A directory of Objective Type Questions covering all the Computer Science subjects.

1.
Consider the two statements. 

(A) Protection is an internal problem.
(B) Security is considered as an external environment within which the system works.
Which of the statement is not true?
a. Only A
b. Only B
c. Both A and B
d. None of the above
View Answer Report Discuss Too Difficult! Search Google
Answer: (d).None of the above

2.
Which of the following is true ? 
a. Block cipher technique is an encryption technique.
b. Steam cipher technique is an encryption technique.
c. Both a and b.
d. Neither of a and b.
View Answer Report Discuss Too Difficult! Search Google
Answer: (c).Both a and b.

3.
Program generation activity aims at
a. Automatic generation of program
b. Organize execution of a program written in PL
c. Skips generation of program
d. Speedens generation of program
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).Automatic generation of program

4.
The main reason to encrypt a file is to ______________. 
a. Reduce its size
b. Secure it for transmission
c. Prepare it for backup
d. Include it in the start-up sequence
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).Secure it for transmission

5.
A public key encryption system
a. Allows only the correct receiver to decode the data
b. Allows only one to decode the transmission
c. Allows only the correct sender to decode the data
d. Does not encode the data before transmitting it
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).Allows only the correct receiver to decode the data

6.
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message.
a. (I) and (II) only
b. (I) only
c. (II) only
d. (II) and (III) only
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).(I) only

7.
In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________. 
a. 11
b. 13
c. 16
d. 17
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).11

Page 1 of 1

copyright 2016 computer science bitsCompscibits.com