Cryptography and Information Security Tools MCQ
1. Which tool can be used for spoofing ARP packets on a network? a) Arpingb) Wiresharkc) TCPViewd) Steganos Answer: a) Arping Explanation: Arping is a … Read more
1. Which tool can be used for spoofing ARP packets on a network? a) Arpingb) Wiresharkc) TCPViewd) Steganos Answer: a) Arping Explanation: Arping is a … Read more
1. What is a common threat in network security that involves an attacker intercepting sensitive information transmitted over a network? a) Phishingb) Spoofingc) Man-in-the-middle (MITM) … Read more
1. Which cryptographic technique ensures the integrity and authenticity of a message by appending a unique code generated with a private key?a) Message Authentication Code … Read more
1. What is the underlying principle behind the Advanced Encryption Standard (AES)? a) Public key encryptionb) Symmetric key encryptionc) Elliptic curve cryptographyd) Quantum cryptography Answer: … Read more
1. What branch of mathematics forms the foundation of modern cryptography? a) Calculusb) Geometryc) Abstract Algebrad) Trigonometry Answer: c) Abstract Algebra Explanation: Abstract Algebra, particularly … Read more