MCQ 1 Internet works on _______

Correct Answer Choice A packet switching
See Answer

MCQ 2 A substitution cipher substitutes one symbol with ______________.

Correct Answer Choice B Others
See Answer

MCQ 3 A straight permutation cipher or a straight P-box has the same number of inputs as.

Correct Answer Choice C Outputs
See Answer

MCQ 4 An electronic document that establishes your credentials when you are performing transactions.

Correct Answer Choice D Digital Certificate
See Answer


MCQ 5 The internet aothorities have recrived the address for ________________.

Correct Answer Choice D None of the Above
See Answer

MCQ 6 The design issue of Datalink Layer in OSI Reference Model is

Correct Answer Choice A Representation of bits
See Answer

MCQ 7 __________________ is the process of identifying an individual, usually based on a username and password.

Correct Answer Choice A Authentication
See Answer

MCQ 8 _________________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.

Correct Answer Choice B Shift Cipher
See Answer


MCQ 9 In Cryptography, the original message, before being transformed, is called ____________________.

Correct Answer Choice C Cipher text
See Answer

MCQ 10 In which of the following encryption key is used to encrypt and decrypt the data ?

Correct Answer Choice C Private key
See Answer

MCQ 11 The Cryptography can provide

Correct Answer Choice D All of the above
See Answer

MCQ 12 The Cryptography can provide

Correct Answer Choice D All of the above
See Answer


MCQ 13 The procedure to add bits to the last block is termed as _________________.

Correct Answer Choice D hashing
See Answer

MCQ 14 Which of the following is not a secured mail transferring methodology?

Correct Answer Choice C POP3
See Answer

MCQ 15 Which of these is not a proper method of maintaining confidentiality?

Correct Answer Choice C switching off the phone
See Answer

MCQ 16 Plain text are also called _____________.

Correct Answer Choice C clear-text
See Answer


MCQ 17 A cryptosystem is also termed as ______________.

Correct Answer Choice B cipher system
See Answer

MCQ 18 Algorithm-Based Phishing was developed in the year ______________.

Correct Answer Choice C 1990
See Answer

MCQ 19 Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?

Correct Answer Choice C Session layer
See Answer

MCQ 20 Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).

Correct Answer Choice A 1
See Answer


MCQ 21 Cryptography offers a set of required security services. Which of the following is not among that 4 required security services?

Correct Answer Choice D Steganography
See Answer

MCQ 22 ____________________ is a mathematical algorithm that produces a unique plain text for a given cipher text along with a decryption key.

Correct Answer Choice A Decryption Algorithm
See Answer

MCQ 23 Conventional cryptography is also known as _____________ or symmetric-key encryption.

Correct Answer Choice A secret-key
See Answer

MCQ 24 ___________________ is the process of giving individuals access to system objects based on their identity.

Correct Answer Choice B Authorization
See Answer


MCQ 25 Data Encryption Standard (DES), was designed by

Correct Answer Choice B IBM
See Answer

NTSE, NEET, AIEEE, Olympiad & Other Competive Exams Preparation

Publish Your Article / Write for Us

Article Writing Guide/Help

Trending Questions


Advantages Of NCERT, CBSE & State Boards Solutions For All Subjects

  • All the NCERT Solutions have been prepared by academic experts having 10+ years of teaching experience.
  • They have prepared all the solutions in simple and easy language, so that each and every student can understand the concepts easily.
  • All the solutions have been explained step to step wise in details with better explainations.
  • Students can also use these question and answers for your assignments and in homework help.
  • All the solutions have been explained in detail and the answers have been compiled in a step-wise manner.
  • All the question and asnwers are commonly prepared according to the Latest Syllabus of Board Education and Guidelines.
  • Students can know about the various types of questions asked in the exams with the help of these solutions.

Top Course Categories