All Unit MCQ 3
All Unit MCQ 3
MCQ Questions
1. Rail Fence Technique is an example of
a) Substitution b) Transposition c) Product cipher d) Caesar cipher
Answer : a
2. SET is
a) Electronic Payment System b) Security Protocol
c) Credit card payment d) Internet Payment System
Answer : a
Answer : c
Answer : b
Answer : a
Answer : a
Answer : a
Answer : a
Answer : c
Answer : b
12. ________ prevents either sender or receiver from denying a transmitted message.
a) Access Control b) Non repudiation
c) Masquerade d) Integrity
Answer : b
Answer : b
Answer : b
Answer : a
Answer : c
Answer : d
Answer : c
Answer : a
20. The Authentication Header (AH) , part of IPsec, provides which of the following security
function?
a) Source authentication b) Data Integrity
c) Data confidentiality d) Source authentication and data integrity
Answer : d
Answer : b
Answer : a
Answer : b
Answer : a
Answer : a
Answer : d
Answer : b
Answer : c
29. For confidentiality, data to be sent is
a) Encrypted b) Decrypted c) Corrected d) Both (a) and (b)
Answer : a
Answer : b
Answer : a
Answer : a
Answer : d
Answer : c
Answer : b
36. The process of writing the text as rows and read it as columns is known as
a) Vernam cipher b) Caesar cipher
c) Transposition columnar cipher d) Homophonic substitution cipher
Answer : c
37. The principal of _______ ensures that only the sender and the intended recipients have access to
the contents of message
a) Confidentiality b) Authentication c) Integrity d) Access control
Answer : b
Answer : a
Answer : c
Answer : c
Answer : a
42. ______ forms the basis for the randomness of authentication token.
a) Password b) Seed c) MD5 d) RSA
Answer : a
43. In polyalphabetic cipher, the characters in plaintext have a relation with the characters in cipher
text
a) One to one b) One to many c) Many to one d) Many to many
Answer : b
44. In polyalphabetic cipher, the characters in plaintext have a relation with the characters in cipher
text
a) One to one b) One to many c) Many to one d) Many to many
Answer : b
Answer : d
46. The main goal of _____ attack is to obtain unauthorized access to the information.
a) Active b) Caesar c) Passive d) Brute force
Answer : c
47. _____ involves trying every possible key until a proper translation of cipher text into plain text
is obtained.
a) Man in the middle attack b) Chosen Plain text Attack
c) Brute Force attack d) None of these
Answer : c
Answer : b
50. In______ mode, the same plaintext value will always result in the same cipher text value.
a) Cipher Block Chaining b) Cipher Feedback
c) Electronic code book d) Output Feedback
Answer : c
Answer : b
Answer : d
Answer : a
54. In Digital Signature, there is _____ relationship between signature and message.
a) Many to one b) One to many
c) Many to many d) One to one
Answer : d
55. When a Hash function is used to provide message authentication, the hash function value is
referred to as
a) Message digest b) Message authentication code
c) Hashed based MAC d) None of these
Answer : a
56. In ______ , the malicious code is installed on a personal computer or server misdirecting users
to fraudulent website.
a) Phishing scam b) Pharming scam
c) Spoofing d) Sniffing
Answer : b
58. Which security protocol is used to secure pages where users are required to submit sensitive
information?
a) Secure Socket Layer b) Transport Layer Security
c) Secure IP d) Secure HTTP
Answer : a
59. The criteria which makes TLS more secure than SSL is
a) Message Authentication b) Key material generation
c) Both (a) and (b) d) None of these
Answer : c
60. The _____ mode of IPsec, take the whole IP packet to form secure communication between two
gateways
a) Transport b) Tunnel c) Either (a) or (b) d) Both (a) and (b)
Answer : b
61. The _____ authentication factor that relate to something that a user is or does and includes
biometric identifiers.
a) Knowledge factor b) Ownership factor
c) Inherence Factor d) Authentication factor
Answer : c
Answer : b
Answer : b
64. A ______ acts as a barrier between a trusted network and an untrusted network
a) Bridge b) Router c) Firewall d) Both (a) and (b)
Answer : c
65. It monitors the TCP handshaking going on between the local and remote host to determine
whether the session being initiated is legitimate.
