MCQ's on Network Security

You will find the correct answer of all the questions after you will submit the quiz. You will also get a report of your performance after you will submit the quiz.
Unlimited attempts possible to practice. On each attempts you will get a set of 25 questions.

Enter Your Name

MCQ 1:
TCP/IP is a _____________.

MCQ 2:
TCP / IP mainly used for _____________.

MCQ 3:
NetBIOS is developed by _____________.

MCQ 4:
Which IEEE standard is developed for CSMA/CD.

MCQ 5:
Which is the part of data link layer.

MCQ 6:
Which Network Architecture is developed by IBM.

MCQ 7:
Which is the lowest layer of TCP/IP Model.

MCQ 8:
_______________ is an access channel for computers to exchange informations.

MCQ 9:
How many ports a computer may have?

MCQ 10:
Which is the type of port?

MCQ 11:
OSI stands for _____________.

MCQ 12:
IPX/SPX is used for?

MCQ 13:
Parallel port can transfer ______________ bits of data at a time.

MCQ 14:
Parallel port cannot connect to _____________.

MCQ 15:
In computer which range is in registered ports.

MCQ 16:
USB stands for ?

MCQ 17:
Which is the fastest port for data transfer?

MCQ 18:
What is the port number of http?

MCQ 19:
Which is not the part of the UDP diagram?

MCQ 20:
Which is the type of a socket?

MCQ 21:
In which layer of OSI model IP is available.

MCQ 22:
IP is defined in _____________.

MCQ 23:
DES stands for?

MCQ 24:
Which protocol is used to report error message?

MCQ 25:
What is the use of IP source routing?

MCQ 26:
Which is the IP source routing method?

MCQ 27:
In a TCP header source and destination header contains _____________.

MCQ 28:
Which statement is incorrect?

MCQ 29:
Which is not the application level protocol?

MCQ 30:
____________ is the science and art of transforming messages to meke them secure and immune to attacks.

MCQ 31:
The ______________ is the original message before transformation.

MCQ 32:
The ______________ is the message after transformation.

MCQ 33:
Which is the false statement?

MCQ 34:
What is the full form of SMTP?

MCQ 35:
Full form of POP is _____________.

MCQ 36:
The port number of SMTP (Simple mail transfer protocol) is.

MCQ 37:
An ____________ algorithm transforms plain text to cipher text

MCQ 38:
An ____________ algorithm transforms cipher text to plain text

MCQ 39:
A combination of an encryption and descryption algorithm is called a _____________.

MCQ 40:
In an _____________ cipher, the same key is used by both the sender and the receiver.

MCQ 41:
Which method replace one character with another character?

MCQ 42:
In an asymmetric key cipher, both the sender uses _____________.

MCQ 43:
In an asymmetric key cipher, both the receivers uses _____________.

MCQ 44:
Which can be divided into monoalphabetic and polyalphabetic.

MCQ 45:
In an ____________ ciphert text , a pair of keys is used.

MCQ 46:
The modern cipher is usually a complex ____________ cipher made of a combination of different simple ciphers.

MCQ 47:
ECB and CBC are ?

MCQ 48:
How many round keys generated by DES?

MCQ 49:
In an ________________ , the key is known as SECRET Key.

MCQ 50:
Which agency assigns IP address

MCQ 51:
An example of a layer that is absent in broadcast networks is _____________.

MCQ 52:
Which IP address is reserved for loop back of localhost.

MCQ 53:
Which class for IP is used in smaller organizations.

MCQ 54:
The size of the IPV4 is _____________.

MCQ 55:
Which is the part of IP_____________.

MCQ 56:
The subnet Mask belongs to _____________.

MCQ 57:
Who provide us internet?

MCQ 58:
In which method we can connect to internet protocol.

MCQ 59:
URL stands for _____________.

MCQ 60:
Which is not the server side programming language.

MCQ 61:
FTP runs on _____________.

MCQ 62:
https stands for _____________.

MCQ 63:
Which is not the requirement of internet.

MCQ 64:
What is the maximum speed of modem is _____________.

MCQ 65:
Which protocol is used for browsing website _____________.

MCQ 66:
Which is not the browser?

MCQ 67:
Which is a search engine?

