Q: 1 How many keys are needed for encrypted communication among 16 persons using AES encryption assuming unique key is used between any two persons?
120 keys
256 keys
32 keys
16 keys
[ Option A ]
AES (Advanced Encryption Standard) is a symmetric key encryption algorithm, meaning the same secret key is used for both encryption and decryption.
When secure communication is required between two persons, they must share a unique secret key. If every pair of users uses a different key, then the total number of keys required equals the number of unique pairs that can be formed among the users. For n persons, the number of such pairs is n(n−1)/2.
For 16 persons, the required keys are 16*15/2=120. Therefore, 120 unique keys are needed so that each pair of persons can communicate securely using AES.
| ENCRYPTION TYPE | KEYS REQUIRED |
|---|---|
| Symmetric (AES) | N*(N-1)/2 |
| Asymmetric (RSA) | 2N |
Q: 2 What is the advantage of setting up a DMZ (Demilitarized Zone) using firewall?
Improve network performance
To create multiple zones of trust
Load balancing on the server
Brings internet service into home from internet service provider
[ Option B ]
The primary advantage of setting up a DMZ (Demilitarized Zone) using a firewall is to create multiple zones of trust within a network, which enhances security. A DMZ acts as a buffer zone between the public Internet and the internal private network, isolating public-facing servers (such as web, email, and DNS servers) from sensitive internal resources. This setup allows external users to access services in the DMZ while preventing direct access to the internal network.
Q: 4 SHA-2 algorithm generate ____________ length of hash value.
128 bits
512 bits
256 bits
1024 bits
[ Option B ]
The SHA-2 (Secure Hash Algorithm 2) family is a set of cryptographic hash functions designed to provide secure hashing for data integrity and digital signatures.
SHA-2 includes variants such as SHA-224, SHA-256, SHA-384, and SHA-512, where the number in the name indicates the length of the hash output in bits.
SHA-256, the most commonly used variant, produces a 256-bit (32-Byte) hash value.
Q: 5 Input block size, key size and output block size in Data Encryption Standard (DES) are respectively:
128-bit, 64-bit, 128-bit
64-bit, 32-bit, 64-bit
64-bit, 56-bit, 64-bit
64-bit, 64-bit, 128-bit
[ Option C ]
Data Encryption Standard (DES) is a symmetric key block cipher widely used for secure data transmission.
This design allows secure encryption and decryption using the same 56-bit key.
| Symmetric Encryption Algorithms | Key Size | Message Size |
|---|---|---|
| DES (Data Encryption Standard) | 56 bits | 64-bit block |
| 3DES (Triple DES) | 112 or 168 bits | 64-bit block |
| AES (Advanced Encryption Standard) | 128, 192, or 256 bits | 128-bit block |
| Blowfish | 32–448 bits | 64-bit block |
| IDEA (International Data Encryption Algorithm) | 128 bits | 64-bit block |
| RC4 | 40–2048 bits | Stream cipher |
| Asymmetric Encryption Algorithms | Key Size | Message Size |
|---|---|---|
| RSA (Rivest–Shamir–Adleman) | 1024–4096 bits | Variable |
| ECC (Elliptic Curve Cryptography) | 160–521 bits | Variable |
Q: 6 In cryptography, the encrypted text is called ____________.
Plain Text
Known Text
Hidden Text
Cipher Text
[ Option D ]
In cryptography, when a readable message (Plain Text) is converted into an unreadable form using an encryption algorithm and a key, the result is called Cipher Text.
Q: 7 Which of the following is the default authentication mode for IIS?
Anonymous
Windows
Basic authentication
None of these
[ Option A ]
By default, IIS (Internet Information Services) allows users to access web content without requiring credentials. This is called Anonymous Authentication, where the server uses a built-in account to handle requests from unauthenticated users.
Q: 8 In Data Encryption Standard (DES), the number of rounds is _________.
8
16
24
56
[ Option B ]
Data Encryption Standard (DES) is a Symmetric Key block cipher algorithm that uses the same secret key for both encryption and decryption.
