Top 150+ Solved Information and Network Security MCQ Questions Answer

From 61 to 75 of 106

Q. The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.

a. Program file

b. Special file

c. Ordinary file

d. Encrypted file

  • c. Ordinary file

Q. By using ______________ you can diminish the chance of data leakage.

a. Steganography

b. Chorography

c. Tomography

d. Cryptography

  • a. Steganography

Q. How many rounds does the AES-192 perform?

a. 16

b. 12

c. 14

d. 10

  • b. 12

Q. What is the expanded key size of AES-192?

a. 60 words

b. 32 words

c. 52 words

d. 44 words

  • c. 52 words

Q. The 4×4 byte matrices in the AES algorithm are called_______.

a. Permutations

b. Transitions

c. Words

d. States

  • d. States

Q. In AES the 4×4 bytes matrix key is transformed into a keys of size __________.

a. 60 words

b. 32 words

c. 52 words

d. 44 words

  • d. 44 words

Q. For the AES-128 algorithm there are __________ similar rounds and _________ roundis different.

a. 9 ; the last

b. 8 ; the first and last

c. 10 ; no

d. 2 pair of 5 similar rounds ; every alternate

  • a. 9 ; the last
Subscribe Now

Get All Updates & News