Information and Security BCA Eight semester MCQ 2018 batch 2023 MCQ with answersheet

3066

 

I) Which of the following is not category of active attack?

a) Masquerade
b) Replay
c) Modification of Message
d) Traffic analysis

 

ii.Which cipher is best known diagraph substitution cipher?

a) Ceasar cipher
b) Vigenere cipher
c) Playfair Cipher
d)Shift chipher

 

ili. In asymmetric cryptography, who is kept private key?

a)Receiver

b)Sender
c)Both sender and receiver
d) All the connected devices to the network

 

iv) How many bytes are required to store SHA-1 hash value?

a) 32 byte
b) 20 byte
c) 64 byte
d) 16 byte

 

v) Which one of the following produces a signature for the document?

a) Key generation algorithm.
b) Signature verifying algorithm
c) Signing algorithm
d) authentication

vi) Which of the following is the least secure method of authentication?

a) key card
b) Fingerprint
c) Retina pattern
d) Password

vii) Which of the following process is used for verifying identity of user?

a) Authentication
b) Identification
c) Validation
d) verification

viii) What are different ways to classify an IDS?

a) Zone based
c) Network and Zone based
b) Host and Network based
d) Level based

ix) A firewall protects which of following attacks?

a) Phishing
b) Dumpster diving
c) Denial of Service (DoS)
d) Shoulder surfing

x) Which of the following software module periodically extracts record from the audit trail to create archive of auditable events?

a) Audit analyzer
b) Audit archiver
c) Archives
d) Audit provider

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here