MCQ 1 An electronic document that establishes your credentials when you are performing transactions.

Correct Answer Choice D Digital Certificate
See Answer

MCQ 2 In an _____________ cipher, the same key is used by both the sender and the receiver.

Correct Answer Choice A Symmetric Key
See Answer

MCQ 3 What is the full form of SMTP?

Correct Answer Choice A Simple mail transfer protocol
See Answer

MCQ 4 Full form of POP is _____________.

Correct Answer Choice A Post office protocol
See Answer


MCQ 5 In an ____________ ciphert text , a pair of keys is used.

Correct Answer Choice A Symmetric Key
See Answer

MCQ 6 A __________ is actually at IETF version of ________________.

Correct Answer Choice D TLS, SSL
See Answer

MCQ 7 Plain text are also called _____________.

Correct Answer Choice C clear-text
See Answer

MCQ 8 What is the port number of http.

Correct Answer Choice D 25
See Answer


MCQ 9 The ________________ has piece of the keyword that has the same length as that of the plaintext.

Correct Answer Choice B One-time pad
See Answer

MCQ 10 In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.

Correct Answer Choice C Block Cipher
See Answer

MCQ 11 A set of all probable decryption keys are collectively termed as ____________.

Correct Answer Choice C key bunch
See Answer

MCQ 12 Cryptography offers a set of required security services. Which of the following is not among that 4 required security services?

Correct Answer Choice D Steganography
See Answer


MCQ 13 IP address 123.23.156.4 belongs to ____________ format.

Correct Answer Choice A A class
See Answer

MCQ 14 An HTTP connection uses port ________________ whereas HTTPS uses port ________________ and invokes SSL.

Correct Answer Choice C 80; 443
See Answer

MCQ 15 ____________ protocol attack is done in the data-link layer.

Correct Answer Choice D DNS
See Answer

MCQ 16 Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________  and  _____________.

Correct Answer Choice A address, name
See Answer


MCQ 17 Which of the following is not an example or type of phishing?

Correct Answer Choice D Monkey in the Middle
See Answer

MCQ 18 The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as ________________.

Correct Answer Choice B decryption
See Answer

MCQ 19 Data integrity gets compromised when ____________ and ____________ are taken control off.

Correct Answer Choice C Access control, file permission
See Answer

MCQ 20 In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.

Correct Answer Choice B Playfair Cipher
See Answer


MCQ 21 Cookies were originally designed for _______________.

Correct Answer Choice D Web programming
See Answer

MCQ 22 Full form of PEM.

Correct Answer Choice A Privacy Enhanced Mail
See Answer

MCQ 23 A set of all probable decryption keys are collectively termed as key space.

Correct Answer Choice A True
See Answer

MCQ 24 In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

Correct Answer Choice B Stream cipher
See Answer


MCQ 25 The Data Encryption Standard (DES) was designed by

Correct Answer Choice D Oracle
See Answer

NTSE, NEET, AIEEE, Olympiad & Other Competive Exams Preparation

Publish Your Article / Write for Us

Article Writing Guide/Help

Trending Questions


Advantages Of NCERT, CBSE & State Boards Solutions For All Subjects

  • All the NCERT Solutions have been prepared by academic experts having 10+ years of teaching experience.
  • They have prepared all the solutions in simple and easy language, so that each and every student can understand the concepts easily.
  • All the solutions have been explained step to step wise in details with better explainations.
  • Students can also use these question and answers for your assignments and in homework help.
  • All the solutions have been explained in detail and the answers have been compiled in a step-wise manner.
  • All the question and asnwers are commonly prepared according to the Latest Syllabus of Board Education and Guidelines.
  • Students can know about the various types of questions asked in the exams with the help of these solutions.

Top Course Categories