PRIYADARSHINI BHAGWATI COLLEGE OF ENGINEERING,Nagpur
Question Bank for Online MCQ Based Exam
SUBJECT :- INFORMATION AND CYBER SECUITY
Unit -1
1. In Caesar Cipher , What is the Plain Text corresponding to Cipher Text " QXPEHU "
A. THEORY B. MMATHS C. NUMBER D. CRYPTO
2. Consider Keyword :- MONARCHY and Plain Text is LAXMAN ,So find its cipher text by using Play Fair
Encryption.
A. SMUARA B. SNUARA C. MSUARA D. SUMARA
3. State True or False: Hill Cipher is Poly alphabetic Cipher
A. TRUE B. False
4. Lets P,C,K denotes the Plain Text Spaces , Cipher Text Spaces and Key Spaces [Link] Shift Cipher
P=C=Z26. For 0<=K<=25 , Encryption function ek is defined by ek(x)=........ mod 26 and decryption function dk is
defined by dk(x)=......... mod 26
Option A.
(-X+K),(X-K)
Option B.
(X+K),(X-K)
Option C.
(X+K),(-X-K)
Option D.
(-X+K),(-X-K)
5. Ciphertext depends on the original plaintext message, the algorithm and the ___.
Option A.
attacker
Option B.
Key Value
Option C.
Network
Option D.
None of the above
6. State True or False :- Steganography is a technique to hide a data in the form of network Packet
[Link] B. False
7. Decrypt the cipher text HQFUBSWHG WHAW by using Caeser Cipher
Option A.
ABANDONED TEXT
Option B.
ABANDONED LOCK
Option C.
ENCRYPTED TEXT
Option D.
ENCRYPTED LOCK
8. Find cipher text for given plain text by using vigenere cipher. Plain Text is :- " PANKAJ" and Key is :- " DEEPAK ".
Option A.
SREZAT
Option B.
SERZAT
Option C.
ESRZAT
Option D.
RSEZAT
9. Encrypt Plain text " RUPALI " and keyword is " PRASTHAVINA" by using Play Fair encryption technique
Option A.
PRWSMV
Option B.
PWRSMV
Option C.
RPWSMV
Option D.
WPRSMV
10. An attacker sits between customer and Banker, and captures the information from the customer and re-
transmits to the banker by altering the information. This attack is called as ______.
Option A.
Masquerade Attack
Option B.
Replay Attack
Option C.
Passive Attack
Option D.
Denial of Service Attack
11. ______ implies that some portion of a ________ message is altered.
Option A.
Deletion, legitimate
Option B.
Modification, Illegitimate
Option C.
Modification, Legitimate
Option D.
Deletion, Illegitimate
12. The purpose of computer security is to prevent ______ from doing the ______
Option A.
attacks, harm
Option B.
attackers, damage
Option C.
threat, needful
Option D.
employees, interference
13. If Plain Text is " SUMEDHA " & Key is " CHANDNI " Find the encrypted text by Using Vernam Cipher
Option A.
UMBRGUI
Option B.
UBMRGUI
Option C.
BUMRGUI
Option D.
URMBGUI
14. Encrypt Plain text " PRIYADARSHINI" by using Rail Fence Encryption Technique
Option A.
PIAASIIRYDRHN
Option B.
PRYAIDAARHNI
Option C.
INIHSRADAYIRP
Option D.
PRIYAINIHSRDA
15. Encrypt Plain Text "RAJESH " by Using Hill Cipher Technique. Key :- { {2,1},{4,3}}
Option A.
IQWMRP
Option B.
IQMWPR
Option C.
QIWMRP
Option D.
PRMWQI
16. Which of the following cipher techniques include the involvement of matrix operations in their algorithms
of encryption and decryption?
Option A.
Hill Cipher
Option B.
Playfair cipher
Option C.
Both a and b
Option D.
None of the above
17. Which of the following is not a principle of data security?
Option A.
Data Confidentiality
Option B.
Data Integrity
Option C.
Authentication
Option D.
None of the above
18. Which of the following security attacks is not an active attack?
Option A.
Masquerade
Option B.
Modification of message
Option C.
Denial of service
Option D.
Traffic analysis
19. Which of the following options correctly defines the Brute force attack?
Option A.
Brutally forcing the user to share the useful information like pins and passwords.
Option B.
One entity pretends to be some other entity
Option C.
Trying every possible key to decrypt the message.
Option D.
The message or information is modified before sending it to the receiver.
20. Encrypt Plain Text "SALMAN" by using Play Fair [Link] for Encryption is " LOKMAT"
Option A.
OMOAEU
Option B.
UMOAEU
Option C.
UEAOMU
Option D.
MUOAEU
21. Decrypt the cipher text " QFAFSDF " by using Ceaser cipher
Option A.
LAVANYA
Option B.
RITHANYA
Option C.
CHANKYA
Option D.
MERINDA
22. State True or False :- Total number of key available in mono alphabetic cipher is 26 !
A. true B . false
23 State True or False :- In passive attack, attacker modify the content of message.
A. True B. False
24. Caesar Cipher is an example of ..............
Option A.
Poly-alphabetic Cipher
Option B.
Mono-alphabetic Cipher
Option C.
Multi-alphabetic Cipher
Option D.
Bi-alphabetic Cipher
25. State True or False :- Authentication is not a process to verify identification of sender and Receiver.
A. True B. False
26. Network security consists of:
Option A.
Protection
Option B.
Detection
Option C.
Reaction
Option D.
All of the above
27. State True or False :- In active attack ,attacker monitor the data communication as well as modify the
content of message.
A. TRUE [Link]
28. State True or False :- Data Integrity mean data send from one end is not similar as data received at other
end.
A. TRUE B. FALSE
29. Consider Plain Text is " MOHAN " and key for Encryption is { {2,3},{1,4} }. find cipher text by using Hill Cipher
Encryption Technique
Option A.
OQOHNN
Option B.
QOOHNN
Option C.
OOQHNN
Option D.
HOQHNN