1. The MD5 is a message digest algorithm developed by ______.
a. Ron Rivest.
b. WhiteField Diffie.
c. Martin Hellman.
d. Diffie-Hellman.
Answer: A.
2. The original message digest algorithm is called as _______.
a. MAC.
b. SHA.
c. MD.
d. DSA.
Answer: C.
3. MD5 is quite fast and produces ________ message digests.
a. 512 bits.
b. 1024 bits.
c. 128 bits.
d. 64 bits.
Answer: C.
4. The first step of MD5 is __________.
a. add padding bits to original messsge.
b. adding append length bits.
c. divide the input into 512 bit blocks.
d. compression.
Answer: A.
5. In MD5, the process block divides the 512 bits into ________ sub blocks.
a. 16.
b. 24.
c. 32
d. 84.
Answer: A.
6. Which financial institutions have a relationship with merchants for processing payment
card authorizations and payments?
a. Issuer.
b. Acquirer.
c. Merchant.
d. Dealer.
7. Which of the following contains the order information such as which items are being
a. PI.
b. OI.
c. MD.
d. DS.
Answer: B.
8. The purchase request exchange is made up of _______ messages.
a. 2.
b. 3.
c. 4.
d. 5.
Answer: C.
9. The payment gateway sends back an _________ message to the merchant.
a. authorization response.
b. request.
c. no response.
d. acknowledgement.
Answer: A.
10. Payment information can be encrypted by using ________.
a. customer’s private key.
b. merchant public key.
c. one-time session key.
d. customer’s public key.
Answer: C.
11. Digital signature envelope is decrypted by using _________.
a. merchant private key.
b. payment’s private key.
c. payment public key.
d. merchant’s public key.
Answer: B.
12. __________ will ensure the merchant and their payment information.
a. Digital certificate.
b. Merchant.
c. Dual signature.
d. Certificate authority.
Answer: C.
13. SET provides an authentication with the help of ____________.
a. dual signature.
b. digital certificate.
c. payment’s public key.
d. payment’s private key.
14. _________ helps in ensuring non-fraudulent transactions on the web.
a. Certificate authority
b. Digital authority.
c. Dual authority.
d. Digital signature.
Answer: A.
15. SSL is placed in between the ________ layers.
a. transport & datalink.
b. application & presentation.
c. application & transport.
d. application & session.
Answer: C.
16. SSL is used to encrypt the ___________.
a. L5 data.
b. L4 data.
c. L3 data.
d. L2 data.
Answer: A.
17. SSL provides only ___________.
a. authentication.
b. confidentiality.
c. integrity.
d. durability.
Answer: A.
18. ___________are very crucial for success of RSA algorithm.
a. Integers.
b. Prime numbers.
c. Negative number.
d. Fraction.
Answer: B.
19. In the basic TCP/IP protocol suite, the number of layers used are _________.
a. 4.
b. 6.
c. 5.
d. 7.
Answer: A.
20. Physical layer transmits the data in TCP/IP as _________.
a. packets.
b. pulse codes.
c. data.
d. bits.
21. S/MIME stands for ____________.
a. standard multipurpose internet mail extensions.
b. secure multipurpose internet mail extensions.
c. secure multipurpose international mail extensions.
d. standard multipurpose international mail extensions.
Answer: B.
22. _________ uniquely identifies the MIME entities uniquely with reference to multiple
a. Content description.
b. Content -id.
c. Content type.
d. Content transfer encoding.
Answer: B.
23. The processed S/MIME along with security related data is called as ________.
a. public key cryptography standard.
b. private key cryptography standard.
c. S/MIME.
d. MIME.
Answer: A.
24. In S/MIME,MLA stands for __________.
a. mailing list agent.
b. multipurpose list agent.
c. mail lock agent.
d. message link agent.
Answer: A.
25. The cryptography algorithms used in S/MIME are _________.
a. IDEA.
b. RC4.
c. RSA,DES-3.
d. RC5.
Answer: C.
26. The __________ acts as financial institutions who provides a payment card to a card
a. payment gateway.
b. card holder.
c. acquirer.
d. issuer.
Answer: D.
27. Who will be responsible for processing the payment from the customer’s account to
the merchant account?
a. Acquirer.
b. Merchant.
c. Issuer.
d. Payment gateway.
28. The cardholder combines the PIMD and OIMD and hashes them together to form
a. OPMD.
b. POMD.
c. MD.
d. DS.
Answer: B.
29. Which process will ensure that the issues of the credit card is an approved
a. Payment capture.
b. Payment authorization.
c. Purchase request.
d. Purchase reply.
Answer: B.
30. _________ is used for hiding the payment information from the merchant.
a. SET.
b. SSL.
d. TSP.
Answer: A.
31. _________ is a block cipher.
a. DES.
b. IDEA.
c. AES.
d. RSA.
Answer: A.
32. DES encrypts data in block size of __________ bits each.
a. 64.
b. 128.
c. 32.
d. 56.
Answer: A.
33. Merkle and Hellman introduced the concept of ________.
a. meet in middle attack.
b. meet in attack.
c. hijack.
d. virus attacks.
Answer: A.
34. Data Encryption Standard also called as __________.
a. Data Encryption Algorithm.
b. Double DES.
c. AES.
d. RSA.
35. __________ is generally used in ECB,CBC, or CFB mode.
a. DES
b. AES
d. RSA.
Answer: A.
36. DES consists of __________ rounds to perform the substitution and transposition
a. 16.
b. 18.
c. 21.
d. 25.
Answer: A.
37. _________is the first step in DES.
a. Key transformation.
b. Expansion permutation.
c. S-box substitution.
d. P-box substitution.
Answer: A.
38. ___________ substitution is a process that accepts 48 bits from the XOR operation.
a. S-box.
b. P-box.
c. Expansion permutations.
d. Key transformation.
Answer: A.
39. __________ refers more to asymmetric key cryptography.
a. Timing attack.
b. Meet in middle attack.
c. Virus attack.
d. Worms attack.
Answer: A.
40. Eli Biham & Adi Shamir introduced ___________.
a. differential & linear cryptoanalysis.
b. Double DES.
c. DES.
d. RSA.
Answer : A.
41. Electronic money is also called as _______________.
a. digital cash.
b. internet cash.
c. eucash.
d. physical cash.
42. The physical form of money is converted into ___________.
a. octal form.
b. hexadecimal.
c. decimal.
d. binary form.
Answer: D.
43. The bank ___________the customer’s message after getting the email request for emoney.
a. integrate.
b. access.
c. authenticates.
d. non-repudiate.
Answer: C.
44. The encryption of an original message can be done __________.
a. only once.
b. twice.
c. thrice.
d. many times.
Answer: B.
45. Customer uses ____________ key for decryption.
a. public key.
b. private key.
c. secret key.
d. hash key.
Answer: B.
46. E-money is classified into __________types.
a. 3.
b. 2.
c. 4.
d. 5.
Answer: B.
47. The bank can trace the transaction using ___________money.
a. anonymous.
b. identified.
c. physical.
d. rational.
Answer: B.
48. In anonymous e-money ___________ factor is used to encrypt the random number.
a. blinded.
b. prince.
c. prime.
d. anonymity.
Answer: A.

Leave a Reply

Subscribe to Posts | Subscribe to Comments

Follow by Email

All Notes on BCA

All Notes  on BCA
BCA all subjects notes

Total Pageviews

Google+ Followers


Powered by Blogger.

- Copyright © All Notes on BCA - Metrominimalist - Powered by Blogger - Designed by Johanes Djogan -