MCQ 1 Which 2 protocols are used in the Transport layer of the TCP/IP model?

Correct Answer Choice D TCP and UDP
See Answer

MCQ 2 Which can be divided into monoalphabetic and polyalphabetic.

Correct Answer Choice B Substitution Technique
See Answer

MCQ 3 An ____________ algorithm transforms plain text to cipher text

Correct Answer Choice B encryption
See Answer

MCQ 4 FTP runs on _____________.

Correct Answer Choice D All of the above
See Answer


MCQ 5 https stands for _____________.

Correct Answer Choice B Secure
See Answer

MCQ 6 ____________ is the science and art of transforming messages to meke them secure and immune to attacks.

Correct Answer Choice B Cryptography
See Answer

MCQ 7 An ____________ algorithm transforms cipher text to plain text

Correct Answer Choice A description
See Answer

MCQ 8 What is the maximum speed of modem is _____________.

Correct Answer Choice B 56 kbps
See Answer


MCQ 9 DES stands for _____________________.

Correct Answer Choice D Data Encryption Standard
See Answer

MCQ 10 Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

Correct Answer Choice C They help understands security and its components better
See Answer

MCQ 11 Using RSA algorithm, convert the plain text AAAAAAA into cypher text using the conversion values as p=3, q=11, n=pq, d=7.

Correct Answer Choice A BUTAEEZ
See Answer

MCQ 12 Match the following List 1 and 2 :

List - 1 List - 2 A. Application layer 1. HDLC B. Transport layer 2. TCP C. Network layer 3. HTTP D. Data link layer 4. BGP

Correct Answer Choice D Application layer → HTTP, Transport layer → TCP, Network layer → BGP, Data link layer → HDLC
See Answer


MCQ 13 ______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

Correct Answer Choice A Phishing attack
See Answer

MCQ 14 Is the statement "Active sniffing is difficult to detect." is true or false.

Correct Answer Choice B False
See Answer

MCQ 15 The combination of key exchange, hash, and algorithms defines a ___________ for each SSL section.

Correct Answer Choice B cipher suite
See Answer

MCQ 16 Data which is easily readable & understandable without any special algorithm or method is called _________________.

Correct Answer Choice B plain text
See Answer


MCQ 17 Data Encryption Techniques are particularly used for _______________.

Correct Answer Choice A protecting data in Data Communication System
See Answer

MCQ 18 Which method replace one character with another character?

Correct Answer Choice A Substitution Technique
See Answer

MCQ 19 The ______________ is the original message before transformation.

Correct Answer Choice B plain text
See Answer

MCQ 20 The size of the IPV4 is _____________.

Correct Answer Choice B 32 Bits
See Answer


MCQ 21 Which is the part of IP_____________.

Correct Answer Choice D All of the above
See Answer

MCQ 22 The combination of key exchange, hash, and algorithms defines a ___________ for each SSL section.

Correct Answer Choice B cipher suite
See Answer

MCQ 23 _______________________________ ensures that sensitive information are accessed only by an authorized person and kept away from those not authorized to possess them.

Correct Answer Choice A Availability
See Answer

MCQ 24 Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?

Correct Answer Choice C Session layer
See Answer


MCQ 25 ____________ protocol attack is done in the data-link layer.

Correct Answer Choice D DNS
See Answer

NTSE, NEET, AIEEE, Olympiad & Other Competive Exams Preparation

Publish Your Article / Write for Us

Article Writing Guide/Help

Trending Questions


Advantages Of NCERT, CBSE & State Boards Solutions For All Subjects

  • All the NCERT Solutions have been prepared by academic experts having 10+ years of teaching experience.
  • They have prepared all the solutions in simple and easy language, so that each and every student can understand the concepts easily.
  • All the solutions have been explained step to step wise in details with better explainations.
  • Students can also use these question and answers for your assignments and in homework help.
  • All the solutions have been explained in detail and the answers have been compiled in a step-wise manner.
  • All the question and asnwers are commonly prepared according to the Latest Syllabus of Board Education and Guidelines.
  • Students can know about the various types of questions asked in the exams with the help of these solutions.

Top Course Categories