300+ Cryptography & Network Security CNS MCQs and Answers

Cryptography and Network Security (CNS) Multiple Choice Questions Quiz

1. A transposition cipher reorders (permutes) symbols in a
A. block of packets
B. block of slots
C. block of signals
D. block of symbols

Answer: D block of symbols

2. Network Security provides authentication and access control for resources.
A. true
B. false

Answer: A true

3. Which is not an objective of network security?
A. identification
B. authentication
C. access control
D. lock

Answer: D lock

4. In symmetric-key cryptography, the key locks and unlocks the box is
A. same
B. shared
C. private
D. public

Answer: A same

5. The keys used in cryptography are
A. secret key
B. private key
C. public key
D. all of them

Answer: D all of them

6. Cryptography, a word with Greek origins, means
A. corrupting data
B. secret writing
C. open writing
D. closed writing

Answer: B secret writing

7. The process of verifying the identity of a user.
A. authentication
B. identification
C. validation
D. verification

Answer: A authentication

8. Which of these is a part of network identification?
A. user id
B. password
C. otp
D. fingerprint

Answer: A user id

9. The process of transforming plain text into unreadable text.
A. decryption
B. encryption
C. network security
D. information hiding

Answer: B encryption

10. An algorithm used in encryption is referred to as cipher.
A. true
B. false

Answer: A trueCryptography and Network Security (CNS) Mcqs

11. A process of making the encrypted text readable again.
A. decryption
B. encryption
C. network security
D. information hiding

Answer: A decryption

 

12. A person who enjoys learning details about computers and how to enhance their capabilities.
A. cracker
B. hacker
C. app controller
D. site controller

Answer: B hacker

13. A small program that changes the way a computer operates.
A. worm
B. trojan
C. bomb
D. virus

Answer: D virus

14. An asymmetric-key (or public-key) cipher uses
A. 1 key
B. 2 key
C. 3 key
D. 4 key

Answer: B 2 key

15. We use cryptofraphy term to transform messages to make them secure and immune to
A. change
B. idle
C. attacks
D. defend

Answer: C attacks

16. In cryptography , the original message before being transformmed , is called
A. simple text
B. plain text
C. empty text
D. filled text

Answer: B plain text

17. A straight permutation cipher or a straight p-box has the same number of input as
A. cipher
B. frames
C. outputs
D. bits

Answer: C outputs

18. The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not
A. authenticated
B. joined
C. submit
D. separate

Answer: A authenticated

19. Which of the following is not a transport layer vulnerability?
A. mishandling of undefined , poorly defined
B. the vulnerability that allows fingerprinting & other enumeration of host information
C. overloading of transporting layer mechanisms
D. unauthorized network access

Answer: D unauthorized network access

20. Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
A. true
B. false

Answer: A true

21. TCP/IP model does not have layer but OSI model have this layer.
A. session layer
B. transport layer
C. application layer
D. network layer

Answer: A session layer

22. In cryptography, what is cipher?
A. algorithm for performing encrption and decryption
B. encrypted message
C. both algorith for performing encrption and decryption and encrypted message
D. decrypted message

Answer: A algorithm for performing encrption and decryption

23. In cryptography, the order of the letters in a message is rearranged by
A. transpositional ciphers
B. substitution ciphers
C. both
D. quadratic ciphers

Answer: A transpositional ciphers

24. What is data encryption standard (DES)?
A. block cipher
B. stream cipher
C. bit cipher
D. byte cipher

Answer: A block cipher

25. Cryptanalysis is used
A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers

Answer: A to find some insecurity in a cryptographic scheme

26. Choose from among the following cipher systems, from best to the worst, with respect to ease of decryption using frequency analysis.
A. random polyalphabetic , plaintext , playfair
B. random polyalphabetic , playfair , vignere
C. random polyalphabetic , vignere , playfair , plaintext
D. random polyalphabetic , plaintext , beaufort , playfair

Answer: C random polyalphabetic , vignere , playfair , plaintext

27. On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text-
A. abqdnwewuwjphfvrrtrfzn sdokvl
B. abqdvmwuwjphfvvyyrf znydokvl
C. tbqyrvmwuwjphfvvyy rfznydokvl
D. baiuvmwuwjphfoeiyrf znydokvl