a) Application Layer Firewall b) State full firewall
c) Packet firewall d) Circuit level firewall
Answer : d
67. Man in the middle attack can endanger the security of Diffie Hellman method if two parties are
not
a) Joined b) Authenticated c) Submitted d) Shared
Answer : b
Answer : a
Answer : b
70. Name the network attack that floods it with useless traffic.
a) Spoofing b) Denial of Service attack c) Virus d) Trojan Horse
Answer : a
Answer : d
Answer : b
Answer : c
Answer : d
Answer : b
76. Network Address Translation is______ with transport mode.
a) Supported b) Not supported
c) May or may not supported d) Does not have any relation
Answer : b
Answer : c
78. Encapsulating Security Payload (ESP) belongs to which Internet Security Protocol?
a) Secure Socket Layer Protocol b) Secure IP Protocol
c) Secure Http Protocol d) Transport Layer Security Protocol
Answer : b
Answer : a
Answer : a
Answer : b
Answer : a
Answer : a
Answer : b
Answer : a
Answer : c
Answer : a
Answer : a
Answer : b
90. In an asymmetric key cipher, the sender uses the _______________ key
a) private b) public c) either (a) or (b) d) neither (a) nor (b)
Answer : b
91. In an asymmetric-key
a. private b. public c. either (a) or (b) d. neither (a) nor (b)
Answer : a
Answer : a
Answer : a
94. DES has an initial and final permutation block and _________________
a) 14 b) 15 c) 16 d) none of the above
Answer : c
Answer : b
Answer : c
97. The __________ cipher reorders the plaintext characters to create a cipher text
a) substitution b) transposition c) either (a) or (b) d) neither (a) or (b)
Answer : b
98. A (n) __________ is a keyless substitution cipher with N inputs and M outputs that uses a
formula to define the relationship between the input stream and the output stream.
a) S-box b) P-box c) T-box d) None of the above
Answer : a
99. A(n) _____________ is a keyless transposition cipher with N inputs and M outputs that uses a
table to define the relationship between the input stream and the output stream.
a) S-box b) P-box c) T-box d) None of the above
Answer : b
100. A modern cipher is usually a complex ___________ cipher made of a combination of different
simple ciphers.
a) round b) circle c) square d) none of the above
Answer : a
106.The certificate message is required for any agreed-on key exchange method except
_______________
a) Ephemeral Diffie-Hellman b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman d) RSA
Answer : b
107. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed
for which of the following cipher systems?
a) Fortezza b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman d) RSA
Answer : c
Answer : c
110. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
a) 42 bytes b) 32 bytes c) 36 bytes d) 48 bytes
Answer : c
111. The certificate_request massage includes two parameters, one of which is-
a) certificate_extension b) certificate_creation
c) certificate_exchange d) certificate_type
Answer : d
112. The client_key_exchange message uses a pre master key of size –
a) 48 bytes b) 56 bytes c) 64 bytes d) 32 bytes
Answer : a
113. The certificate_verify message involves the process defined by the pseudo-code (in terms of
MD5) –
CertificateVerify.signature.md5_hash = MD5(master_secret || pad_2 || MD5(handshake_messages ||
master_secret || pad_1). Is there any error? If so, what is it?
a) Yes. pad_1 and pad_2 should be interchanged
b) Yes. pad’s should be present towards the end
c) Yes. master_key should not be used, the pre_master key should be used
d) No Error
Answer : d
114. In the handshake protocol which is the message type first sent between client and server ?
a) server_hello b) client_hello
c) hello_request d) certificate_request
Answer : b
115. n the SSLv3 the padding bits are ____________ with the secret key.
a) Padded b) XORed c) Concatenated d) ANDed
Answer : c
116. Which of the following is not a valid input to the PRF in SSLv3?
a) secret value b) identifying label
c) initialization vector d) secret value
Answer : c
118. We encounter the record_overflow error when the payload length exceeds –
a) 214 + 1024 b) 216 + 1024
c) 214 + 2048 d) 216 + 2048
Answer : c
120. Calculation of the certificate_verify in TLS involves the use of a finished_label. The
finished_label is the string-
a) client finished for the client
b) client finished for the client, server finished for the server
c) server finished for the server
d) client finished for the server, server finished for the client
Answer : b
123. An HTTP connection uses port _________ whereas HTTPS uses port ____________ and
invokes SSL.
a) 40; 80 b) 60; 620 c) 80; 443 d) 620; 80
Answer : c
126. How many trust models does the RFC 4251 dictate?
a) 2 b) 3 c) 4 d) 5
Answer : a
127. Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges?
