430+ Information Cyber Security (ICS) Solved MCQs

301.

Network administrators can create their own ACL rules based on _______ ________ and _______

A. address, protocols and packet attributes
B. address, protocols and security policies
C. address, policies and packet attributes
D. network topology, protocols and data packets
Answer» A. address, protocols and packet attributes
302.

One advantage of Packet Filtering firewall is __________

A. more efficient
B. less complex
C. less costly
D. very fast
Answer» C. less costly
303.

Packet filtering firewalls work effectively in _________ networks.

A. very simple
B. smaller
C. large
D. very large complex
Answer» B. smaller
304.

Packet filtering firewalls are vulnerable to __________

A. hardware vulnerabilities
B. mitm
C. phishing
D. spoofing
Answer» D. spoofing
305.

Circuit-level gateway firewalls are installed in _______ layer of OSI model.

A. application layer
B. session layer
C. presentation layer
D. network layer
Answer» B. session layer
306.

Which of these comes under the advantage of Circuit-level gateway firewalls?

A. they maintain anonymity and also inexpensive
B. they are light-weight
C. they’re expensive yet efficient
D. they preserve ip address privacy yet expensive
Answer» A. they maintain anonymity and also inexpensive
307.

Which of the following is a disadvantage of Circuit-level gateway firewalls?

A. they’re expensive
B. they’re complex in architecture
C. they do not filter individual packets
D. they’re complex to setup
Answer» C. they do not filter individual packets
308.

_____________ gateway firewalls are deployed in application-layer of OSI model.

A. packet filtering firewalls
B. circuit level gateway firewalls
C. application-level gateway firewalls
D. stateful multilayer inspection firewalls
Answer» C. application-level gateway firewalls
309.

Application level gateway firewalls protect the network for specific _____________

A. application layer protocol
B. session layer protocol
C. botnet attacks
D. network layer protocol
Answer» A. application layer protocol
310.

Application level gateway firewalls are also used for configuring cache-servers.

A. true
B. false
Answer» A. true
311.

Packet filtering firewalls are also called ____________

A. first generation firewalls
B. second generation firewalls
C. third generation firewalls
D. fourth generation firewalls
Answer» A. first generation firewalls
312.

Application layer firewalls are also called ____________

A. first generation firewalls
B. second generation firewalls
C. third generation firewalls
D. fourth generation firewalls
Answer» C. third generation firewalls
313.

Cyber-crime can be categorized into ________ types.

A. 4
B. 3
C. 2
D. 6
Answer» C. 2
314.

Accessing computer without prior authorization is a cyber-crimes that come under _______

A. section 65
B. section 66
C. section 68
D. section 70
Answer» B. section 66
315.

Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

A. section 65
B. section 66
C. section 68
D. section 70
Answer» B. section 66
316.

Accessing Wi-Fi dishonestly is a cyber-crime.

A. true
B. false
Answer» A. true
317.

Download copy, extract data from an open system done fraudulently is treated as _________

A. cyber-warfare
B. cyber-security act
C. data-backup
D. cyber-crime
Answer» D. cyber-crime
318.

Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________

A. 2 lacs
B. 3 lacs
C. 4 lacs
D. 5 lacs
Answer» D. 5 lacs
319.

How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

A. 1 year
B. 2 years
C. 3 years
D. 4 years
Answer» C. 3 years
320.

Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.

A. section 66
B. section 67
C. section 68
D. section 69
Answer» B. section 67
321.

IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

A. section 67-a
B. section 67-b
C. section 67-c
D. section 67-d
Answer» A. section 67-a
322.

If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
323.

Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

A. section 66
B. section 67
C. section 68
D. section 69
Answer» B. section 67
324.

Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.

A. true
B. false
Answer» A. true
325.

Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

A. 2 years
B. 3 years
C. 4 years
D. 5 years
Answer» B. 3 years
326.

Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

A. section 65
B. section 66
C. section 71
D. section 72
Answer» D. section 72
327.

Sending offensive message to someone comes under _____________ of the Indian IT Act ______

A. section 66-a, 2000
B. section 66-b, 2008
C. section 67, 2000
D. section 66-a, 2008
Answer» D. section 66-a, 2008
328.

Stealing of digital files comes under __________ of the Indian IT Act.

A. section 66-a
B. section 66-b
C. section 66-c
D. section 66-d
Answer» C. section 66-c
329.

Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.

A. true
B. false
Answer» A. true
330.

Security Measures Needed to protect during their transmission

A. file
B. data
C. packet
D. all of above
Answer» B. data
331.

                      means knowledge obtained from investigation, study , intelligence new ,facts .

A. security
B. data
C. information
D. none of these
Answer» C. information
332.

Prevention of the unauthorised used of Resources refers too?

A. data integrity
B. data confidentiality
C. acess control
D. none of these
Answer» C. acess control
333.

Protection against Denial by one of these parties in a communication refers to?

A. non-repudiation
B. data integrity
C. authentication
D. none of these
Answer» A. non-repudiation
334.

Which One of them is Passive attack?