Answer: B abqdvmwuwjphfvvyyrf znydokvl

28. . Rail Fence Technique is an example of
A. substitution
B. transposition
C. product cipher
D. ceaser cipher

Answer: B transposition

29. Public key encryption is advantageous over Symmetric key Cryptography because of
A. speed
B. space
C. key exchange
D. key length

Answer: C key exchange

30. The sub key length at each round of DES is
A. 32
B. 56
C. 48
D. 64

Answer: B 56

31. Which one is the strong attack mechanism?
A. chosen plaintext attack
B. chosen cipher text
C. brute force attack
D. man in the middle attack

Answer: C brute force attack

32. Interception is an attack on
A. availability
B. confidentiality
C. integrity
D. authenticity

Answer: B confidentiality

33. Chosen cipher text attack is based on
A. cryptanalysis
B. cryptography
C. encryption
D. decryption

Answer: A cryptanalysis

34. The process of writing the text as rows and read it as columns is known as
A. vernam cipher
B. ceaser cipher
C. transposition columnar cipher
D. homophonic substitution cipher

Answer: C transposition columnar cipher

35. Biometric authentication works on the basis of
A. human characteristics
B. passwords
C. smart cards
D. pin

Answer: A human characteristics

36. Which layer filters the proxy firewall?
A. application
B. network
C. transport
D. none of the above

Answer: A application

37. Encryption Strength is based on
A. strength of algorithm
B. secrecy of key
C. length of key
D. all of the above

Answer: D all of the above

38. GCD(a,b) = GCD(b,a mod b)
A. true
B. false
C. cannot be determined
D. none

Answer: A true

39. All groups satisfy properties
A. g-i to g-v
B. g-i to g-iv
C. g-i to r-v
D. r-i to r-v

Answer: C g-i to r-v

40. An Abelian Group satisfies the properties
A. g-i to g-v
B. g-i to g-iv
C. g-i to r-v
D. r-i to r-v

Answer: A g-i to g-v

41. A Ring satisfies the properties
A. r-i to r-v
B. g-i to g-iv
C. g-i to r-v
D. g-i to r-iii

Answer: D g-i to r-iii

42. A Ring is said to be commutative if it also satisfies the property
A. r-vi
B. r-v
C. r-vii
D. r-iv

Answer: D r-iv

43. An ‘Integral Domain’ satisfies the properties
A. g-i to g-iii
B. g-i to r-v
C. g-i to r-vi
D. g-i to r-iii

Answer: C g-i to r-vi

44. Does the set of residue classes (mod 3) form a group with respect to modular addition?
A. yes
B. no
C. can’t say
D. insufficient data

Answer: A yes

45. For the group Sn of all permutations of n distinct symbols, what is the number of elements in Sn?
A. n
B. n-1
C. 2n
D. n!

Answer: D n!

46. a(b+c) = ac+bc is the representation for which property?
A. g-ii
B. g-iii
C. r-ii
D. r-iii

Answer: D r-iii

47. a.(b.c) = (a.b).c is the representation for which property?
A. g-ii
B. g-iii
C. r-ii
D. r-iii

Answer: A g-ii

48. AES uses a bit block size and a key size of bits.
A. 128; 128 or 256
B. 64; 128 or 192
C. 256; 128, 192, or 256
D. 128; 128, 192, or 256

Answer: D 128; 128, 192, or 256

49. Like DES, AES also uses Feistel Structure.
A. true
B. false
C. cannot be determined
D. none

Answer: B false

50. Which one of the following is not a cryptographic algorithm?
A. jupiter
B. blowfish
C. serpent
D. none

Answer: A jupiter

51. If the key is 110100001, the output of the SP network for the plaintext: 101110001 is
A. 110100011
B. 110101110
C. 10110111
D. 11111010

Answer: B 110101110

52. What is the number of possible 3 x 3 affine cipher transformations
A. 168
B. 840
C. 1024
D. 1344

Answer: D 1344

53. What is the expanded key size of AES-192?
A. 44 words
B. 60 words
C. 52 words
D. 36 words

Answer: C 52 words

54. In affine block cipher systems if f(m)=Am + t, what is f(m1+m2+m3) ?
A. f(m1) + f(m2) + f(m3) + t
B. f(m1) + f(m2) + f(m3) +2t
C. f(m1) + f(m2) + f(m3)
D. 2(f(m1) + f(m2) + f(m3))

Answer: C f(m1) + f(m2) + f(m3)