a) Algorithm Negotiation; End of key exchange; Service request; Identification string exchange
b) Identification string exchange; Algorithm Negotiation; End of key exchange; Service request
c) Identification string exchange; End of key exchange; Service request; Algorithm Negotiation
d) Algorithm Negotiation; Identification string exchange; End of key exchange; Service request
Answer : b
128. The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –
a) Compression; Encryption; Padding and Addition of seq bits
b) Compression; Padding and Addition of seq bits; Encryption
c) Encryption; Padding and Addition of seq bits; Compression
d) Padding and Addition of seq bits; Encryption; Compression
Answer : b
130. Which one of the following does not undergo the encryption procedure?
a) pdl b) pktl c) seq# d) padding
Answer : c
131. What is the recommended cryptographic algorithm for the Secure Shell Transport Layer?
a) twofish 128 b) aes 192 c) aes 128 d) blowfish
Answer : c
132. What is the recommended modes of operation for encryption and decryption in the Secure
Shell Transport Layer?
a) ECB b) OFB c) CBC d) CFB
Answer : c
133. What is the recommended MAC algorithm for the SSH Transport Layer?
a) HMAC – MD5 b) HMAC – MD5 – 96
c) HMAC SHA1 – 96 d) HMAC SHA1
Answer : c
134. Which port forwarding technique intercepts application-level traffic and redirects it from an
insecure TCP connections to secure SSH tunnels?
a) Remote Forwarding b) Local Forwarding
c) Stable Forwarding d) None of the mentioned
Answer : b
135. The protocol ‘POP’ stands for-
a) Personal Office Protocol b) Post Office Protocol
c) Privacy Overall Protocol d) Privacy Over Protocol
Answer : b
136.In which port forwarding technique does the client act on the server’s behalf?
a. Remote Forwarding b. Local Forwarding
c. Stable Forwarding d. None of the mentioned
Answer : a
137. Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash
computation.
a. 1024 b. 512 c. 256 d.1248
Answer : a
138. When a hash function is used to provide message authentication, the hash function value is
called to as:
a. Message Field b. Message Digest
c. Message Score d. Message Leap
Answer : b
139. Which of the following are used to create a message digest by the network security protocols?
a. RSA b. SHA-1 c. DES d. MD5
Answer : b
140. What is the output of the N 1024-bit blocks from the Nth stage in this?
a. 512 bits b. 1024 bits c. N x 1024bits d. N x 512 bits
Answer : a
142. A hash function is a _____ that converts a numerical input value into another compressed
numerical value.
a. Abstract view b. Mathematical function
c. Both A and B d. None of the mentioned above
Answer : b
145. Digital Signatures authenticates the sender by appending the original message with the ____
digest.
a. Decrypted message b. Encrypted message
c. Systematic approach d. None of the mentioned above
Answer : b
146. What is the block size of plain text in SHA- 512 algorithm?
a. 512 bits b. 1024 bits c. 2048 bits d. None of the above
Answer : b
147. How many sub-keys in the total are used by the IDEA for encrypting the plain text into
ciphertext?
a. 64 sub- keys b. 48 sub- keys
c. 52 sub- keys d. Only one key and no subkeys
Answer : c
148. "The number of rounds in the AES algorithm depends upon the key size being used."
Which among the following shows a correct relation between the size of the key used and the
number of rounds performed in the AES algorithm?
a. 128 key size: 10 rounds b. 192 key size: 12 rounds
c. 256 key size: 14 rounds d. All of the above
Answer : d
149. Which of the following properties are the characteristic properties of a block cipher technique
which differs from stream cipher?
a. Avalanche effect b. Completeness
c. Both a. and b. d. None of the above
Answer : c
150. Encryption algorithms are divided into two categories based on the ______.
a. Output type b. Input type
c. Process type d. All of the mentioned above
Answer : b
152. Cipher Feedback Mode is given as feedback to the ____ of encryption with some new
specifications.
a. Next block b. Previous block
c.Middle block d. All of the mentioned above
Answer : a
153. In the AES-128 algorithm there are mainly __________ similar rounds and _________ round
is different from other round.
a. 5 similar rounds having 2 pair ; every alternate b. 9 ; the last
c. 8 ; the first and last d. 10 ; no
Answer : b
154. Which of the following modes of operation in DES is used for operating?
a. Cipher Feedback Mode (CFB) b. Cipher Block chaining (CBC)
c. Electronic code book (ECB) d. Output Feedback Modes (OFB)
Answer : c
155. Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find
ciphertext. The Ciphertext is:
a. 42 b. 93 c. 114 d. 103
Answer : c
156. Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.
a. 16 bits b. 64 bits c. 32 bits d. All of the mentioned above
Answer : b
157. The process of decryption of an AES ciphertext is similar to the encryption process in the
______.
a. Reverse order b. Next order
c. Both A and B d. All of the mentioned above
Answer : a
159. Amongst which of the following is / are true with reference to the rounds in AES –
a. Byte Substitution b. Shift Row
c. Mix Column and Key Addition d. All of the mentioned above
Answer : d
160. Which of the following is a mode of operation for the Block ciphers in cryptography?
a. Electronic Code Book (ECB) b. Cipher Block Chaining (CBC)
c. Counter (CTR) mode d. All of the above
Answer : d
161. For which of the following should EBC (Electronic Code Book) process not be used for
encryption?
