ____________ and ____________ are taken control off.
Network, system
MCQ 191:
True
False
May be
Can't say
MCQ 192:
key-stack
key pack
key bunch
key space
MCQ 193:
Simple Text
Plain Text
Cipher text
Empty Text
MCQ 194:
These ciphers replace a character or characters with a different character or characters, based on some key.
Transposition-based
Substitution based
MCQ 195:
Cryptographic algorithms are based on mathematical algorithms where these algorithms use _____________ for a secure
transformation of data.
secret key
external programs
add-ons
secondary key
MCQ 196:
One Party
Multi Party
Third Party
Both Party
MCQ 197:
conventional
public key
hash key
asymmetric-key
MCQ 198:
Data Redundancy
Confidentiality
Authentication
Non-repudiation
MCQ 199:
Authentication
Data Redundancy
Data Integrity
Confidentiality
MCQ 200:
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable
Malware Analysis
Cryptography
Exploit writing
Reverse engineering
MCQ 201:
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the
message is
Short
Long
Thin
Flat
MCQ 202:
MCQ 203:
DES
IDEA
Caesar cipher
Twofish
MCQ 204:
Intel
IBM
HP
Sony
MCQ 205:
__________________ cryptography has always been focussing on the concept of ?security through obscurity?.
Modern
Asymmetric
Classic
Latest
MCQ 206:
public key
secret key
private key
MCQ 207:
In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to
Shift Cipher
Playfair Cipher
Rolling Cipher
Block Cipher
MCQ 208:
In symmetric key cryptography, the key used by the sender and the receiver is
shared
different
MCQ 209:
Transposition-based
Substitution based
MCQ 210:
MCQ 211:
Decryption
Encryption
Cryptography
Cipher
MCQ 212:
same
shared
private
public
MCQ 213:
________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain
Polyalphabetic Cipher
Playfair Cipher
Monoalphabetic Cipher
Caesar Cipher
MCQ 214:
Why can a message encrypted with the Public Key only be decrypted with the receiver?s appropriate Private Key?
(Assymmetric Encryption)
A so called "one way function with back door" is applyed for the encryption
Not true, the message can also be decrypted with the Public Key
The Public Key contains a special function which is used to encrypt the message and which can only be reversed
The encrypted message contains the function for decryption which identifies the Private Key
MCQ 215:
Transposition Cipher
Round ciphers
Substitution Cipher
MCQ 216:
In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.
In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating
Hash functions
One-time pad
Block Cipher
Playfair Cipher
MCQ 218:
In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one
bit of cipher-text.
Block Cipher
Stream cipher
One-time pad
Playfair Cipher
MCQ 219:
The ________________ has piece of the keyword that has the same length as that of the plaintext.
Block Cipher
One-time pad
Hash functions
Playfair Cipher
MCQ 220:
Decryption
Information Hiding
Encryption
Network Security
MCQ 221:
Decryption
Encryption
Network Security
Information Hiding
MCQ 222:
many-to-many relationship
one-to-one relationship
many-to-one relationship
one-to-many relationship
MCQ 223:
entity authentication
confidentiality
nonrepudiation of messages
MCQ 224:
Microsost
Apple
IBM
Oracle
MCQ 225:
MCQ 226:
Cipher text
plaintext
decryption
MCQ 227:
MCQ 228:
Empty Text
Cipher text
Plain Text
Simple Text
MCQ 229:
A set of all probable decryption keys are collectively termed as key space.
True
MCQ 230:
Secret Writing
Corrupting Data
Open Writing
Closed Writing
MCQ 231:
MCQ 232:
MCQ 233:
MCQ 235:
MCQ 236:
MCQ 237:
Client-side programming
Server-side programming
Web programming
MCQ 238:
MCQ 239:
Two Times
Only once
Multiple Times
MCQ 240:
Cipher Text
Asymmetric key
Symmetric key
Plain Text
MCQ 241:
private
public
keep secret
MCQ 242:
The message must be encrypted at the sender site and decrypted at the
sender site
receiver site
Both site
Neither A nor B
MCQ 243:
EMAIL is?
Electronic Mail
Both A and C
MCQ 244:
0 to 1083
1024 to 49151
49151 to 65535
MCQ 245:
23
80
25
21
MCQ 246:
layer 1
layer 2
layer 3
layer 4
MCQ 247:
MCQ 248:
Simpe
Secure
Server
MCQ 249:
Internet layer
Application Layer
MCQ 250:
23
80
25
21
Submit