55. The 4×4 byte matrices in the AES algorithm are called
A. states
B. words
C. transitions
D. permutations

Answer: A states

56. If the block size is ‘s’, how many affine transformations are possible ?
A. 2s (2s-1)(2s-1)(2s-12) ………(2s-1(s-1))
B. 2s (2s-1)(2s-2)(2s-22) ………(2s-2(s-2))
C. 2ss (2s-1)(2s-2)(2s-22) ………(2s-2(s-1))
D. 2s (2s-1)(2s-2)(2s-22) ………(2s-2(s-3))

Answer: C 2ss (2s-1)(2s-2)(2s-22) ………(2s-2(s-1))

57. For the AES-128 algorithm there are similar rounds and round is different.
A. 2 pair of 5 similar rounds ; every alternate
B. 9 ; the last
C. 8 ; the first and last
D. 10 ; no

Answer: B 9 ; the last

58. The DES Algorithm Cipher System consists of rounds (iterations) each with a round key
A. 9
B. 12
C. 18
D. 16

Answer: D 16

59. DES follows
A. hash algorithm
B. caesars cipher
C. feistel cipher structure
D. sp networks

Answer: C feistel cipher structure

60. Every cyclic group is .
A. a group with finite order
B. a group with prime order
C. a non abelian group
D. an abelian group

Answer: D an abelian group

61. In the DES algorithm the round key is bit and the Round Input is bits
A. 48, 32
B. 64,32
C. 56, 24
D. 32, 32

Answer: A 48, 32

62. is not a binary operation on the set of natural numbers.
A. addition
B. product
C. difference
D. none

Answer: C difference

63. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via
A. scaling of the existing bits
B. duplication of the existing bits
C. addition of zeros
D. addition of ones

Answer: A scaling of the existing bits

64. Which of the following is group under multiplication?
A. q
B. q-{0}
C. q-{1}
D. q-{0,1}

Answer: B q-{0}

65. The Initial Permutation table/matrix is of size
A. 16×8
B. 4×8
C. 12×8
D. 8×8

Answer: D 8×8

66. The number of unique substitution boxes in DES after the 48 bit XOR operation are
A. 8
B. 4
C. 6
D. 12

Answer: A 8

67. The DES algorithm has a key length of
A. 128 bits
B. 32 bits
C. 64 bits
D. 16 bits

Answer: C 64 bits

68. What is the size of the key in the SDES algorithm?
A. 24 bits
B. 16 bits
C. 20 bits
D. 10 bits

Answer: D 10 bits

69. The Plaintext for the Ciphertext 10100101, given that the key is 0010010111 is
A. 1100111
B. 110110
C. 1001000
D. 1001100

Answer: B 110110

70. Assume input 10-bit key, K: 1010000010 for the SDES algorithm. What is K1?
A. 10100100
B. 1011011
C. 1101000
D. 10100111

Answer: A 10100100

71. Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K2?
A. 11101010
B. 11011011
C. 1101000
D. 10101111

Answer: A 11101010

72. Which of the following is a mode of operation for the Block ciphers in cryptography?
A. a. electronic code book (ecb)
B. cipher block chaining (cbc)
C. counter (ctr) mode
D. all of the above

Answer: D all of the above

73. Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?
A. a. cbc (cipher block chaining)
B. ecb (electronic code book)
C. a. cfb (cipher text feed back)
D. all of the above

Answer: C a. cfb (cipher text feed back)

74. The Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is
A. 1100111
B. 1010
C. 11111111
D. 1101101

Answer: C 11111111

75. Which one of the following RC4 algorithm not used in?
A. ssl
B. tls
C. ftp
D. wep

Answer: C ftp

76. Till when was the RC4 algorithm kept a secret?
A. 1990
B. 1992
C. 1996
D. 1994

Answer: D 1994

77. The Plaintext for the Ciphertext 00100010, given that the key is 1111111111 is
A. 1100111
B. 1010
C. 1001000
D. 1001100

Answer: D 1001100

78. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
A. authenticated
B. joined
C. submit
D. separate

Answer: A authenticated

79. RSA is also a stream cipher like Merkel-Hellman
A. true
B. false

Answer: A true

80. Rabin Cryptosystem is a variant of the Elgamal Cryptosystem
A. true
B. false

Answer: B false

81. In RSA, Ф(n) = in terms of p and q
A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)

Answer: C (p-1)(q-1)

