MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
Cryptography And Network Security
Quiz 1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
The value ofmod 7 is(use fermat's theorem)
3
4
8
9
Q.2
Who created PGP?
phil zimmermann
tim berners-lee
marc andreessen
ken thompson
Q.3
What is the PGP stand for?
permuted gap permission
permuted great privacy
pretty good privacy
none of the mentioned
Q.4
Encryption Strength is based on
strength of algorithm
secrecy of key
length of key
all of the above
Q.5
Why did SSL certificate require inHTTP?
for making security weak
for making information movefaster
for encrypted data sent overhttp protocol
for sending and receivingemails unencrypted
Q.6
The full form of Malware is
malfunctioned software
multipurpose software
malicious software
malfunctioning of security
Q.7
Which of the following is not a type of symmetric-key cryptography technique?
caesar cipher
data encryption standard (des)
diffie hellman cipher
playfair cipher
Q.8
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfersthe cookie to that website.
true
false
Q.9
Which of the following is a non-technicaltype of intrusion or attack technique?
reverse engineering
malware analysis
social engineering
malware writing
Q.10
In RSA, Ф(n) = in terms of p and q
(p)/(q)
(p)(q)
(p-1)(q-1)
(p+1)(q+1)
Q.11
SSL primarily focuses on
integrity and authenticity
integrity and non-repudiation
authenticity and privacy
confidentiality and integrity
Q.12
Which of them is an example ofgrabbing email information?
cookie stealing
reverse engineering
port scanning
banner grabbing
Q.13
What is the block size of RC6 Feistel block cipher?
5013 bits
128 bits
596 bits
1768 bits
Q.14
USENET falls under which category of public key sharing?
public announcement
publicly available directory
public-key authority
public-key certificates
Q.15
Elliptic curve cryptography follows the associative property
true
false
Q.16
What is the key size allowed in PGP?
1024-1056
1024-4056
1024-4096
1024-2048
Q.17
Which of them is not an ideal way ofspreading the virus?
infected website
e-mails
official antivirus cds
usbs
Q.18
What are email security services?
confidentiality
authentication
non-repudation of origin
all of the above
Q.19
Which of them is not an ideal way ofspreading the virus?
infected website
e-mails
official antivirus cds
usbs
Q.20
How many real and imaginary roots does the equation y2=x3-have
2 real, 1 imaginary
all real
all imaginary
2 imaginary, 1 real
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page