MCQ 1 _______________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another letter in creating the cipher-text.

Correct Answer Choice B Caesar Cipher
See Answer

MCQ 2 In public key cryptography, a key that decrypts the message.

Correct Answer Choice D private key
See Answer

MCQ 3 An _____________ is a private network that uses the internet model.

Correct Answer Choice C intranets
See Answer

MCQ 4 The shift cipher is sometimes referred to as the

Correct Answer Choice D Caesar cipher
See Answer


MCQ 5 Which protocol is used to convey SSL related alerts to the peer entity?

Correct Answer Choice A Alert Protocol
See Answer

MCQ 6 Which of them is not an objective of sniffing for hackers?

Correct Answer Choice D Geographic location of a user
See Answer

MCQ 7 The full form of OSI is OSI model is ______________

Correct Answer Choice A Open Systems Interconnection
See Answer

MCQ 8 ________________ provides either authentication or encryption, or both, for packets at the IP level.

Correct Answer Choice B ESP
See Answer


MCQ 9 In general how many key elements constitute the entire security structure?

Correct Answer Choice D 4
See Answer

MCQ 10 _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

Correct Answer Choice D Reverse engineering
See Answer

MCQ 11 These ciphers replace a character or characters with a different character or characters, based on some key.

Correct Answer Choice D Mono alphabetic substitution based
See Answer

MCQ 12 Users are able to see a pad-lock icon in the address bar of the browser when there is _________________ connection.

Correct Answer Choice B HTTPS
See Answer


MCQ 13 _____________ is data interception method used by hackers.

Correct Answer Choice A Phishing
See Answer

MCQ 14 Which of the following is not a strong security protocol?

Correct Answer Choice C smtp
See Answer

MCQ 15 Which is not the application level protocol?

Correct Answer Choice A FTP
See Answer

MCQ 16 In an ________________ , the key is known as SECRET Key.

Correct Answer Choice B Symmetric Key
See Answer


MCQ 17 The subnet Mask 255.255.0.0 belongs to _____________.

Correct Answer Choice B Class B
See Answer

MCQ 18 Caesar Cipher is an example of _____________.

Correct Answer Choice B Bi-alphabetic Cipher
See Answer

MCQ 19 AES stands for ________________.

Correct Answer Choice B Advanced Encryption Standard
See Answer

MCQ 20 _________________ is a term used in cryptography that refers to a message before encryption or after decryption.

Correct Answer Choice D Plain text
See Answer


MCQ 21 ________________ provides privacy, integraty, and authentication in email.

Correct Answer Choice B PGP
See Answer

MCQ 22 SSL provies _______________.

Correct Answer Choice D All of the above
See Answer

MCQ 23 On which port will the server generally listen to for SMTP?

Correct Answer Choice C 25
See Answer

MCQ 24 The __________________ is encrypted text.

Correct Answer Choice A cipher text
See Answer


MCQ 25 Sniffing is also known as ___________________.

Correct Answer Choice B wiretapping
See Answer

NTSE, NEET, AIEEE, Olympiad & Other Competive Exams Preparation

Publish Your Article / Write for Us

Article Writing Guide/Help

Trending Questions


Advantages Of NCERT, CBSE & State Boards Solutions For All Subjects

  • All the NCERT Solutions have been prepared by academic experts having 10+ years of teaching experience.
  • They have prepared all the solutions in simple and easy language, so that each and every student can understand the concepts easily.
  • All the solutions have been explained step to step wise in details with better explainations.
  • Students can also use these question and answers for your assignments and in homework help.
  • All the solutions have been explained in detail and the answers have been compiled in a step-wise manner.
  • All the question and asnwers are commonly prepared according to the Latest Syllabus of Board Education and Guidelines.
  • Students can know about the various types of questions asked in the exams with the help of these solutions.

Top Course Categories