MCQ 68:
Which is the chatting application?

MCQ 69:
Which service provide 3D view of the earth?

MCQ 70:
Which is the threads for clients?

MCQ 71:
Which is not the application of internet.

MCQ 72:
In the SSL Protocol, each upper layer message if fragmented into a maximum of _______________ bytes.

MCQ 73:
The full form of SSL is _____________.

MCQ 74:
After the encryption stage in SSL, the maximum length of each fragment is.

MCQ 75:
If the sender and receiver use different keys, the system is referred to as conventional cipher system.

MCQ 76:
Caesar Cipher is an example of _____________.

MCQ 77:
Which are the most frequently found letters in the English language?

MCQ 78:
DES (Data Encryption Standard) follows.

MCQ 79:
Which of the following slows the cryptographic algorithm -
1) Increase in Number of rounds
2) Decrease in Block size
3) Decrease in Key Size
4) Increase in Sub key Generation

MCQ 80:
Which protocol is used to convey SSL related alerts to the peer entity?

MCQ 81:
The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.

MCQ 82:
SSL provies _______________.

MCQ 83:
Which one of the following is true for asymmetric-key cryptography?

MCQ 84:
Which of the following is not a secured mail transferring methodology?

MCQ 85:
One security protocol for the email system is ________________.

MCQ 86:
Which of these is not a proper method of maintaining confidentiality?

MCQ 87:
AES stands for ________________.

MCQ 88:
________________ provides privacy, integraty, and authentication in email.

MCQ 89:
DES stands for _____________________.

MCQ 90:
In the DES algorithm the round key is ________________ bit and the Round Input is ___________________ bits.

MCQ 91:
_________________ is a term used in cryptography that refers to a message before encryption or after decryption.

MCQ 92:
A substitution cipher substitutes one symbol with ______________.

MCQ 93:
An asymmetric-key (or public-key) cipher uses.

MCQ 94:
A straight permutation cipher or a straight P-box has the same number of inputs as.

MCQ 95:
The DES algorithm has a key length of _________________.

MCQ 96:
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to.

MCQ 97:
The cryptography algorithms (ciphers) are divided into __________________.

MCQ 98:
The maximum payload of a TCP segment is :

MCQ 99:
The __________________ is encrypted text.

MCQ 100:
An encryption technique with 2 keys is ______________.

MCQ 101:
In public key cryptography, a key that decrypts the message.

MCQ 102:
On which port will the server generally listen to for SMTP?

MCQ 103:
________________ provides security at the tansport layer.

MCQ 104:
Which of the following is not a strong security protocol?

MCQ 105:
The shift cipher is sometimes referred to as the

MCQ 106:
_______________ can retrive application data from application layer protocol, but the protocol is normally HTTP.

MCQ 107:
Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to 'ensure correct re-composition from end to end of the network?'

MCQ 108:
It provides one time session keys between two parties or persons joins each other.

MCQ 109:
Public key cryptography used in

MCQ 110:
Match the following List 1 and List 2 :
List 1 - A. Application layer , B. Transport layer, C. Network layer, D. Data link layer
List 2 - 1. HDLC, 2. TCP, 3. HTTP, 4. BGP

MCQ 111:
The substitutional cipers are _____________________.

MCQ 112:
An HTTP connection uses port ________________ whereas HTTPS uses port ________________ and invokes SSL.

MCQ 113:
How many keys does the Triple DES algorithm use?

MCQ 114:
Using RSA algorithm, convert the plain text AAAAAAA into cypher text using the conversion values as p=3, q=11, n=pq, d=7.

MCQ 115:
The combination of key exchange, hash, and algorithms defines a ___________ for each SSL section.

MCQ 116:
An electronic document that establishes your credentials when you are performing transactions.

MCQ 117:
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

MCQ 118:
Data which is easily readable & understandable without any special algorithm or method is called _________________.

MCQ 119:
Data Encryption Techniques are particularly used for _______________.

MCQ 120:
_______________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another letter in creating the cipher-text.

MCQ 121:
Which 2 protocols are used in the Transport layer of the TCP/IP model?

MCQ 122:
Plain text are also called _____________.

MCQ 123:
_____________ is data interception method used by hackers.