The encryption process in DES consists of a series of operations known as rounds. In DES total 16 rounds are performed, making the encryption much stronger and harder to break through Brute-Force or Statistical Attacks.
Q: 9 Which of the following can be protected using a firewall?
Dumpster Diving
Physical Theft
Shoulder Surfing
Network Scanning
[ Option D ]
A Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predefined security rules. Its main purpose is to protect a computer network from unauthorized access through the network.
Network Scanning is a technique used by attackers to identify open ports, active hosts, and running services in a network to find vulnerabilities. A properly configured firewall can block suspicious requests, restrict unauthorized access to ports, and prevent scanning attempts, thereby protecting the system from such attacks.
Q: 10 In the given key pattern:
1 → 4, 2 → 8, 3 → 1, 4 → 5, 5 → 7, 6→2, 7→6, 8→3
The first bit of plaintext moves to the fourth position of ciphertext and so on.
What would be the cipher text in transposition cipher for the following plaintext ?
Plaintext : SACKGAUL
(Note: above plaintext should be read from right to left)
UKAGLSCA
KUCGASLA
SCAUKAGL
SAUKCALG
[ Option A ]
Given, Plaintext = SACKGAUL, but it says read from right to left, so we reverse it: LUAGKCAS. Now, the positions are:
| POSITION | LETTER |
|---|---|
| 1 | L |
| 2 | U |
| 3 | A |
| 4 | G |
| 5 | K |
| 6 | C |
| 7 | A |
| 8 | S |
The given key pattern:
1 → 4
2 → 8
3 → 1
4 → 5
5 → 7
6 → 2
7 → 6
8 → 3
This means:
The 1st plaintext letter goes to 4th position in ciphertext.
The 2nd plaintext letter goes to 8th position in ciphertext.
The 3rd plaintext letter goes to 1st position and so on. So,
| PLAINTEXT LETTER | GOES TO POSITION | CIPHERTEXT POSITION |
|---|---|---|
| L (1) | 4 | 4th = L |
| U (2) | 8 | 8th = U |
| A (3) | 1 | 1st = A |
| G (4) | 5 | 5th = G |
| K (5) | 7 | 7th = K |
| C (6) | 2 | 2nd = C |
| A (7) | 6 | 6th = A |
| S (8) | 3 | 3rd = S |
Now after arranging ciphertext in order 1 to 8, ACSLGAKU. Since plaintext was read right to left, the ciphertext is also read from right to left, i.e., UKAGLSCA.
Q: 11
In context of network security match the following –
| Column – I | Column – II |
|---|---|
| (P) Fabrication | 1. Message Confidentiality |
| (Q) Modification | 2. Message Integrity |
| (R) Interception | 3. Authentication |
P-1, Q-3, R-2
P-2, Q-1, R-3
P-3, Q-1, R-2
P-3, Q-2, R-1
[ Option D ]
Fabrication refers to creating fake messages or data, so authentication mechanisms are used to detect and prevent this.
Modification means altering messages during transmission. Ensuring message integrity detects such tampering.
Interception refers to unauthorized access or eavesdropping. Confidentiality (encryption) protects the message content.
Q: 12 Secure Hash Algorithm-1 (SHA-1) has a message digest of –
160 bits
512 bits
628 bits
820 bits
[ Option A ]
Secure Hash Algorithm-1 (SHA-1) produces a message digest of 160 bits (20 bytes). SHA-1 takes an input of any length (less than 264 bits) and outputs a fixed-length hash value of 160 bits. This hash value, called the message digest, is used for data integrity verification, digital signatures, and other cryptographic applications.
Q: 13 In context of Intrusion Detection Systems, which of the following is not true about honeypots?
Divert attention of a potential intruder from critical systems.
Collect information about the intruder's actions.
Look like real-life systems.
Allow legitimate users to know about or access honeypots.
[ Option D ]
A Honeypot is a security mechanism used in Intrusion Detection Systems (IDS) to attract attackers and study their behavior. It is designed to look like a real system containing valuable data or services, but it is actually a Decoy that isolates and monitors malicious activities.
