MCQ 1 _______________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another letter in creating the cipher-text.
MCQ 2 In public key cryptography, a key that decrypts the message.
MCQ 3 An _____________ is a private network that uses the internet model.
MCQ 4 The shift cipher is sometimes referred to as the
MCQ 5 Which protocol is used to convey SSL related alerts to the peer entity?
MCQ 6 Which of them is not an objective of sniffing for hackers?
MCQ 7 The full form of OSI is OSI model is ______________
MCQ 8 ________________ provides either authentication or encryption, or both, for packets at the IP level.
MCQ 9 In general how many key elements constitute the entire security structure?
MCQ 10 _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
MCQ 11 These ciphers replace a character or characters with a different character or characters, based on some key.
MCQ 12 Users are able to see a pad-lock icon in the address bar of the browser when there is _________________ connection.
MCQ 13 _____________ is data interception method used by hackers.
MCQ 14 Which of the following is not a strong security protocol?
MCQ 15 Which is not the application level protocol?
MCQ 16 In an ________________ , the key is known as SECRET Key.
MCQ 17 The subnet Mask 255.255.0.0 belongs to _____________.
MCQ 18 Caesar Cipher is an example of _____________.
MCQ 19 AES stands for ________________.
MCQ 20 _________________ is a term used in cryptography that refers to a message before encryption or after decryption.
MCQ 21 ________________ provides privacy, integraty, and authentication in email.
MCQ 22 SSL provies _______________.
MCQ 23 On which port will the server generally listen to for SMTP?
MCQ 24 The __________________ is encrypted text.
MCQ 25 Sniffing is also known as ___________________.