82. In Asymmetric Key Cryptography, the two key, e and d, have a special relationship to
A. others
B. data
C. keys
D. each other

Answer: D each other

83. Using Rabin cryptosystem with p=23 and q=7 ,Encrypt P=24 to find ciphertext. The Cipher text is
A. 42
B. 93
C. 74
D. 12

Answer: D 12

84. For RSA to work, the value of P must be less than the value of
A. p
B. q
C. n
D. f

Answer: C n

85. Session keys are transmitted after being encrypted by
A. make-shift keys
B. temporary keys
C. master keys
D. section

Answer: C master keys

86. Which Cryptographic system uses C1 = (e1r) mod p and C1 = (e2r x P) mod p at the encryption side?
A. elgamal
B. rsa
C. rabin
D. whirlpool

Answer: A elgamal

87. The certificate message is required for any agreed-on key exchange method except
A. ephemeral diffie- hellman
B. anonymous diffie- hellmanc
C. fixed diffie- hellmand.
D. rsa

Answer: B anonymous diffie- hellmanc

88. Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the plaintext to be transmitted if the ciphertext is (28,9)
A. 45
B. 76
C. 66
D. 13

Answer: C 66

89. In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
A. short
B. long
C. flat
D. thin

Answer: B long

90. Which of the following is not a type of symmetric-key cryptography technique?
A. caesar cipher
B. data encryption standard (des)
C. diffie hellman cipher
D. playfair cipher

Answer: C diffie hellman cipher

91. In Elgamal cryptosystem, given the prime p=31,Choose e1= first primitive root of p and d=10, calculate e2
A. 24
B. 36
C. 25
D. 62

Answer: C 25

92. How many bytes of the secret key is generated using Diffie-Hellman encryption/decryption scheme?
A. 256
B. 871
C. 1024
D. 962

Answer: A 256

93. Computation of the discrete logarithm is the basis of the cryptographic system
A. symmetric cryptography
B. asymmetric cryptography
C. diffie-hellman key exchange
D. secret key cryptography

Answer: C diffie-hellman key exchange

94. In Elgamal cryptosystem, given the prime p=31,Encrypt the message “HELLO”; use 00 to 25 for encoding. The value of C2 for character ‘O’ is
A. 9
B. 7
C. 23
D. 27

Answer: A 9

95. What is the block size of RC6 Feistel block cipher?
A. 5013 bits
B. 128 bits
C. 596 bits
D. 1768 bits

Answer: B 128 bits

96. What is the general equation for elliptic curve systems
A. y3+b_1 xy+b_2 y=x33+a_1 x2+a_2 x+a_3
B. y3+b_1 x+b_2 y=x2+a_1 x2+a_2 x+a_3
C. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2
D. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3

Answer: D y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3

97. USENET falls under which category of public key sharing?
A. public announcement
B. publicly available directory
C. public-key authority
D. public-key certificates

Answer: A public announcement

98. In Singular elliptic curve, the equation x^3+ax+b=0 does roots
A. does not have three distinct
B. has three distinct
C. has three unique
D. has three distinct unique

Answer: A does not have three distinct

99. The value of 52003 mod 7 is(use fermat’s theorem)
A. 3
B. 4
C. 8
D. 9

Answer: A 3

100. Elliptic curve cryptography follows the associative property
A. true
B. false

Answer: A true

101. In Elgamal cryptosystem, given the prime p=31,What is the respective plaintext character for C = (27, 20)?
A. h
B. l
C. o
D. m

Answer: A h

102. How many real and imaginary roots does the equation y2=x3-1 have
A. 2 real, 1 imaginary
B. all real
C. all imaginary
D. 2 imaginary, 1 real

Answer: D 2 imaginary, 1 real

103. “In ECC, the inverse of point P =(x1, y1) is Q = (-x1, y1). “
A. true
B. false

Answer: B false

104. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0)?
A. (15, -56)
B. (-23, -43)
C. (69, 26)
D. (12, -86)

Answer: A (15, -56)

105. How many real and imaginary roots does the equation y2=x3-4x have
A. 2 real, 1 imaginary
B. all real
C. all imaginary
D. 2 imaginary, 1 real

