MCQ

Computer Security MCQs – Multiple Choice Questions and Answers – Part 4

Multiple choice questions and answers (MCQs) on Computer Security to prepare for exams, tests, and certifications. These questions are taken from a real written exam and some parts are taken from an interview. So you will find questions on basic techniques such as encryption, signature, certificates, authentication, and more. This MCQ will easily prepare anyone to pass their exam.
 

1. When you log in to an online service, you are asked to provide some sort of identification, such as your name, account number, and password. What is the name given to this brief interaction?

A Security procedures

B Connection procedure

C Backup procedure

D Identification procedure

B
 

2. Which hash algorithm does the DSS signature use?

A MD5

B SHA-2

C SHA-1

D Does not use a hash algorithm
 

 
C
The DSS digital signature uses SHA-1.
 
Digital Signature Standard (DSS) are used to detect unauthorized data changes and to authenticate the identity of the signer.

 

 

3. ________ is a form of virus explicitly designed to avoid detection by antivirus software.

A Stealth virus

B Polymorphic virus

C Parasitic virus

D Macro viruses

A
The stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.

 

 

4. One part of the polymorphic virus, usually called ________, creates a random cipher and a key to encrypt the rest of the virus.

A mutual engine

B mutation engine

C multiple engine

D polymorphic engine

B
The polymorphic virus uses its mutation engine called MtE (the Mutation Engine) to generate a new decryption routine each time it infects a new program.

 

 

5. Indicate whether the following statement is true:
“Macro virus is a platform-independent virus.”

A True

B False

A

 

 
 

6.Indicate whether the following statement is true:
“Macro viruses infect documents, not parts of the executable code.”

A True

B False

A

 

 

7. A _________ is a program that takes control of another computer connected to the Internet, then uses that computer to launch attacks.

A Worm

B Zombie

C Virus

D Trap doors

B

 

 

8. Which hash algorithm does RSA signature use?

A MD5

B SHA-1

C MD5 and SHA-1

D Trap doors

C
The MD5 and SHA-1 hash is concatenated and then encrypted with the server’s private key.

 

 
 

9. “certificate_request” has two parameters, one of them is _____?

A certificate_extension

B certificate_creation

C certificate_exchange

D certificate_type

D
“certificate_request” includes two parameters: “certificate_type” and “certificate_authorities.

 

 

10. What is the size of an RSA signature after MD5 and SHA-1 processing?

A 42 bytes

B 32 bytes

C 36 bytes

D 48 bytes

C
The size is 36 bytes after MD5 and SHA-1 processing.

 

 
mcqMCQPractice competitive and technical Multiple Choice Questions and Answers (MCQs) with simple and logical explanations to prepare for tests and interviews.Read More

Leave a Reply

Your email address will not be published. Required fields are marked *