Top 150+ Solved Information and Network Security MCQ Questions Answer
Q. The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.
a. Program file
b. Special file
c. Ordinary file
d. Encrypted file
Q. People will normally think it as a normal/regular file and your secret message will pass on without any _______________.
a. Cracking
b. Encryption
c. Suspicion
d. Decryption
Q. By using ______________ you can diminish the chance of data leakage.
a. Steganography
b. Chorography
c. Tomography
d. Cryptography
Q. Which mode of operation has the worst “error propagation” among the following?
a. EC
b. B CB
c. C CBC
d. OFB
Q. Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?
a. EC
b. B CB
c. C CTR
d. OFB
Q. Which mode requires the implementation of only the encryption algorithm?
a. OF
b. B CTR
c. CBC
d. ECB
Q. Which of the following modes of operation does not involve feedback?
a. OF
b. B CTR
c. CBC
d. ECB
Q. Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?
a. Rijndael
b. Serpent
c. Blowfish
d. JUPITER
Q. Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen asthe AES algorithm?
a. Rijndael
b. RC6
c. Blowfish
d. MARS
Q. The 4×4 byte matrices in the AES algorithm are called_______.
a. Permutations
b. Transitions
c. Words
d. States
Q. In AES the 4×4 bytes matrix key is transformed into a keys of size __________.
a. 60 words
b. 32 words
c. 52 words
d. 44 words
Q. For the AES-128 algorithm there are __________ similar rounds and _________ roundis different.
a. 9 ; the last
b. 8 ; the first and last
c. 10 ; no
d. 2 pair of 5 similar rounds ; every alternate