MCQ 124:
A __________ is actually at IETF version of ________________.

MCQ 125:
Sniffing is also known as ___________________.

MCQ 126:
Which of the protocol is not used in the network layer of the TCP/IP model?

MCQ 127:
A message COMPUTERNETWORK encrypted using columnar transposition cipher with a key LAYER. The encrypted message is

MCQ 128:
TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.

MCQ 129:
_____________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet.

MCQ 130:
TCP/IP is composed of ________________ number of layers.

MCQ 131:
A cryptosystem is also termed as ______________.

MCQ 132:
An _____________ is a network that allows and authorised access from outside users of the whole world.

MCQ 133:
An _____________ is a private network that uses the internet model.

MCQ 134:
A ______________ network is used inside an organisation.

MCQ 135:
Which of them is not an objective of sniffing for hackers?

MCQ 136:
________________ ensures the integrity and security of data that are passing over a network.

MCQ 137:
S/MIME is abbreviated as __________________.

MCQ 138:
There are ______________ types of cryptographic techniques used in general.

MCQ 139:
_____________ are programs or devices that capture the vital information from the target network or particular network.

MCQ 140:
When integrity is lacking in a security system, _________ occurs.

MCQ 141:
An ______________________ along with a key is used in the encryption and decryption of data.,

MCQ 142:
A _______________ layer securiy protocol provides end to end security services for applications.

MCQ 143:
A substitution cipher replaces one symbol with the ________________.

MCQ 144:
__________ is used for encrypting data at network level.

MCQ 145:
Which of the protocol is not susceptible to sniffing?

MCQ 146:
There are _______________ types of sniffing.

MCQ 147:
IP address belongs to ____________ format.

MCQ 148:
Is the statement "Active sniffing is difficult to detect." is true or false.

MCQ 149:
In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack.

MCQ 150:
The internet aothorities have recrived the address for ________________.

MCQ 151:
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

MCQ 152:
The design issue of Datalink Layer in OSI Reference Model is

MCQ 153:
______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

MCQ 154:
_______________ provide security at the transport layer.

MCQ 155:
_______________________________ ensures that sensitive information are accessed only by an authorized person and kept away from those not authorized to possess them.

MCQ 156:
____________ protocol attack is done in the data-link layer.

MCQ 157:
Algorithm-Based Phishing was developed in the year ______________.

MCQ 158:
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _____________.

MCQ 159:
Which of the following is not an example or type of phishing?

MCQ 160:
Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?

MCQ 161:
Users are able to see a pad-lock icon in the address bar of the browser when there is _________________ connection.

MCQ 162:
Which of the following is not an example of presentation layer issues?

MCQ 163:
Using the following values of a character M = 5, p = 3, q = 11 & d = 7, Find the the value of cipher text C by RSA Algorithm.

MCQ 164:
Which of the following is not a vulnerability of the application layer?

MCQ 165:
Encryption and Decryption is the responsibility of __________________ Layer.

MCQ 166:
Which of the following is an example of application layer vulnerability?

MCQ 167:
Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).

MCQ 168:
Cryptography offers a set of required security services. Which of the following is not among that 4 required security services?

MCQ 169:
_______________ is the art & science of cracking the cipher-text without knowing the key.

MCQ 170:
_______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext.

MCQ 171:
_______________ takes the plain text and the key as input for creating cipher text.

MCQ 172:
A _____________ provides privacy for LANs that must communicate through the global internet

MCQ 173:
The full form of OSI is OSI model is ______________

MCQ 174:
The Internet authorities have reserved addresses for ____________.

MCQ 175:
__________________ is the process of identifying an individual, usually based on a username and password.

MCQ 176:
__________________ ensures that information are in a format that is true and correct to its original purposes.

MCQ 177:
________________ provides either authentication or encryption, or both, for packets at the IP level.

MCQ 178:
When plain text is converted to unreadable format, it is termed as _____________.

MCQ 179:
Conventional cryptography is also known as _____________ or symmetric-key encryption.

MCQ 180:
___________________ is the process of giving individuals access to system objects based on their identity.

MCQ 181:
In general how many key elements constitute the entire security structure?

MCQ 182:
____________________ is a mathematical algorithm that produces a unique plain text for a given cipher text along with a decryption key.

