MCQ

Computer Security MCQs – Multiple Choice Questions and Answers – Part 3

Multiple choice questions and answers (MCQs) on Computer Security to prepare for exams, tests, and certifications. These questions are taken from a real written exam and some parts are taken from an interview. So you will find questions on basic techniques such as encryption, signature, certificates, authentication, and more. This MCQ will easily prepare anyone to pass their exam.
 

1. The ______ attaches itself to executable files and replicates itself, when the infected program is executed, looking for other executable files to infect.

A Stealth Virus

B Polymorphic Virus

C Parasitic Virus

D Macro Virus

C
Parasitic viruses attach themselves to programs, also called executables. When a user launches a program containing a parasitic virus, the virus is launched first. To hide its presence from the user, the virus then triggers the original program to open. Because the operating system understands that it is part of the program, the parasite virus has the same rights as the program to which the virus is attached. These rights allow the virus to replicate itself, install itself in memory or release its payload. In the absence of antivirus software, only the payload can arouse the suspicion of the normal user. A famous parasitic virus called Jerusalem has the power to slow down the system and eventually delete all programs launched by the user.

 

 

2. Number of rounds in the DES (Data Encryption Standard) algorithm is ______?

A 8 rounds

B 12 rounds

C 16 rounds

D 24 rounds

C
DES uses the Feistel structure with 16 rounds.

 

 
 

3. ________ transforms the message into a format that cannot be read by hackers.

A Decryption

B Encryption

C Transforming

D None of the above

B
Encryption is a way of transforming data in such a way that only approved persons can decipher it and then transform it into something understandable.

 

 

4. What is the port number for HTTPS (HTTP Secure)?

A 43

B 443

C 445

D 444

B

 

 

5. The encryption and decryption of data is the responsibility of which layer?

A Session layer

B Network layer

C Transport layer

D Presentation layer

D
The presentation layer is concerned with maintaining the correct meaning of information in a network. The presentation layer can represent data in a variety of ways (e.g., encryption), but the recipient converts the encoding back to its original meaning.

 

 

6. What is the algorithm of key exchange used in the parameter of a Cipher Suite?

A RSA

B Fixed Diffie-Hellman

C Ephemeral Diffie-Hellman

D All the answers are true
 

 
D
We can use any of the following for the key exchange of a cryptographic suite.

  • RSA
  • Fixed Diffie-Hellman
  • Ephemeral Diffie-Hellman
  • Anonymous Diffie-Hellman
  • Fortezza.

 

 

7. The certificate message is required for any agreed key exchange method, except__________.

A Ephemeral Diffie-Hellman

B Anonymous Diffie-Hellman

C Fixed Diffie-Hellman

D RSA

B
The certificate message is required for any agreed key exchange method except Anonymous Diffie-Hellman.
 
Anonymous Diffie-Hellman uses Diffie-Hellman, but without authentication. As the keys used in the exchange are not authenticated, the protocol is susceptible to Man-in-the-Middle attacks.

 

 

8. The types of threats to the security of a computer system or a network are _______ ?

A Interruption

B Interception

C Modification

D Creation

E Fabrication

A, B, C, E

 

 
 

9. Firewalls are used for __________

A Routing

B Security

C Tunneling

D Congestion control

B

 

 

10. _________ is used to validate the identity of the message sender to the recipient.

A Encryption

B Decryption

C Digital certificate

D None of the above

C
Digital certificates allow a user to verify to whom a certificate is issued as well as its issuer. Digital certificates are used by SSL for public key cryptography. Public key cryptography uses two keys: a private key and a public key.

 

 
mcqMCQPractice competitive and technical Multiple Choice Questions and Answers (MCQs) with simple and logical explanations to prepare for tests and interviews.Read More

Leave a Reply

Your email address will not be published. Required fields are marked *