Information and Cyber Security (ICS) Solved MCQs

1.

Security Measures Needed to protect during their transmission

A. file
B. data
C. packet
D. all of above
Answer» B. data
2.

                      means knowledge obtained from investigation, study , intelligence new ,facts .

A. security
B. data
C. information
D. none of these
Answer» C. information
3.

Prevention of the unauthorised used of Resources refers too?

A. data integrity
B. data confidentiality
C. acess control
D. none of these
Answer» C. acess control
4.

Protection against Denial by one of these parties in a communication refers to?

A. non-repudiation
B. data integrity
C. authentication
D. none of these
Answer» A. non-repudiation
5.

Which One of them is Passive attack?

A. denial of service
B. modify message in transit
C. replay previous message
D. obtain message contain
Answer» D. obtain message contain
6.

What is lying of IP address called as?

A. ip spoofing
B. ip scamming
C. ip lying
D. none of theses
Answer» A. ip spoofing
7.

What is full form of DDoS?

A. derived denial of service
B. distributed denial of service
C. denial of service
D. none of these
Answer» B. distributed denial of service
8.

A hacker guessing suggested password to a program is call as?

A. password guessing
B. dictionary attack
C. default password attack
D. none of these
Answer» C. default password attack
9.

Symmetric key encryption is also called as?

A. public key encryption
B. private key encryption
C. both of these
D. none of these
Answer» B. private key encryption
10.

Conversion of Cypher text to plain text?

A. encryption
B. decryption
C. simple text
D. none of these
Answer» B. decryption
11.

    is used to create the organisation's overall security program.

A. program policy
B. purpose
C. security
D. none of these
Answer» A. program policy
12.

An act of protecting information from unauthorised disclouser to an entity.-

A. intergrity
B. avability
C. confidentiality
D. none of these
Answer» C. confidentiality
13.

A way to ensure that the entity is indeed what it claims to be.-

A. authentication
B. accountability
C. identification
D. security
Answer» A. authentication
14.

The model is 7 layer architecture where each layer is having some specific functionality to perform.

A. tcp
B. osi
C. ois
D. none of these
Answer» B. osi
15.

The full form of OSI is OSI model .

A. open systems interconnection
B. open software interconnection
C. open connection
D. open system internet
Answer» A. open systems interconnection
16.

The technique in which when one character is replaced by another Character is called as?

A. transposition
B. substitution
C. combinational
D. none of these
Answer» B. substitution
17.

Conversion of plain text into Cipher text is called as .

A. encryption
B. decryption
C. hidden text
D. none of above
Answer» A. encryption
18.

In Symmetric schemes requires both parties to share how many secret key?

A. one
B. two
C. three
D. four
Answer» A. one
19.

Blum Blum Shub Generator is based on which Algorithm?

A. private key
B. public key
C. both a & b
D. none of these
Answer» B. public key
20.

In DES step both LPT and RPT undergoes in how much key Rounds?

A. 8
B. 16
C. 32
D. 64
Answer» B. 16
21.

What is the 4th step in DES Algorithm?

A. key transformation
B. s-box substitution
C. p-box permutation
D. expansion permutation
Answer» C. p-box permutation
22.

In AES in which Round Subkeys are Generated from Original key for each round?

A. key expansion
B. initial round
C. finale round
D. none of these
Answer» A. key expansion
23.

AES stands for?

A. authorized encryption standard
B. advance encryption standard
C. advance encryption strategy
D. none of these
Answer» B. advance encryption standard
24.

Which of them is type of Cipher?

A. stream cipher
B. block cipher
C. both of them
D. none of these
Answer» C. both of them
25.

The message which is not understandable is called as?

A. cipher text
B. plain text
C. hidden text
D. both a & c
Answer» A. cipher text
Tags
Question and answers in Information and Cyber Security (ICS), Information and Cyber Security (ICS) multiple choice questions and answers, Information and Cyber Security (ICS) Important MCQs, Solved MCQs for Information and Cyber Security (ICS), Information and Cyber Security (ICS) MCQs with answers PDF download

Help us improve!

We want to make our service better for you. Please take a moment to fill out our survey.

Take Survey