0% found this document useful (0 votes)
173 views14 pages

TYCS SEM V IS MCQ Question Bank

Uploaded by

mageerauldxrzfp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
173 views14 pages

TYCS SEM V IS MCQ Question Bank

Uploaded by

mageerauldxrzfp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Question Paper Set 1

1. What does the OSI Security Architecture primarily define?

- A) Network protocols

- B) Security services and mechanisms

- C) Application layer standards

- D) Physical layer specifications

2. Which of the following is NOT a security service?

- A) Authentication

- B) Integrity

- C) Availability

- D) Compression

3. What is the goal of a security mechanism?

- A) To define network topologies

- B) To detect network anomalies

- C) To implement security services

- D) To optimize network performance

4. Which OSI layer is responsible for end-to-end data encryption?

- A) Transport Layer (Layer 4)

- B) Data Link Layer (Layer 2)

- C) Network Layer (Layer 3)

- D) Physical Layer (Layer 1)


5. What type of attack aims to modify message content without detection?

- A) Denial-of-Service (DoS)

- B) Man-in-the-Middle (MitM)

- C) Replay attack

- D) Integrity attack

6. Which encryption technique involves substitution and permutation?

- A) Stream ciphers

- B) Block ciphers

- C) RSA algorithm

- D) Diffie-Hellman key exchange

7. What does AES stand for in cryptography?

- A) Advanced Encryption System

- B) American Encryption Standard

- C) Advanced Encryption Standard

- D) American Encryption System

8. How many rounds does AES typically use for encryption?

- A) 12

- B) 10

- C) 8

- D) 14

9. What is the primary advantage of using Triple DES over DES?

- A) Higher encryption speed

- B) Increased key length


- C) Reduced vulnerability to attacks

- D) Compatibility with older systems

10. Which mode of operation does not require an initialization vector (IV)?

- A) CBC (Cipher Block Chaining)

- B) ECB (Electronic Codebook)

- C) CTR (Counter)

- D) OFB (Output Feedback)

11. What is the primary purpose of Diffie-Hellman key exchange?

- A) To securely exchange encryption keys

- B) To authenticate users in a network

- C) To verify the integrity of messages

- D) To encrypt data streams

12. In public-key cryptography, who publishes the public key?

- A) Sender only

- B) Receiver only

- C) Both sender and receiver

- D) Certification authority

13. Which key management method ensures secure distribution of keys?

- A) Diffie-Hellman key exchange

- B) Public-Key Infrastructure (PKI)

- C) RSA encryption

- D) AES encryption
14. What is the purpose of a Message Authentication Code (MAC)?

- A) To encrypt messages

- B) To verify the authenticity of a message

- C) To generate digital signatures

- D) To compress data

15. Which of the following is a cryptographic hash function?

- A) DES

- B) RSA

- C) HMAC

- D) Diffie-Hellman

16. What property of hash functions makes them suitable for message integrity?

- A) Collision resistance

- B) Key length

- C) Speed of computation

- D) Symmetric encryption

17. Which algorithm is used for hashing in the Secure Hash Algorithm (SHA-256)?

- A) MD5

- B) SHA-1

- C) SHA-256

- D) HMAC

18. What does HMAC stand for?

- A) Hashed Message Authentication Code


- B) Hashing Mechanism for Authentication Codes

- C) Hash-based Message Authentication Code

- D) High-level Message Authentication Code

19. Which security feature ensures that a hash function cannot be reversed?

- A) One-way function

- B) Symmetric encryption

- C) Public-key cryptography

- D) Steganography

20. Which technique hides the existence of secret information within innocuous carriers?

- A) Encryption

- B) Hashing

- C) Steganography

- D) Compression

Question Paper Set 2

1. What does the OSI Security Architecture primarily define?

- A) Network protocols

- B) Security services and mechanisms

- C) Application layer standards

- D) Physical layer specifications

2. Which of the following is NOT a security service?

- A) Authentication

- B) Integrity
- C) Availability

- D) Compression

3. What is the goal of a security mechanism?

- A) To define network topologies

- B) To detect network anomalies

- C) To implement security services

- D) To optimize network performance

4. Which OSI layer is responsible for end-to-end data encryption?

- A) Transport Layer (Layer 4)

- B) Data Link Layer (Layer 2)

- C) Network Layer (Layer 3)

- D) Physical Layer (Layer 1)

5. What type of attack aims to modify message content without detection?

- A) Denial-of-Service (DoS)

- B) Man-in-the-Middle (MitM)

- C) Replay attack

- D) Integrity attack

6. Which encryption technique involves substitution and permutation?

- A) Stream ciphers

- B) Block ciphers

- C) RSA algorithm

- D) Diffie-Hellman key exchange


7. What does AES stand for in cryptography?

- A) Advanced Encryption System

- B) American Encryption Standard

- C) Advanced Encryption Standard

- D) American Encryption System

8. How many rounds does AES typically use for encryption?

- A) 12

- B) 10

- C) 8

- D) 14

9. What is the primary advantage of using Triple DES over DES?

- A) Higher encryption speed

- B) Increased key length

- C) Reduced vulnerability to attacks

- D) Compatibility with older systems

10. Which mode of operation does not require an initialization vector (IV)?

- A) CBC (Cipher Block Chaining)