Honeypots help in diverting attackers’ attention away from critical systems and collecting information about their methods, tools, and intentions.
However, Legitimate Users are not supposed to know about or access honeypots, as their purpose is purely for monitoring and deception.
Q: 14
Match the following in the context of Information Security:
| (i) Non-Repudiation | (P) Protection of data from unauthorised disclosure. |
| (ii) Data Integrity | (Q) Prevention of unauthorized use of a resource. |
| (iii) Data Confidentiality | (R) Protection against denial by one of the entities involved in a communication having participated in all or part of communication. |
| (iv) Access Control | (S) Assurance that data arrived are exactly as sent by the authorised entity. |
(i)-(R), (ii)-(P), (iii)-(Q), (iv)-(S)
(i)-(R), (ii)-(S), (iii)-(P), (iv)-(Q)
(i)-(P), (ii)-(R), (iii)-(S), (iv)-(Q)
(i)-(R), (ii)-(Q), (iii)-(P), (iv)-(S)
[ Option B ]
In Information Security, different mechanisms are used to protect data and system resources.
Q: 15 Which of the following is not a symmetric key cryptography algorithm?
RC4
Blowfish
Diffie-Hellman
DES
[ Option C ]
Symmetric key algorithms use the same key for encryption and decryption. RC4, Blowfish, and DES (Data Encryption Standard) are examples of symmetric key cryptography algorithms.
Diffie-Hellman is a key exchange algorithm and is part of asymmetric key cryptography, used to securely exchange cryptographic keys over a public channel. It is not an encryption algorithm itself.
Q: 16 An RSA crypto system selects two primes p=11 and q=13. If the private key is d=7, which of the following can be the value of the public key ‘e’?
103
143
21
19
[ Option A ]
In the RSA cryptosystem, two prime numbers p and q are chosen. Here p=11 and q=13. First compute n=p*q = 11*13=143. Next compute Euler’s totient function ϕ(n)=(p−1)(q−1) = 10*12 = 120.
In RSA, the public key e and private key d must satisfy the condition e*d ≡1(modϕ(n)). Given d=7, we need a value of e such that 7e≡1 (mod 120). The multiplicative inverse of 7 modulo 120 is 103, since 7*103=721 and 721 mod 120 = 1.
Therefore, the value of the public key e is 103.
Q: 17 A proxy firewall filter works at –
Physical Layer
Data link Layer
Network Layer
Application Layer
[ Option D ]
A Proxy Firewall filter works at the Application Layer of the OSI model. It acts as an intermediary between a client and a server, intercepting all requests and responses.
| Firewall Type | OSI Layer | Description |
|---|---|---|
| Packet-Filtering Firewall | Network Layer | Filters packets based on IP address, protocol, and port. Fast but limited visibility. |
| Stateful Inspection Firewall | Network & Transport Layer | Tracks the state of active connections, allows or blocks packets based on state, port, and protocol. |
| Proxy Firewall | Application Layer | Acts as an intermediary, inspects application data, supports HTTP, FTP, SMTP, etc. Provides deep packet inspection. |
| Next-Generation Firewall (NGFW) | Network to Application Layer | Combines traditional firewall capabilities with deep packet inspection and application awareness. |
| Circuit-Level Gateway | Session Layer | Monitors TCP handshakes and sessions without inspecting packet contents deeply. |
Q: 18 Which of following is a technique that facilitates hiding of a message that is to be kept secret inside an image?
Steganography
Cryptography
Encryption
Calligraphy
[ Option A ]
A plain text message can be hidden or protected in two main ways.
Steganography is a technique used to hide secret messages or data within another file, such as an image, audio, or video, in such a way that its existence is not apparent to others.
For example, a confidential message can be hidden inside the pixel values (modifying the Least Significant Bits (LSBs) of the Pixels) of an image file without noticeably changing the image itself.
Cryptography transforms plaintext into ciphertext via encryption, rendering the content unintelligible to outsiders without the decryption key.
Q: 19 In RSA, let the two prime numbers are P = 7, Q = 17 and public key e = 5. Find the Cipher text for the plain text 10.
