MCQ 1 In an asymmetric key cipher, both the receivers uses _____________.

Correct Answer Choice A private key
See Answer

MCQ 2 Which of the following is not an example of presentation layer issues?

Correct Answer Choice A Weak or non-existent authentication mechanisms
See Answer

MCQ 3 Using the following values of a character M = 5, p = 3, q = 11 & d = 7, Find the the value of cipher text C by RSA Algorithm.

Correct Answer Choice C 26
See Answer

MCQ 4 A cryptosystem is also termed as ______________.

Correct Answer Choice B cipher system
See Answer


MCQ 5 A _______________ network is used inside an organisation.

Correct Answer Choice A private
See Answer

MCQ 6 Encryption and Decryption is the responsibility of __________________ Layer.

Correct Answer Choice A Application
See Answer

MCQ 7 The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and _________________.

Correct Answer Choice D key Size
See Answer

MCQ 8 ________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain text remains fixed all through the encryption procedure.

Correct Answer Choice C Monoalphabetic Cipher
See Answer


MCQ 9 Cryptographic algorithms are based on mathematical algorithms where these algorithms use _____________ for a secure transformation of data.

Correct Answer Choice A secret key
See Answer

MCQ 10 _______________ is the art & science of cracking the cipher-text without knowing the key.

Correct Answer Choice B Cryptanalysis
See Answer

MCQ 11 _______________ provide security at the transport layer.

Correct Answer Choice D Both A and B
See Answer

MCQ 12 Which 2 protocols are used in the Transport layer of the TCP/IP model?

Correct Answer Choice D TCP and UDP
See Answer


MCQ 13 An _____________ is a network that allows and authorised access from outside users of the whole world.

Correct Answer Choice A extranets
See Answer

MCQ 14 Which of the following is not a vulnerability of the application layer?

Correct Answer Choice B Inadequate security controls force “all-or-nothing” approach
See Answer

MCQ 15 Data Encryption Standard is an example of a _____________ cryptosystem.

Correct Answer Choice A conventional
See Answer

MCQ 16 In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.

Correct Answer Choice B Asymmetric Key Encryption
See Answer


MCQ 17 What is the port number of http.

Correct Answer Choice C 25
See Answer

MCQ 18 In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

Correct Answer Choice B Stream cipher
See Answer

MCQ 19 Encryption-decryption in cryptosystem is done in ___________________ ways.

Correct Answer Choice A 2
See Answer

MCQ 20 __________________ cryptography has always been focussing on the concept of ‘security through obscurity’.

Correct Answer Choice C Classic
See Answer


MCQ 21 When plain text is converted to unreadable format, it is termed as _____________.

Correct Answer Choice B cipher-text
See Answer

MCQ 22 A type of cipher that uses multiple alphabetic strings.

Correct Answer Choice A Polyalphabetic substitution based
See Answer

MCQ 23 Which of the protocol is not susceptible to sniffing?

Correct Answer Choice D tcp
See Answer

MCQ 24 _____________ are programs or devices that capture the vital information from the target network or particular network.

Correct Answer Choice C Sniffers
See Answer


MCQ 25 An ______________________ along with a key is used in the encryption and decryption of data.,

Correct Answer Choice C encryption algorithm
See Answer

NTSE, NEET, AIEEE, Olympiad & Other Competive Exams Preparation

Publish Your Article / Write for Us

Article Writing Guide/Help

Trending Questions


Advantages Of NCERT, CBSE & State Boards Solutions For All Subjects

  • All the NCERT Solutions have been prepared by academic experts having 10+ years of teaching experience.
  • They have prepared all the solutions in simple and easy language, so that each and every student can understand the concepts easily.
  • All the solutions have been explained step to step wise in details with better explainations.
  • Students can also use these question and answers for your assignments and in homework help.
  • All the solutions have been explained in detail and the answers have been compiled in a step-wise manner.
  • All the question and asnwers are commonly prepared according to the Latest Syllabus of Board Education and Guidelines.
  • Students can know about the various types of questions asked in the exams with the help of these solutions.

Top Course Categories