Information Cyber Security (ICS) Solved MCQs

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide


A hacker guessing suggested password to a program is call as?

A. password guessing
B. dictionary attack
C. default password attack
D. none of these
Answer» C. default password attack

Symmetric key encryption is also called as?

A. public key encryption
B. private key encryption
C. both of these
D. none of these
Answer» B. private key encryption

Conversion of Cypher text to plain text?

A. encryption
B. decryption
C. simple text
D. none of these
Answer» B. decryption

__is used to create the organisation's overall security program.

A. program policy
B. purpose
C. security
D. none of these
Answer» A. program policy

An act of protecting information from unauthorised disclouser to an entity.-

A. intergrity
B. avability
C. confidentiality
D. none of these
Answer» C. confidentiality

A way to ensure that the entity is indeed what it claims to be.-

A. authentication
B. accountability
C. identification
D. security
Answer» A. authentication

The__model is 7 layer architecture where each layer is having some specific functionality to perform.

A. tcp
B. osi
C. ois
D. none of these
Answer» B. osi

The full form of OSI is OSI model__.

A. open systems interconnection
B. open software interconnection
C. open connection
D. open system internet
Answer» A. open systems interconnection

The technique in which when one character is replaced by another Character is called as?

A. transposition
B. substitution
C. combinational
D. none of these
Answer» B. substitution

Conversion of plain text into Cipher text is called as________.

A. encryption
B. decryption
C. hidden text
D. none of above
Answer» A. encryption

In Symmetric schemes requires both parties to share how many secret key?

A. one
B. two
C. three
D. four
Answer» A. one

Blum Blum Shub Generator is based on which Algorithm?

A. private key
B. public key
C. both a & b
D. none of these
Answer» B. public key

In DES step both LPT and RPT undergoes in how much key Rounds?

A. 8
B. 16
C. 32
D. 64
Answer» B. 16

What is the 4th step in DES Algorithm?

A. key transformation
B. s-box substitution
C. p-box permutation
D. expansion permutation
Answer» C. p-box permutation

In AES in which Round Subkeys are Generated from Original key for each round?

A. key expansion
B. initial round
C. finale round
D. none of these
Answer» A. key expansion

AES stands for?

A. authorized encryption standard
B. advance encryption standard
C. advance encryption strategy
D. none of these
Answer» B. advance encryption standard

Which of them is type of Cipher?

A. stream cipher
B. block cipher
C. both of them
D. none of these
Answer» C. both of them

The message which is not understandable is called as?

A. cipher text
B. plain text
C. hidden text
D. both a & c
Answer» A. cipher text

The__is a polygraphic substitution cipher based on linear algebra.

A. hill cipher
B. playfair cipher
C. affine cipher
D. none of these
Answer» A. hill cipher

__is the practice of concealing a message within another message,image or file.

A. steganography
B. cryptography
C. cipher
D. receiver
Answer» A. steganography

In asymmetric key cryptography, the private key is kept by __________

A. sender
B. receiver
C. sender and receiver
D. none of these
Answer» B. receiver

In cryptography the original message before being transform is called

A. simple text
B. plain text
C. empty text
D. filled text
Answer» B. plain text

An asymmetric-key (or public-key) cipher uses

A. 1 key
B. 2 key
C. 3 key
D. 4 key
Answer» A. 1 key

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A. short
B. flat
C. long
D. thin
Answer» C. long

In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

A. other
B. data
C. keys
D. each other
Answer» D. each other
Question and answers in Information Cyber Security (ICS), Information Cyber Security (ICS) multiple choice questions and answers, Information Cyber Security (ICS) Important MCQs, Solved MCQs for Information Cyber Security (ICS), Information Cyber Security (ICS) MCQs with answers PDF download

Help us improve!

We want to make our service better for you. Please take a moment to fill out our survey.

Take Survey