1. Computer Science Engineering (CSE)
  2. Information Cyber Security (ICS)
  3. Set 11

Information Cyber Security (ICS) Solved MCQs

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide

Take a Test
251.

The procedure to add bits to the last block is termed as

A. decryption
B. hashing
C. tuning
D. padding
Answer» D. padding
252.

Cryptanalysis is used                      

A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers
Answer» A. to find some insecurity in a cryptographic scheme
253.

Conventional cryptography is also known as or symmetric-key encryption.

A. secret-key
B. public key
C. protected key
D. primary key
Answer» A. secret-key
254.

                                           is the art & science of cracking the cipher-text without knowing the key.

A. cracking
B. cryptanalysis
C. cryptography
D. crypto-hacking
Answer» B. cryptanalysis
255.

In cryptography, what is cipher?

A. algorithm for performing encryption and decryption
B. encrypted message
C. both algorithm for performing encryption and decryption and encrypted message
D. decrypted message
Answer» A. algorithm for performing encryption and decryption
256.

In asymmetric key cryptography, the private key is kept by __________

A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» B. receiver
257.

In cryptography, the order of the letters in a message is rearranged by __________

A. transpositional ciphers
B. substitution ciphers
C. both transpositional ciphers and substitution ciphers
D. quadratic ciphers
Answer» A. transpositional ciphers
258.

Cryptanalysis is used __________

A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers
Answer» A. to find some insecurity in a cryptographic scheme
259.

Which one of the following is a cryptographic protocol used to secure HTTP connection?

A. stream control transmission protocol (sctp)
B. transport layer security (tls)
C. explicit congestion notification (ecn)
D. resource reservation protocol
Answer» B. transport layer security (tls)
260.

Voice privacy in GSM cellular telephone protocol is provided by _______

A. a5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Answer» A. a5/2 cipher
261.

ElGamal encryption system is __________

A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. block cipher method
Answer» B. asymmetric key encryption algorithm
262.

Cryptographic hash function takes an arbitrary block of data and returns _________

A. fixed size bit string
B. variable size bit string
C. both fixed size bit string and variable size bit string
D. variable sized byte string
Answer» A. fixed size bit string
263.

In the above figure from left to right, the correct order of the shaded levels are

A. network level, application level, transport level
B. application level, network level, transport level
C. transport level, application level, network level
D. network level, transport level, application level
Answer» D. network level, transport level, application level
264.

In the above figure, which of the above shaded block is transparent to end users and applications?

A. ip/ipsec
B. ssl
C. kerberos
D. s/mime
Answer» A. ip/ipsec
265.

In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

A. true
B. false
Answer» B. false
266.

Which one of the following is not a higher –layer SSL protocol?

A. alert protocol
B. handshake protocol
C. alarm protocol
D. change cipher spec protocol
Answer» C. alarm protocol
267.

In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

A. 216
B. 232
C. 214
D. 212
Answer» C. 214
268.

The full form of SSL is

A. serial session layer
B. secure socket layer
C. session secure layer
D. series socket layer
Answer» B. secure socket layer
269.

Which protocol is used to convey SSL related alerts to the peer entity?

A. alert protocol
B. handshake protocol
C. upper-layer protocol
D. change cipher spec protocol
Answer» A. alert protocol
270.

Which protocol consists of only 1 bit?

A. alert protocol
B. handshake protocol
C. upper-layer protocol
D. change cipher spec protocol
Answer» D. change cipher spec protocol
271.

Which protocol is used for the purpose of copying the pending state into the current state?

A. alert protocol
B. handshake protocol
C. upper-layer protocol
D. change cipher spec protocol
Answer» D. change cipher spec protocol
272.

In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.

A. select, alarm
B. alert, alarm
C. warning, alarm
D. warning, fatal
Answer» D. warning, fatal
273.

Pretty good privacy (PGP) security system uses

A. public key cryptosystem
B. private key cryptosystem
C. public & private key cryptosystem
D. none of the mentioned
Answer» C. public & private key cryptosystem
274.

Data compression includes

A. removal of redundant character
B. uniform distribution of characters
C. removal of redundant character & uniform distribution of characters
D. none of the mentioned
Answer» C. removal of redundant character & uniform distribution of characters
275.

PGP offers _____ block ciphers for message encryption.

A. triple-des
B. cast
C. idea
D. all of the mentioned
Answer» D. all of the mentioned
Tags
Question and answers in Information Cyber Security (ICS), Information Cyber Security (ICS) multiple choice questions and answers, Information Cyber Security (ICS) Important MCQs, Solved MCQs for Information Cyber Security (ICS), Information Cyber Security (ICS) MCQs with answers PDF download