QB Online MCQ Exam Unit 1 Ics
QB Online MCQ Exam Unit 1 Ics
1. In Caesar Cipher , What is the Plain Text corresponding to Cipher Text " QXPEHU "
A. THEORY B. MMATHS C. NUMBER D. CRYPTO
2. Consider Keyword :- MONARCHY and Plain Text is LAXMAN ,So find its cipher text by using Play Fair
Encryption.
A. TRUE B. False
4. Lets P,C,K denotes the Plain Text Spaces , Cipher Text Spaces and Key Spaces respectively.In Shift Cipher
P=C=Z26. For 0<=K<=25 , Encryption function ek is defined by ek(x)=........ mod 26 and decryption function dk is
defined by dk(x)=......... mod 26
Option A.
(-X+K),(X-K)
Option B.
(X+K),(X-K)
Option C.
(X+K),(-X-K)
Option D.
(-X+K),(-X-K)
5. Ciphertext depends on the original plaintext message, the algorithm and the ___.
Option A.
attacker
Option B.
Key Value
Option C.
Network
Option D.
None of the above
6. State True or False :- Steganography is a technique to hide a data in the form of network Packet
A.True B. False
Option A.
ABANDONED TEXT
Option B.
ABANDONED LOCK
Option C.
ENCRYPTED TEXT
Option D.
ENCRYPTED LOCK
8. Find cipher text for given plain text by using vigenere cipher. Plain Text is :- " PANKAJ" and Key is :- " DEEPAK ".
Option A.
SREZAT
Option B.
SERZAT
Option C.
ESRZAT
Option D.
RSEZAT
9. Encrypt Plain text " RUPALI " and keyword is " PRASTHAVINA" by using Play Fair encryption technique
Option A.
PRWSMV
Option B.
PWRSMV
Option C.
RPWSMV
Option D.
WPRSMV
10. An attacker sits between customer and Banker, and captures the information from the customer and re-
transmits to the banker by altering the information. This attack is called as ______.
Option A.
Masquerade Attack
Option B.
Replay Attack
Option C.
Passive Attack
Option D.
Option A.
Deletion, legitimate
Option B.
Modification, Illegitimate
Option C.
Modification, Legitimate
Option D.
Deletion, Illegitimate
12. The purpose of computer security is to prevent ______ from doing the ______
Option A.
attacks, harm
Option B.
attackers, damage
Option C.
threat, needful
Option D.
employees, interference
13. If Plain Text is " SUMEDHA " & Key is " CHANDNI " Find the encrypted text by Using Vernam Cipher
Option A.
UMBRGUI
Option B.
UBMRGUI
Option C.
BUMRGUI
Option D.
URMBGUI
14. Encrypt Plain text " PRIYADARSHINI" by using Rail Fence Encryption Technique
Option A.
PIAASIIRYDRHN
Option B.
PRYAIDAARHNI
Option C.
INIHSRADAYIRP
Option D.
PRIYAINIHSRDA
15. Encrypt Plain Text "RAJESH " by Using Hill Cipher Technique. Key :- { {2,1},{4,3}}
Option A.
IQWMRP
Option B.
IQMWPR
Option C.
QIWMRP
Option D.
PRMWQI
16. Which of the following cipher techniques include the involvement of matrix operations in their algorithms
of encryption and decryption?
Option A.
Hill Cipher
Option B.
Playfair cipher
Option C.
Both a and b
Option D.
Option A.
Data Confidentiality
Option B.
Data Integrity
Option C.
Authentication
Option D.
Option A.
Masquerade
Option B.
Modification of message
Option C.
Denial of service
Option D.
Traffic analysis
19. Which of the following options correctly defines the Brute force attack?
Option A.
Brutally forcing the user to share the useful information like pins and passwords.
Option B.
Option C.
Option D.
20. Encrypt Plain Text "SALMAN" by using Play Fair Encyption.Key for Encryption is " LOKMAT"
Option A.
OMOAEU
Option B.
UMOAEU
Option C.
UEAOMU
Option D.
MUOAEU
21. Decrypt the cipher text " QFAFSDF " by using Ceaser cipher
Option A.
LAVANYA
Option B.
RITHANYA
Option C.
CHANKYA
Option D.
MERINDA
22. State True or False :- Total number of key available in mono alphabetic cipher is 26 !
A. true B . false
23 State True or False :- In passive attack, attacker modify the content of message.
A. True B. False
Option A.
Poly-alphabetic Cipher
Option B.
Mono-alphabetic Cipher
Option C.
Multi-alphabetic Cipher
Option D.
Bi-alphabetic Cipher
25. State True or False :- Authentication is not a process to verify identification of sender and Receiver.
A. True B. False
Option A.
Protection
Option B.
Detection
Option C.
Reaction
Option D.
27. State True or False :- In active attack ,attacker monitor the data communication as well as modify the
content of message.
A. TRUE B.FALSE
28. State True or False :- Data Integrity mean data send from one end is not similar as data received at other
end.
A. TRUE B. FALSE
29. Consider Plain Text is " MOHAN " and key for Encryption is { {2,3},{1,4} }. find cipher text by using Hill Cipher
Encryption Technique
Option A.
OQOHNN
Option B.
QOOHNN
Option C.
OOQHNN
Option D.
HOQHNN