Q: 1 What is the advantage of setting up a DMZ (Demilitarized Zone) using firewall?
Improve network performance
To create multiple zones of trust
Load balancing on the server
Brings internet service into home from internet service provider
[ Option B ]
The primary advantage of setting up a DMZ (Demilitarized Zone) using a firewall is to create multiple zones of trust within a network, which enhances security. A DMZ acts as a buffer zone between the public Internet and the internal private network, isolating public-facing servers (such as web, email, and DNS servers) from sensitive internal resources. This setup allows external users to access services in the DMZ while preventing direct access to the internal network.
Q: 3 SHA-2 algorithm generate ____________ length of hash value.
128 bits
512 bits
256 bits
1024 bits
[ Option B ]
The SHA-2 (Secure Hash Algorithm 2) family is a set of cryptographic hash functions designed to provide secure hashing for data integrity and digital signatures.
SHA-2 includes variants such as SHA-224, SHA-256, SHA-384, and SHA-512, where the number in the name indicates the length of the hash output in bits.
SHA-256, the most commonly used variant, produces a 256-bit (32-Byte) hash value.
Q: 4 Input block size, key size and output block size in Data Encryption Standard (DES) are respectively:
128-bit, 64-bit, 128-bit
64-bit, 32-bit, 64-bit
64-bit, 56-bit, 64-bit
64-bit, 64-bit, 128-bit
[ Option C ]
Data Encryption Standard (DES) is a symmetric key block cipher widely used for secure data transmission.
This design allows secure encryption and decryption using the same 56-bit key.
| Symmetric Encryption Algorithms | Key Size | Message Size |
|---|---|---|
| DES (Data Encryption Standard) | 56 bits | 64-bit block |
| 3DES (Triple DES) | 112 or 168 bits | 64-bit block |
| AES (Advanced Encryption Standard) | 128, 192, or 256 bits | 128-bit block |
| Blowfish | 32–448 bits | 64-bit block |
| IDEA (International Data Encryption Algorithm) | 128 bits | 64-bit block |
| RC4 | 40–2048 bits | Stream cipher |
| Asymmetric Encryption Algorithms | Key Size | Message Size |
|---|---|---|
| RSA (Rivest–Shamir–Adleman) | 1024–4096 bits | Variable |
| ECC (Elliptic Curve Cryptography) | 160–521 bits | Variable |
Q: 5 Which of the following is the default authentication mode for IIS?
Anonymous
Windows
Basic authentication
None of these
[ Option A ]
By default, IIS (Internet Information Services) allows users to access web content without requiring credentials. This is called Anonymous Authentication, where the server uses a built-in account to handle requests from unauthenticated users.
Q: 6 In Data Encryption Standard (DES), the number of rounds is _________.
8
16
24
56
[ Option B ]
Data Encryption Standard (DES) is a Symmetric Key block cipher algorithm that uses the same secret key for both encryption and decryption.
The encryption process in DES consists of a series of operations known as rounds. In DES total 16 rounds are performed, making the encryption much stronger and harder to break through Brute-Force or Statistical Attacks.
Q: 7 In the given key pattern:
1 → 4, 2 → 8, 3 → 1, 4 → 5, 5 → 7, 6→2, 7→6, 8→3
The first bit of plaintext moves to the fourth position of ciphertext and so on.
What would be the cipher text in transposition cipher for the following plaintext ?
Plaintext : SACKGAUL
(Note: above plaintext should be read from right to left)
UKAGLSCA
KUCGASLA
SCAUKAGL
SAUKCALG
[ Option A ]
Given, Plaintext = SACKGAUL, but it says read from right to left, so we reverse it: LUAGKCAS. Now, the positions are:
| POSITION | LETTER |
|---|---|
| 1 | L |
| 2 | U |
| 3 | A |
| 4 | G |
| 5 | K |
| 6 | C |
| 7 | A |
| 8 | S |
The given key pattern:
1 → 4
2 → 8
3 → 1
4 → 5
5 → 7
6 → 2
7 → 6
8 → 3
This means:
The 1st plaintext letter goes to 4th position in ciphertext.
The 2nd plaintext letter goes to 8th position in ciphertext.
The 3rd plaintext letter goes to 1st position and so on. So,
| PLAINTEXT LETTER | GOES TO POSITION | CIPHERTEXT POSITION |
|---|---|---|
| L (1) | 4 | 4th = L |
| U (2) | 8 | 8th = U |
| A (3) | 1 | 1st = A |
| G (4) | 5 | 5th = G |
| K (5) | 7 | 7th = K |
| C (6) | 2 | 2nd = C |
| A (7) | 6 | 6th = A |
| S (8) | 3 | 3rd = S |
Now after arranging ciphertext in order 1 to 8, ACSLGAKU. Since plaintext was read right to left, the ciphertext is also read from right to left, i.e., UKAGLSCA.
