MCQ 1 Internet works on _______
MCQ 2 A substitution cipher substitutes one symbol with ______________.
MCQ 3 A straight permutation cipher or a straight P-box has the same number of inputs as.
MCQ 4 An electronic document that establishes your credentials when you are performing transactions.
MCQ 5 The internet aothorities have recrived the address for ________________.
MCQ 6 The design issue of Datalink Layer in OSI Reference Model is
MCQ 7 __________________ is the process of identifying an individual, usually based on a username and password.
MCQ 8 _________________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.
MCQ 9 In Cryptography, the original message, before being transformed, is called ____________________.
MCQ 10 In which of the following encryption key is used to encrypt and decrypt the data ?
MCQ 11 The Cryptography can provide
MCQ 12 The Cryptography can provide
MCQ 13 The procedure to add bits to the last block is termed as _________________.
MCQ 14 Which of the following is not a secured mail transferring methodology?
MCQ 15 Which of these is not a proper method of maintaining confidentiality?
MCQ 16 Plain text are also called _____________.
MCQ 17 A cryptosystem is also termed as ______________.
MCQ 18 Algorithm-Based Phishing was developed in the year ______________.
MCQ 19 Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?
MCQ 20 Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).
MCQ 21 Cryptography offers a set of required security services. Which of the following is not among that 4 required security services?
MCQ 22 ____________________ is a mathematical algorithm that produces a unique plain text for a given cipher text along with a decryption key.
MCQ 23 Conventional cryptography is also known as _____________ or symmetric-key encryption.
MCQ 24 ___________________ is the process of giving individuals access to system objects based on their identity.
MCQ 25 Data Encryption Standard (DES), was designed by