Answer: B all real

106. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is 2P if P = (4, 3.464)
A. (12.022, -39.362)
B. (32.022, 42.249)
C. (11.694, -43.723)
D. (43.022, 39.362)

Answer: A (12.022, -39.362)

107. In public key cryptosystem keys are used for encryption and decryption.
A. same
B. different
C. encryption keys
D. none of the mentioned

Answer: B different

108. PGP system uses
A. private key system
B. public key system
C. private & public key system
D. none of the mentioned

Answer: C private & public key system

109. Knapsack problem can be solved by
A. public key cryptosystem
B. public key system
C. private & public key system
D. none of the mentioned

Answer: A public key cryptosystem

110. Merkle hellman is a symmetric cryptosystem.
A. true
B. false

Answer: B false

111. In public key cryptosystem which is kept as public?
A. encryption keys
B. decryption keys
C. encryption & decryption keys
D. none of the mentioned

Answer: A encryption keys

112. A cryptographic hash function has variable output length.
A. true
B. false

Answer: B false

113. In a trapdoor function, the functions are easy to go in
A. one direction
B. two directions
C. all directions
D. none of the mentioned

Answer: A one direction

114. Which algorithm can be used to sign a message?
A. public key algorithm
B. private key algorith
C. public & private key algorithm
D. none of the mentioned

Answer: A public key algorithm

115. In this Merkle Hellman method same key is used for encryption and decryption.
A. true
B. false

Answer: B false

116. A set of numbers is called as super increasing if
A. each element is greater than previous element
B. each element greater than sum of all the previous elements
C. each element greater than the average of all elements
D. each element lesser than the sum of all the elements

Answer: B each element greater than sum of all the previous elements

117. There are major ways of stealing email information.
A. 2
B. 3
C. 4
D. 5

Answer: B 3

118. Which of them is not a major way of stealing email information?
A. stealing cookies
B. reverse engineering
C. password phishing
D. social engineering

Answer: B reverse engineering

119. is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.
A. email security
B. email hacking
C. email protection
D. email safeguarding

Answer: A email security

120. is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.
A. cloud
B. pen drive
C. website
D. email

Answer: D email

121. Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as details and passwords.
A. credit card, antivirus name
B. credit card, login id
C. cell phone, antivirus name
D. car model, account id

Answer: B credit card, login id

122. Unsolicited Bulk E-mails (UBI) are called
A. sms
B. mms
C. spam emails
D. malicious emails

Answer: C spam emails

123. Using email hacking illicit hackers can send & spread virus and spam emails.
A. trojans, redirected malicious urls
B. antivirus, patches
C. cracked software, redirected malicious urls
D. malware, security patches

Answer: A trojans, redirected malicious urls

124. is the technique used for tricking users to disclose their username and passwords through fake pages.
A. social engineering
B. phishing
C. cookie stealing
D. banner grabbing

Answer: B phishing

125. Which of them is an example of grabbing email information?
A. cookie stealing
B. reverse engineering
C. port scanning
D. banner grabbing

Answer: A cookie stealing

126. Which of the following is a non-technical type of intrusion or attack technique?
A. reverse engineering
B. malware analysis
C. social engineering
D. malware writing

Answer: C social engineering

127. If the data stored in the is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.
A. memory
B. quarantine
C. cookies
D. hard drive

Answer: C cookies

128. The stored cookie which contains all your personal data about that website can be stolen away by using or trojans.
A. attackers, malware
B. hackers, antivirus
C. penetration testers, malware
D. penetration testers, virus

Answer: A attackers, malware

129. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
A. true
B. false

Answer: A true

130. Which of them is not a proper method for email security?
A. use strong password
B. use email encryption
C. spam filters and malware scanners
D. click on unknown links to explore

Answer: D click on unknown links to explore

131. What are email security services?
A. confidentiality
B. authentication
C. non-repudation of origin
D. all of the above

Answer: D all of the above

132. PGP security system uses
A. public key cryptosystem
B. private key cryptosystem
C. public & private key cryptosystem
D. none of the mentioned

Answer: C public & private key cryptosystem

133. What is the key size allowed in PGP?
A. 1024-1056
B. 1024-4056
C. 1024-4096
D. 1024-2048

Answer: C 1024-4096

134. Who created PGP?
A. phil zimmermann
B. tim berners-lee
C. marc andreessen
D. ken thompson

Answer: A phil zimmermann

135. What is the PGP stand for?
A. permuted gap permission
B. permuted great privacy
C. pretty good privacy
D. none of the mentioned

Answer: C pretty good privacy

136. PGP makes use of which cryptographic algorithm?
A. des
B. aes
C. rsa
D. rabin

Answer: C rsa

137. PGP offers block ciphers for message encryption?
A. triple-des
B. cast
C. idea
D. all of the above

Answer: D all of the above

138. S/MIME stands for .
A. standard multipurpose internet mail extensions.
B. secure multipurpose internet mail extensions.
C. secure multipurpose international mail extensions
D. standard multipurpose international mail extensions.