A. denial of service
B. modify message in transit
C. replay previous message
D. obtain message contain
Answer» D. obtain message contain
335.

What is lying of IP address called as?

A. ip spoofing
B. ip scamming
C. ip lying
D. none of theses
Answer» A. ip spoofing
336.

What is full form of DDoS?

A. derived denial of service
B. distributed denial of service
C. denial of service
D. none of these
Answer» B. distributed denial of service
337.

A hacker guessing suggested password to a program is call as?

A. password guessing
B. dictionary attack
C. default password attack
D. none of these
Answer» C. default password attack
338.

Symmetric key encryption is also called as?

A. public key encryption
B. private key encryption
C. both of these
D. none of these
Answer» B. private key encryption
339.

Conversion of Cypher text to plain text?

A. encryption
B. decryption
C. simple text
D. none of these
Answer» B. decryption
340.

    is used to create the organisation's overall security program.

A. program policy
B. purpose
C. security
D. none of these
Answer» A. program policy
341.

An act of protecting information from unauthorised disclouser to an entity.-

A. intergrity
B. avability
C. confidentiality
D. none of these
Answer» C. confidentiality
342.

A way to ensure that the entity is indeed what it claims to be.-

A. authentication
B. accountability
C. identification
D. security
Answer» A. authentication
343.

The model is 7 layer architecture where each layer is having some specific functionality to perform.

A. tcp
B. osi
C. ois
D. none of these
Answer» B. osi
344.

The full form of OSI is OSI model .

A. open systems interconnection
B. open software interconnection
C. open connection
D. open system internet
Answer» A. open systems interconnection
345.

The technique in which when one character is replaced by another Character is called as?

A. transposition
B. substitution
C. combinational
D. none of these
Answer» B. substitution
346.

Conversion of plain text into Cipher text is called as .

A. encryption
B. decryption
C. hidden text
D. none of above
Answer» A. encryption
347.

In Symmetric schemes requires both parties to share how many secret key?

A. one
B. two
C. three
D. four
Answer» A. one
348.

Blum Blum Shub Generator is based on which Algorithm?

A. private key
B. public key
C. both a & b
D. none of these
Answer» B. public key
349.

In DES step both LPT and RPT undergoes in how much key Rounds?

A. 8
B. 16
C. 32
D. 64
Answer» B. 16
350.

What is the 4th step in DES Algorithm?

A. key transformation
B. s-box substitution
C. p-box permutation
D. expansion permutation
Answer» C. p-box permutation
351.

In AES in which Round Subkeys are Generated from Original key for each round?

A. key expansion
B. initial round
C. finale round
D. none of these
Answer» A. key expansion
352.

AES stands for?

A. authorized encryption standard
B. advance encryption standard
C. advance encryption strategy
D. none of these
Answer» B. advance encryption standard
353.

Which of them is type of Cipher?

A. stream cipher
B. block cipher
C. both of them
D. none of these
Answer» C. both of them
354.

The message which is not understandable is called as?

A. cipher text
B. plain text
C. hidden text
D. both a & c
Answer» A. cipher text
355.

The is a polygraphic substitution cipher based on linear algebra.

A. hill cipher
B. playfair cipher
C. affine cipher
D. none of these
Answer» A. hill cipher
356.

    is the practice of concealing a message within another message,image or file.

A. steganography
B. cryptography
C. cipher
D. receiver
Answer» A. steganography
357.

In asymmetric key cryptography, the private key is kept by                        

A. sender
B. receiver
C. sender and receiver
D. none of these
Answer» B. receiver
358.

What is data encryption standard (DES)?

A. block cipher
B. stream cipher
C. bit cipher
D. byte cipher
Answer» A. block cipher
359.

In cryptography the original message before being transform is called

A. simple text
B. plain text
C. empty text
D. filled text
Answer» B. plain text
360.

An asymmetric-key (or public-key) cipher uses

A. 1 key
B. 2 key
C. 3 key
D. 4 key
Answer» A. 1 key
361.

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A. short
B. flat
C. long
D. thin
Answer» C. long
362.

The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

A. authenticated
B. joined
C. submit
D. separate
Answer» A. authenticated
363.

In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

A. other
B. data
C. keys
D. each other
Answer» D. each other
364.

For RSA to work, the value of P must be less than the value of

A. p
B. q
C. n
D. r
Answer» C. n
365.

In RSA, Ф(n) = in terms of p and q.

A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)
Answer» C. (p-1)(q-1)
366.

In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).

A. true
B. false
Answer» B. false
367.

RSA is also a stream cipher like Merkel-Hellman.

A. true
B. false
Answer» A. true
368.

USENET falls under which category of public key sharing?

A. public announcement
B. publicly available directory
C. public key authority
D. public key certificate
Answer» A. public announcement
369.

PGP makes use of which cryptographic algorithm?