40
77
96
119
[ Option A ]
In RSA encryption, we are given P = 7, Q = 17, public key e = 5, and plaintext M = 10.
First, calculate n = P × Q = 7 × 17 = 119 and φ(n) = (P - 1) × (Q - 1) = 6 × 16 = 96.
The public key pair is therefore (5, 119). Using the encryption formula C = Me mod n, we get C = 105 mod 119 = 40.
Q: 20 In which of the following cases, a user is persuaded to reveal personal data by hackers/cyber criminals?
Eavesdropping Attack
SQL Injection Attack
Phishing
Website Defacement
[ Option C ]
Phishing is a cyber-attack technique in which attackers trick or persuade users into revealing sensitive information such as passwords, banking details, credit card numbers, or personal data.
The attacker typically sends fake emails, messages, or creates fraudulent websites that appear to come from trusted organizations like banks or social media platforms.
When the user believes the message is legitimate and enters their information, the attacker collects that data.
| TECHNIQUE | EXPLANATION |
|---|---|
| Eavesdropping Attack | The attacker secretly intercepts or listens to communication between two parties to capture data without the users knowledge. The user is not persuaded to reveal information. |
| SQL Injection Attack | An attack where malicious SQL queries are inserted into input fields of a web application to manipulate or access the database. It targets the system, not the users trust. |
| Website Defacement | In this attack, the hacker modifies or vandalizes a website’s content, usually replacing it with unauthorized messages or images. It does not involve persuading users to reveal personal data. |
Q: 21 Which of the following does not use key(s)?
Symmetric Ciphers
Generation of Message Digest
Generation of Message Authentication Code
Key Exchange Algorithm
[ Option B ]
A Message Digest is generated using a cryptographic hash function such as SHA or MD5, which converts a message of any length into a fixed-length hash value.
The important property of a message digest is that it is computed without using any secret key, it only depends on the input message. It is mainly used to Verify Data Integrity, meaning it helps detect whether the message has been modified.
| TECHNIQUE | EXPLANATION |
|---|---|
| Symmetric Ciphers | Uses a single shared secret key for both encryption and decryption. The sender encrypts the message using the secret key and the receiver decrypts it using the same key. Examples include AES and DES. |
| Message Authentication Code (MAC) | Generated using a secret key together with the message to ensure data integrity and authentication. Only users who possess the secret key can generate or verify the MAC. Example: HMAC. |
| Key Exchange Algorithm | A cryptographic method used to securely establish or exchange a shared secret key between two parties over an insecure network. The generated key is later used for encryption. Example: Diffie-Hellman. |
Q: 22 Which of the following defines format for Public Key Infrastructure?
(a)
(b)
(c)
(d)
X.25
X.509
IEEE 802.11
IEEE 802.3
[ Option B ]
Public Key Infrastructure (PKI) is a framework used to manage digital certificates and public-key encryption. It provides mechanisms for authentication, data integrity, confidentiality, and secure communication over networks.
The X.509 is an international standard that defines the format of digital certificates used in PKI. These certificates contain information such as the public key, certificate holder’s identity, issuing authority, and validity period, and are issued by a Certificate Authority (CA).
Q: 23 If an encryption key is n bits long, then how many distinct encryption keys are possible?
2n
2n -1
(n*(n+1))/2
2n
[ Option A ]
A key of n bits means the key is composed of n binary digits, and each bit can take two possible values: 0 or 1. Since each bit has two possibilities and the bits are independent, the total number of different combinations that can be formed is 2 multiplied n times, which equals 2n. Therefore, an n-bit key can generate 2n distinct encryption keys.
For example, if the key length is 3 bits, the possible keys are, 000, 001, 010, 011, 100, 101, 110, 111 = 8 Keys = 23.
Thank you so much for taking the time to read my Computer Science MCQs section carefully. Your support and interest mean a lot, and I truly appreciate you being part of this journey. Stay connected for more insights and updates! If you'd like to explore more tutorials and insights, check out my YouTube channel.
Don’t forget to subscribe and stay connected for future updates.