MCQ 1 Which 2 protocols are used in the Transport layer of the TCP/IP model?
MCQ 2 Which can be divided into monoalphabetic and polyalphabetic.
MCQ 3 An ____________ algorithm transforms plain text to cipher text
MCQ 4 FTP runs on _____________.
MCQ 5 https stands for _____________.
MCQ 6 ____________ is the science and art of transforming messages to meke them secure and immune to attacks.
MCQ 7 An ____________ algorithm transforms cipher text to plain text
MCQ 8 What is the maximum speed of modem is _____________.
MCQ 9 DES stands for _____________________.
MCQ 10 Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
MCQ 11 Using RSA algorithm, convert the plain text AAAAAAA into cypher text using the conversion values as p=3, q=11, n=pq, d=7.
MCQ 12 Match the following List 1 and 2 :
List - 1 List - 2 A. Application layer 1. HDLC B. Transport layer 2. TCP C. Network layer 3. HTTP D. Data link layer 4. BGP
MCQ 13 ______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
MCQ 14 Is the statement "Active sniffing is difficult to detect." is true or false.
MCQ 15 The combination of key exchange, hash, and algorithms defines a ___________ for each SSL section.
MCQ 16 Data which is easily readable & understandable without any special algorithm or method is called _________________.
MCQ 17 Data Encryption Techniques are particularly used for _______________.
MCQ 18 Which method replace one character with another character?
MCQ 19 The ______________ is the original message before transformation.
MCQ 20 The size of the IPV4 is _____________.
MCQ 21 Which is the part of IP_____________.
MCQ 22 The combination of key exchange, hash, and algorithms defines a ___________ for each SSL section.
MCQ 23 _______________________________ ensures that sensitive information are accessed only by an authorized person and kept away from those not authorized to possess them.
MCQ 24 Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?
MCQ 25 ____________ protocol attack is done in the data-link layer.