A. rsa
B. aes
C. des
D. robin
Answer» A. rsa
370.

Public key cryptography also called as                   

A. asymmetric key cryptography
B. symmetric key cryptography
C. both a and b
D. none of the above
Answer» A. asymmetric key cryptography
371.

ECC stands for

A. elliptic curve cryptography
B. elliptic cryptography curve
C. error correcting code
D. none of the above
Answer» A. elliptic curve cryptography
372.

Diffie-Hellman algorithm is widely known as                     

A. key exchange algorithm
B. key agreement algorithm
C. only a
D. both a and b
Answer» D. both a and b
373.

Hash function is used for                   

A. message authentication
B. digital signature
C. both a and b
D. only a
Answer» C. both a and b
374.

RSA algorithm is best example of                 

A. asymmetric key cryptography
B. symmetric key cryptography
C. elliptic curve cryptography
D. all of the above
Answer» A. asymmetric key cryptography
375.

IPSec is designed to provide security at the                      

A. transport layer
B. network layer
C. application layer
D. session layer
Answer» B. network layer
376.

In tunnel mode, IPSec protects the               

A. entire ip packet
B. ip header
C. ip payload
D. ip trailer
Answer» A. entire ip packet
377.

HTTPS is abbreviated as                      

A. secured hyper hypertexts transfer text transfer protocol secured protocol
B. none of the mentioned
C. hyperlinked text transfer protocol secured
D. hyper text transfer protocol secure
Answer» D. hyper text transfer protocol secure
378.

An attempt to make a computer resource unavailable to its intended users is called               

A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process
Answer» A. denial-of-service attack
379.

SSL primarily focuses on                   Pretty good privacy (PGP) is used in               

A. integrity and authenticity
B. integrity and non- repudiation
C. authenticity and privacy
D. confidentiality and integrity
Answer» A. integrity and authenticity
380.

                      is used for encrypting data at network level

A. ipsec
B. https
C. smtp
D. s/mime
Answer» A. ipsec
381.

WPA2 is used for security in                  

A. ethernet
B. wi-fi
C. bluetooth
D. e-mail
Answer» B. wi-fi
382.

Which of the following is not a strong security protocol

A. ssl
B. httpl
C. smtp
D. sftp
Answer» C. smtp
383.

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

A. true
B. false
Answer» A. true
384.

IPSec operates in..... different modes

A. 3
B. 2
C. 4
D. 5
Answer» B. 2
385.

length of the IPv4 address is ....

A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Answer» A. 32 bits
386.

Internet Key Exchange has .... phases and modes of operations

A. 4
B. 3
C. 2
D. 5
Answer» C. 2
387.

PGP is abbreviated as

A. pretty good privacy
B. pretty good policy
C. policy good privacy
D. pretty good protection
Answer» A. pretty good privacy
388.

SET stands for

A. set electronic transaction
B. secure electronic transaction
C. simple electronic transaction
D. none of the above
Answer» B. secure electronic transaction
389.

Transport layer Protocol consists of ... main components

A. 2
B. 1
C. 3
D. 4
Answer» A. 2
390.

length of the IPv6 acddress is ....

A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Answer» B. 64 bits
391.

SSL provides .

A. message integrity
B. confidentiality
C. compression
D. all of the above
Answer» D. all of the above
392.

IPSec provides ....protocols for network layer

A. 7
B. 3
C. 1
D. 4
Answer» A. 7
393.

length of the IPv6 header is....

A. 64 bits
B. 16 bits
C. 32 bits
D. 8 bits
Answer» C. 32 bits
394.

According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

A. confidentiality
B. integrity
C. authenticity
D. availability
Answer» C. authenticity
395.

CIA triad is also known as                  

A. nic (non-repudiation, integrity, confidentiality)
B. aic (availability, integrity, confidentiality)
C. ain (availability, integrity, non-repudiation)
D. aic (authenticity, integrity, confidentiality)
Answer» B. aic (availability, integrity, confidentiality)
396.

               of information means, only authorised users are capable of accessing the information.

A. confidentiality
B. integrity
C. non-repudiation
D. availability
Answer» A. confidentiality
397.

             means the protection of data from modification by unknown users.

A. confidentiality
B. integrity
C. authentication
D. non-repudiation
Answer» B. integrity
398.

When you use the word it means you are protecting your data from getting disclosed.

A. confidentiality
B. integrity
C. authentication
D. availability
Answer» A. confidentiality
399.

When integrity is lacking in a security system,                     occurs.

A. database hacking
B. data deletion
C. data tampering
D. data leakage
Answer» C. data tampering
400.

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A. they help understanding hacking better
B. they are key elements to a security breach
C. they help understands security and its components better
D. they help to understand the cyber-crime better
Answer» C. they help understands security and its components better
Tags
Question and answers in Information Cyber Security (ICS), Information Cyber Security (ICS) multiple choice questions and answers, Information Cyber Security (ICS) Important MCQs, Solved MCQs for Information Cyber Security (ICS), Information Cyber Security (ICS) MCQs with answers PDF download