MCQ 183:
The procedure to add bits to the last block is termed as _________________.

MCQ 184:
A type of cipher that uses multiple alphabetic strings.

MCQ 185:
The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is called _________________.

MCQ 186:
The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as ________________.

MCQ 187:
The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and _________________.

MCQ 188:
_________________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ?shifted? by some fixed quantity.

MCQ 189:
In which of the following encryption key is used to encrypt and decrypt the data ?

MCQ 190:
Data integrity gets compromised when ____________ and ____________ are taken control off.

MCQ 191:
Encryption is the study of creating and using decryption techniques.

MCQ 192:
A set of all probable decryption keys are collectively termed as ____________.

MCQ 193:
In Cryptography, the original message, before being transformed, is called ____________________.

MCQ 194:
These ciphers replace a character or characters with a different character or characters, based on some key.

MCQ 195:
Cryptographic algorithms are based on mathematical algorithms where these algorithms use _____________ for a secure transformation of data.

MCQ 196:
In symmetric-key cryptography, the same key is used by

MCQ 197:
Data Encryption Standard is an example of a _____________ cryptosystem.

MCQ 198:
Which of the following is not the primary objective of cryptography?

MCQ 199:
Which of the following is not the primary objective of cryptography?

MCQ 200:
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

MCQ 201:
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

MCQ 202:
Encryption-decryption in cryptosystem is done in ___________________ ways.

MCQ 203:
Which of the following is not an example of a block cipher?

MCQ 204:
Data Encryption Standard (DES), was designed by

MCQ 205:
__________________ cryptography has always been focussing on the concept of ?security through obscurity?.

MCQ 206:
The keys used in cryptography are

MCQ 207:
In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.

MCQ 208:
In symmetric key cryptography, the key used by the sender and the receiver is

MCQ 209:
A cipher in which the order is not preserved.

MCQ 210:
Cryptography can be divided into __________________ types.

MCQ 211:
Study of creating a d using encryption and decryption techniques.

MCQ 212:
In symmetric-key cryptography, the key locks and unlocks the box is

MCQ 213:
________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain text remains fixed all through the encryption procedure.

MCQ 214:
Why can a message encrypted with the Public Key only be decrypted with the receiver?s appropriate Private Key? (Assymmetric Encryption)

MCQ 215:
The ciphers of today are called __________________________.

MCQ 216:
In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.

MCQ 217:
In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.

MCQ 218:
In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

MCQ 219:
The ________________ has piece of the keyword that has the same length as that of the plaintext.

MCQ 220:
A process of making the encrypted text readable again.

MCQ 221:
The process of transforming plain text to unreadable text.

MCQ 222:
The relationship between a character in the plaintext to a character is

MCQ 223:
The Cryptography can provide

MCQ 224:
The Data Encryption Standard (DES) was designed by

MCQ 225:
In ________________ same keys are implemented for encrypting as well as

MCQ 226:
The original message, before being transformed, is

MCQ 227:
RSA stands for

MCQ 228:
An encryption algorithm transforms the plaintext into

MCQ 229:
A set of all probable decryption keys are collectively termed as key space.

MCQ 230:
Cryptography, a word with Greek origins, means

MCQ 231:
Full form of SET.

MCQ 232:
Full form of TSP.

MCQ 233:
Full form of SHTTP.

MCQ 234:
Full form of PEM.

MCQ 235:
Full form of PGP.

MCQ 236:
Full form of S/MIME.

MCQ 237:
Cookies were originally designed for _______________.

MCQ 238:
A digital signature needs a _________________.

MCQ 239:
A session symmetric key between two persons or parties is used

MCQ 240:
Message Confidently is using ______________.

MCQ 241:
The message digest needs to be _______________.

MCQ 242:
The message must be encrypted at the sender site and decrypted at the

MCQ 243:

MCQ 244:
In Computer which range is in registered ports.

MCQ 245:
What is the port number of http.

MCQ 246:
In which layer of OSI model IP is available.

MCQ 247:
What is the full form of FTP

MCQ 248:
Always https protocol is used as

MCQ 249:
Which is the lowest layer of TCP/IP Model.

MCQ 250:
What is the port number of http.