a. For large block sizes b. For fixed block sizes
c. For small block sizes d. None of the above
Answer : c
162. Which of the following options is not correct according to the definition of the Cipher Block
Chaining (CBC)?
a. CBC is a mode of operation for stream ciphers.
b. Initialization vector (IV) is used in CBC in the initial phase.
c. It has better resistive nature towards cryptanalysis than ECB
d. None of the above
Answer : c
163. Which of the following modes of operations can be followed for both stream ciphers as well as
block ciphers?
a. CBC (Cipher Block Chaining) b. ECB (Electronic Code Book)
c. CFB (Cipher text Feed Back) d. All of the above
Answer : c
164. Amongst which of the following is/ are showing the goodness of electronic code book,
a. Parallel encryption of blocks of bits is possible b. It is a faster way of encryption.
c. Simple way of the block cipher. d. All of the mentioned above
Answer : d
165. In Cipher block chaining mode, the current plaintext block is added to the ____.
a. Previous ciphertext block b. Next ciphertext block
c. Middle ciphertext block d. None of the mentioned above
Answer : a
166. With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,
a. Each ciphertext block gets 'fed back' into the encryption process
b. Encrypt the next plaintext block
c. Both A and B
d. None of the mentioned above
Answer : c
167. An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several
modes to _____.
a. Randomize the decryption b. Randomize the encryption
c. Minimize and maximize the randomization d. None of the mentioned above
Answer : b
169. Trusted TCP/IP commands have the same needs & go through the identical verification
process. Which of them is not a TCP/IP command?
a. ftp b. rexec c. tcpexec d. telnet
Answer : c
170. Connection authentication is offered for ensuring that the remote host has the likely Internet
Protocol (IP) ___________ & _________
a. address, name b. address, location
c. network, name d. network, location
Answer : a
173. ____________ is an attack where the attacker is able to guess together with the sequence
number of an in progress communication session & the port number.
a. TCP Spoofing b. TCP Blind Spoofing
c. IP Spoofing d. IP Blind Spoofing
Answer : b
174. ___________ is an attack technique where numerous SYN packets are spoofed with a bogus
source address which is then sent to an inundated server.
a. SYN flooding attack b .ACK flooding attack.
c. SYN & ACK flooding attack d. Packet flooding attack
175. Which of them is not an attack done in the network layer of the TCP/IP model?
a. MITM attack b. DoS attack
c. Spoofing attack d. Shoulder surfing
Answer : d
177. Which 2 protocols are used in the Transport layer of the TCP/IP model?
a. UDP and HTTP b. TCP and UDP
c. HTTP and TCP d. ICMP and HTTP
Answer : b
178. Which of the protocol is not used in the network layer of the TCP/IP model?
a. ICMP b. IP c. IGMP d. HTTP
Answer : d
181. We are provided the plain text “SUN”. You need to convert the given plain text into ciphertext
under the Ceasar cipher encryption technique. Which of the following options is the correct
ciphertext for the given text if the key is 2?
a. UWP b. NUS c. WUP d. QSL
Answer : a
182. Which of the following cannot be chosen as a key in the Caesar cipher?
a. An integer b. An alphabet (A-Z or a-z)
c. A string d. None of the above
Answer : c
185. ____ is the message or data that can be readable by the sender.
a. Edited b. Main Text
c. Plain text d. All of the mentioned above
Answer : c
186. In the case of symmetric key encryption, the secret key that both the parties possess can be
anything such as a _______.
a. Passcode or a password b. Developed code
c. Network set d. None of the mentioned above
Answer : a
187. The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the
following properties are not shown by the fiestal structure?
a. The input text is divided into two parts: one being left half and another one being right half.
b. Swapping of the left and right halves are performed after each round.
c. The plain text is converted into a matrix form first
d. None of the above
Answer : c
188. Among the following given options, chose the strongest encryption technique?
a. DES ( Data Encryption Standard) b. Double DES
c. Triple DES d. AES (Advance Encryption Standard)
Answer : d
194. "A key is a string of bits used by a cryptographic algorithm to transform plain text into
ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?
a. An integer values b. A square matrix
c. An array of characters (i.e. a string) d. All of the above
Answer : d
196. To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
a. Word, number, or phrase b. Special Symbols
c. Function Keys d. All of these
Answer : a
Answer : c