Branch Wise MCQComputer Science McqsCyber Security 100+ MCQ & Answer Cyber Security | page-08 | Computer Course MCQ And Answer 28/01/2025 DSN MARATHI Last Updated on: 14/10/2025 71. Data ___________ is used to ensure confidentiality. A. Encryption B. Locking C. Decryption D. Backup Answer Option : A 72. What does OSI stand for in the OSI Security Architecure? A. Open System Interface B. Open Systems Interconnections C. Open Source Initiative D. Open Standard Interconnections Answer Option : B 73. A company requires its users to change passwords every month. This improves the ________ of the network. A. Performance B. Reliability C. Security D. None of the above Answer Option : C 74. Release of message contents and Traffic analysis are two types of _________ attacks. A. Modification of Attack B. Active Attack C. Passive attack D. DoS Attack Answer Option : C 75. The ________ is encrypted text. A. Cipher scricpt B. Cipher text C. Secret text D. Secret script Answer Option : B 76. Which of the following Algorithms not belong to symmetric encryption A. 3DES (TripleDES) B. RSA C. RC5 D. IDEA Answer Option : B 77. Which is the largest disadvantage of the symmetric Encryption? A. More complex and therefore more time-consuming calculations. B. Problem of the secure transmission of the Secret Key. C. Less secure encryption function. D. Isn’t used any more. Answer Option : B 78. In cryptography, what is cipher? A. algorithm for performing encryption and decryption B. encrypted message C. both algorithm for performing encryption and decryption and encrypted message D. decrypted message Answer Option : A 79. Which one of the following algorithm is not used in asymmetric-key cryptography? A. rsa algorithm B. diffie-hellman algorithm C. electronic code book algorithm D. dsa algorithm Answer Option : C 80. What is data encryption standard (DES)? A. block cipher B. stream cipher C. bit cipher D. byte cipher Answer Option : A
71. Data ___________ is used to ensure confidentiality. A. Encryption B. Locking C. Decryption D. Backup Answer Option : A
72. What does OSI stand for in the OSI Security Architecure? A. Open System Interface B. Open Systems Interconnections C. Open Source Initiative D. Open Standard Interconnections Answer Option : B
73. A company requires its users to change passwords every month. This improves the ________ of the network. A. Performance B. Reliability C. Security D. None of the above Answer Option : C
74. Release of message contents and Traffic analysis are two types of _________ attacks. A. Modification of Attack B. Active Attack C. Passive attack D. DoS Attack Answer Option : C
75. The ________ is encrypted text. A. Cipher scricpt B. Cipher text C. Secret text D. Secret script Answer Option : B
76. Which of the following Algorithms not belong to symmetric encryption A. 3DES (TripleDES) B. RSA C. RC5 D. IDEA Answer Option : B
77. Which is the largest disadvantage of the symmetric Encryption? A. More complex and therefore more time-consuming calculations. B. Problem of the secure transmission of the Secret Key. C. Less secure encryption function. D. Isn’t used any more. Answer Option : B
78. In cryptography, what is cipher? A. algorithm for performing encryption and decryption B. encrypted message C. both algorithm for performing encryption and decryption and encrypted message D. decrypted message Answer Option : A
79. Which one of the following algorithm is not used in asymmetric-key cryptography? A. rsa algorithm B. diffie-hellman algorithm C. electronic code book algorithm D. dsa algorithm Answer Option : C
80. What is data encryption standard (DES)? A. block cipher B. stream cipher C. bit cipher D. byte cipher Answer Option : A