Computer Fundamentals Multiple choice Questions and Answers on Encryption and Viruses for Freshers

1. A cipher in which the order is not preserved.

a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Public key based
Answer: b

Explanation: In transposition-based cipher, the order of the plain text is not preserved. They can be very simple to identify.
2. Plain text is the data after encryption is performed.

a) True
b) False
Answer: b

Explanation: The statement is false. Cipher is the algorithm used in encryption. Ciphertext is the data after encryption is performed.
3. A unique piece of information that is used in encryption.

a) Cipher
b) Plain Text
c) Key
d) Cipher
Answer: c

Explanation: The key is the unique piece of information. It is used to create the cipher text and decrypt it back.
4. Study of creating a d using encryption and decryption techniques.

a) Cipher
b) Cryptography
c) Encryption
d) Decryption
Answer: b

Explanation: It is called as cryptography. It is the study of creating and using the encryption techniques.
5. Creating a computer or paper audit that can help detect wrong doings.

a) Auditing
b) Validation
c) RSN
d) Verification
Answer: a

Explanation: The answer is auditing. It is done to keep an eye on wrong doings. Auditing can be used as a deterrent.
6. An indirect form of surveillance.

a) Honey pot
b) Logical
c) Security
d) Intrusion
Answer: a

Explanation: Honey pot is an indirect form of surveillance. Network personnel create a trap, watching for unscrupulous acts.
7. A malicious code hidden inside a seemingly harmless piece of code.

a) Worm
b) Bomb
c) Trojan Horse
d) Virus
Answer: c

Explanation: The answer is Trojan horse. Trojan horse is a code that is present in a program that appears harmless.
8. Attack in which a user creates a packet that appears to be something else.

a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
Answer: d

Explanation: The attack is a spoofing attack. It is when a user creates a packet that appears to be something else or from someone else.
9. A technique in which a program attacks a network by exploiting IP broadcast addressing operations.

a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
Answer: a

Explanation: Smurfing is a technique in which a program attacks a network by exploiting IP broadcast addressing operations.
10. An attack in which the user receives unwanted amount of e-mails.

a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
Answer: c

Explanation: In the case of denial of e-mail bombing, a user sends an excessive amount of unwanted e-mail to someone.

Related

Multiple Choice Questions 6719524691378897099

Post a Comment

emo-but-icon

item