- B) ECB (Electronic Codebook)

- C) CTR (Counter)

- D) OFB (Output Feedback)

11. What is the primary purpose of Diffie-Hellman key exchange?

- A) To securely exchange encryption keys


- B) To authenticate users in a network

- C) To verify the integrity of messages

- D) To encrypt data streams

12. In public-key cryptography, who publishes the public key?

- A) Sender only

- B) Receiver only

- C) Both sender and receiver

- D) Certification authority

13. Which key management method ensures secure distribution of keys?

- A) Diffie-Hellman key exchange

- B) Public-Key Infrastructure (PKI)

- C) RSA encryption

- D) AES encryption

14. What is the purpose of a Message Authentication Code (MAC)?

- A) To encrypt messages

- B) To verify the authenticity of a message

- C) To generate digital signatures

- D) To compress data

15. Which of the following is a cryptographic hash function?

- A) DES

- B) RSA
- C) HMAC

- D) Diffie-Hellman

16. What property of hash functions makes them suitable for message integrity?

- A) Collision resistance

- B) Key length

- C) Speed of computation

- D) Symmetric encryption

17. Which algorithm is used for hashing in the Secure Hash Algorithm (SHA-256)?

- A) MD5

- B) SHA-1

- C) SHA-256

- D) HMAC

18. What does HMAC stand for?

- A) Hashed Message Authentication Code

- B) Hashing Mechanism for Authentication Codes

- C) Hash-based Message Authentication Code

- D) High-level Message Authentication Code

19. Which security feature ensures that a hash function cannot be reversed?

- A) One-way function

- B) Symmetric encryption

- C) Public-key cryptography

- D) Steganography
20. Which technique hides the existence of secret information within innocuous carriers?

- A) Encryption

- B) Hashing

- C) Steganography

- D) Compression

Question Paper Set 3

1. What does the OSI Security Architecture primarily define?

- A) Network protocols

- B) Security services and mechanisms

- C) Application layer standards

- D) Physical layer specifications

2. Which of the following is NOT a security service?

- A) Authentication

- B) Integrity

- C) Availability

- D) Compression

3. What is the goal of a security mechanism?

- A) To define network topologies

- B) To detect network anomalies

- C) To implement security services

- D) To optimize network performance


4. Which OSI layer is responsible for end-to-end data encryption?

- A) Transport Layer (Layer 4)

- B) Data Link Layer (Layer 2)

- C) Network Layer (Layer 3)

- D) Physical Layer (Layer 1)

5. What type of attack aims to modify message content without detection?

- A) Denial-of-Service (DoS)

- B) Man-in-the-Middle (MitM)

- C) Replay attack

- D) Integrity attack

6. Which encryption technique involves substitution and permutation?

- A) Stream ciphers

- B) Block ciphers

- C) RSA algorithm

- D) Diffie-Hellman key exchange

7. What does AES stand for in cryptography?

- A) Advanced Encryption System

- B) American Encryption Standard

- C) Advanced Encryption Standard

- D) American Encryption System

8. How many rounds does AES typically use for encryption?

- A) 12

- B) 10
- C) 8

- D) 14

9. What is the primary advantage of using Triple DES over DES?

- A) Higher encryption speed

- B) Increased key length

- C) Reduced vulnerability to attacks

- D) Compatibility with older systems

10. Which mode of operation does not require an initialization vector (IV)?

- A) CBC (Cipher Block Chaining)

- B) ECB (Electronic Codebook)

- C) CTR (Counter)

- D) OFB (Output Feedback)

11. What is the primary purpose of Diffie-Hellman key exchange?

- A) To securely exchange encryption keys

- B) To authenticate users in a network

- C) To verify the integrity of messages

- D) To encrypt data streams

12. In public-key cryptography, who publishes the public key?

- A) Sender only

- B) Receiver only

- C) Both sender and receiver

- D) Certification authority
13. Which key management method ensures secure distribution of keys?

- A) Diffie-Hellman key exchange

- B) Public-Key Infrastructure (PKI)

- C) RSA encryption

- D) AES encryption

14. What is the purpose of a Message Authentication Code (MAC)?

- A) To encrypt messages

- B) To verify the authenticity of a message

- C) To generate digital signatures

- D) To compress data

15. Which of the following is a cryptographic hash function?

- A) DES

- B) RSA

- C) HMAC

- D) Diffie-Hellman

16. What property of hash functions makes them suitable for message integrity?

- A) Collision resistance

- B) Key length

- C) Speed of computation

- D) Symmetric encryption

17. Which algorithm is used for hashing in the Secure Hash Algorithm (SHA-256)?

- A) MD5
- B) SHA-1

- C) SHA-256

- D) HMAC

18. What does HMAC stand for?

- A) Hashed Message Authentication Code

- B) Hashing Mechanism for Authentication Codes

- C) Hash-based Message Authentication Code

- D) High-level Message Authentication Code

19. Which security feature ensures that a hash function cannot be reversed?

- A) One-way function

- B) Symmetric encryption

- C) Public-key cryptography

- D) Steganography

20. Which technique hides the existence of secret information within innocuous carriers?

- A) Encryption

- B) Hashing

- C) Steganography

- D) Compression

You might also like