Answer: B secure multipurpose internet mail extensions.

139. is used for hiding the payment information from the merchant.
A. set.
B. ssl.
C. shttp
D. tsp

Answer: A set.

140. The cryptography algorithms used in S/MIME are .
A. idea.
B. rc4
C. rsa,des-3
D. rc5

Answer: C rsa,des-3

141. In S/MIME,MLA stands for .
A. mailing list agent.
B. multipurpose list agent.
C. mail lock agent.
D. message link agen

Answer: A mailing list agent.

142. Which component is included in IP security?
A. authentication header (ah)
B. encapsulating security payload (esp)
C. internet key exchange (ike)
D. all of the mentioned

Answer: A authentication header (ah)

143. WPA2 is used for security in
A. ethernet
B. bluetooth
C. wi-fi
D. email

Answer: C wi-fi

144. An attempt to make a computer resource unavailable to its intended users is called
A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process

Answer: A denial-of-service attack

145. PGP is used in
A. browser security
B. email security
C. ftp security
D. wifi security

Answer: B email security

146. In tunnel mode, IPSec protects the
A. entire ip packet
B. ip header
C. ip payload
D. ip trailer

Answer: A entire ip packet

147. IPSec is designed to provide security at the
A. transport layer
B. network layer
C. application layer
D. session layer

Answer: B network layer

148. Which of the following is not a strong security protocol?
A. https
B. ssl
C. smtp
D. sftp

Answer: C smtp

149. SSL primarily focuses on
A. integrity and authenticity
B. integrity and non-repudiation
C. authenticity and privacy
D. confidentiality and integrity

Answer: A integrity and authenticity

150. Why did SSL certificate require in HTTP?
A. for making security weak
B. for making information move faster
C. for encrypted data sent over http protocol
D. for sending and receiving emails unencrypted

Answer: C for encrypted data sent over http protocol

151. SFTP is abbreviated as
A. secure file transfer protocol
B. secured file transfer protocol
C. secure folder transfer protocol
D. secure file transferring protoco

Answer: A secure file transfer protocol

152. mointors user activity on internet and transmit that information in the background to someone else
A. malware
B. spyware
C. adware
D. none of these

Answer: B spyware

153. Firewall is type of——
A. virus
B. security threat
C. worm
D. none of these

Answer: D none of these

154. The full form of Malware is
A. malfunctioned software
B. multipurpose software
C. malicious software
D. malfunctioning of security

Answer: C malicious software

155. There are types of computer virus.
A. 5
B. 7
C. 10
D. 12

Answer: C 10

156. A computer is a malicious code which self-replicates by copying itself to other programs.
A. program
B. virus
C. application
D. worm

Answer: B virus

157. Which of them is not an ideal way of spreading the virus?
A. infected website
B. e-mails
C. official antivirus cds
D. usbs

Answer: C official antivirus cds

158. is the kind of firewall is connected between the device and the network connecting to internet.
A. hardware firewall
B. software firewall
C. stateful inspection firewall
D. microsoft firewall

Answer: A hardware firewall

159. Which of the following is not a software firewall?
A. windows firewall
B. outpost firewall pro
C. endian firewall
D. linksys firewall

Answer: D linksys firewall

160. Firewall examines each that are entering or leaving the internal network
A. emails users
B. updates
C. connections
D. data packets

Answer: D data packets

161. A firewall protects which of the following attacks?
A. phishing
B. dumpster diving
C. denial of service
D. shoulder surfing

Answer: C denial of service

162. Packet filtering firewalls are deployed on
A. routers
B. switches
C. hubs
D. repeaters

Answer: A routers

Cryptography and Network Security (CNS) objective questions with answers pdf download online exam test

Leave a Reply

Your email address will not be published. Required fields are marked *