Q: 8
In context of network security match the following –
| Column – I | Column – II |
|---|---|
| (P) Fabrication | 1. Message Confidentiality |
| (Q) Modification | 2. Message Integrity |
| (R) Interception | 3. Authentication |
P-1, Q-3, R-2
P-2, Q-1, R-3
P-3, Q-1, R-2
P-3, Q-2, R-1
[ Option D ]
Fabrication refers to creating fake messages or data, so authentication mechanisms are used to detect and prevent this.
Modification means altering messages during transmission. Ensuring message integrity detects such tampering.
Interception refers to unauthorized access or eavesdropping. Confidentiality (encryption) protects the message content.
Q: 9 Secure Hash Algorithm-1 (SHA-1) has a message digest of –
160 bits
512 bits
628 bits
820 bits
[ Option A ]
Secure Hash Algorithm-1 (SHA-1) produces a message digest of 160 bits (20 bytes). SHA-1 takes an input of any length (less than 264 bits) and outputs a fixed-length hash value of 160 bits. This hash value, called the message digest, is used for data integrity verification, digital signatures, and other cryptographic applications.
Q: 10 In context of Intrusion Detection Systems, which of the following is not true about honeypots?
Divert attention of a potential intruder from critical systems.
Collect information about the intruder's actions.
Look like real-life systems.
Allow legitimate users to know about or access honeypots.
[ Option D ]
A Honeypot is a security mechanism used in Intrusion Detection Systems (IDS) to attract attackers and study their behavior. It is designed to look like a real system containing valuable data or services, but it is actually a Decoy that isolates and monitors malicious activities.
Honeypots help in diverting attackers’ attention away from critical systems and collecting information about their methods, tools, and intentions.
However, Legitimate Users are not supposed to know about or access honeypots, as their purpose is purely for monitoring and deception.
Q: 11 Which of the following is not a symmetric key cryptography algorithm?
RC4
Blowfish
Diffie-Hellman
DES
[ Option C ]
Symmetric key algorithms use the same key for encryption and decryption. RC4, Blowfish, and DES (Data Encryption Standard) are examples of symmetric key cryptography algorithms.
Diffie-Hellman is a key exchange algorithm and is part of asymmetric key cryptography, used to securely exchange cryptographic keys over a public channel. It is not an encryption algorithm itself.
Q: 12 A proxy firewall filter works at –
Physical Layer
Data link Layer
Network Layer
Application Layer
[ Option D ]
A Proxy Firewall filter works at the Application Layer of the OSI model. It acts as an intermediary between a client and a server, intercepting all requests and responses.
| Firewall Type | OSI Layer | Description |
|---|---|---|
| Packet-Filtering Firewall | Network Layer | Filters packets based on IP address, protocol, and port. Fast but limited visibility. |
| Stateful Inspection Firewall | Network & Transport Layer | Tracks the state of active connections, allows or blocks packets based on state, port, and protocol. |
| Proxy Firewall | Application Layer | Acts as an intermediary, inspects application data, supports HTTP, FTP, SMTP, etc. Provides deep packet inspection. |
| Next-Generation Firewall (NGFW) | Network to Application Layer | Combines traditional firewall capabilities with deep packet inspection and application awareness. |
| Circuit-Level Gateway | Session Layer | Monitors TCP handshakes and sessions without inspecting packet contents deeply. |
Q: 13 Which of following is a technique that facilitates hiding of a message that is to be kept secret inside an image?
Steganography
Cryptography
Encryption
Calligraphy
[ Option A ]
A plain text message can be hidden or protected in two main ways.
Steganography is a technique used to hide secret messages or data within another file, such as an image, audio, or video, in such a way that its existence is not apparent to others.
For example, a confidential message can be hidden inside the pixel values (modifying the Least Significant Bits (LSBs) of the Pixels) of an image file without noticeably changing the image itself.
Cryptography transforms plaintext into ciphertext via encryption, rendering the content unintelligible to outsiders without the decryption key.
Q: 14 In RSA, let the two prime numbers are P = 7, Q = 17 and public key e = 5. Find the Cipher text for the plain text 10.
40
77
96
119
[ Option A ]
In RSA encryption, we are given P = 7, Q = 17, public key e = 5, and plaintext M = 10.
First, calculate n = P × Q = 7 × 17 = 119 and φ(n) = (P - 1) × (Q - 1) = 6 × 16 = 96.
The public key pair is therefore (5, 119). Using the encryption formula C = Me mod n, we get C = 105 mod 119 = 40.
Thank you so much for taking the time to read my Computer Science MCQs section carefully. Your support and interest mean a lot, and I truly appreciate you being part of this journey. Stay connected for more insights and updates! If you'd like to explore more tutorials and insights, check out my YouTube channel.
Don’t forget to subscribe and stay connected for future updates.