MCQ 1 An electronic document that establishes your credentials when you are performing transactions.
MCQ 2 In an _____________ cipher, the same key is used by both the sender and the receiver.
MCQ 3 What is the full form of SMTP?
MCQ 4 Full form of POP is _____________.
MCQ 5 In an ____________ ciphert text , a pair of keys is used.
MCQ 6 A __________ is actually at IETF version of ________________.
MCQ 7 Plain text are also called _____________.
MCQ 8 What is the port number of http.
MCQ 9 The ________________ has piece of the keyword that has the same length as that of the plaintext.
MCQ 10 In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.
MCQ 11 A set of all probable decryption keys are collectively termed as ____________.
MCQ 12 Cryptography offers a set of required security services. Which of the following is not among that 4 required security services?
MCQ 13 IP address 123.23.156.4 belongs to ____________ format.
MCQ 14 An HTTP connection uses port ________________ whereas HTTPS uses port ________________ and invokes SSL.
MCQ 15 ____________ protocol attack is done in the data-link layer.
MCQ 16 Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ and _____________.
MCQ 17 Which of the following is not an example or type of phishing?
MCQ 18 The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as ________________.
MCQ 19 Data integrity gets compromised when ____________ and ____________ are taken control off.
MCQ 20 In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
MCQ 21 Cookies were originally designed for _______________.
MCQ 22 Full form of PEM.
MCQ 23 A set of all probable decryption keys are collectively termed as key space.
MCQ 24 In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.
MCQ 25 The Data Encryption Standard (DES) was designed by