154
85.9k

380+ Information Cyber Security (ICS) Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Animation SY (BSC [animation]) , Bachelor of Science in Animation (BSc animation) .

351.

Diffie-Hellman algorithm is widely known as                     

A. key exchange algorithm
B. key agreement algorithm
C. only a
D. both a and b
Answer» D. both a and b
352.

Hash function is used for                   

A. message authentication
B. digital signature
C. both a and b
D. only a
Answer» C. both a and b
353.

RSA algorithm is best example of                 

A. asymmetric key cryptography
B. symmetric key cryptography
C. elliptic curve cryptography
D. all of the above
Answer» A. asymmetric key cryptography
354.

IPSec is designed to provide security at the                      

A. transport layer
B. network layer
C. application layer
D. session layer
Answer» B. network layer
355.

In tunnel mode, IPSec protects the               

A. entire ip packet
B. ip header
C. ip payload
D. ip trailer
Answer» A. entire ip packet
356.

HTTPS is abbreviated as                      

A. secured hyper hypertexts transfer text transfer protocol secured protocol
B. none of the mentioned
C. hyperlinked text transfer protocol secured
D. hyper text transfer protocol secure
Answer» D. hyper text transfer protocol secure
357.

An attempt to make a computer resource unavailable to its intended users is called               

A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process
Answer» A. denial-of-service attack
358.

SSL primarily focuses on                   Pretty good privacy (PGP) is used in               

A. integrity and authenticity
B. integrity and non- repudiation
C. authenticity and privacy
D. confidentiality and integrity
Answer» A. integrity and authenticity
359.

                      is used for encrypting data at network level

A. ipsec
B. https
C. smtp
D. s/mime
Answer» A. ipsec
360.

WPA2 is used for security in                  

A. ethernet
B. wi-fi
C. bluetooth
D. e-mail
Answer» B. wi-fi
361.

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

A. true
B. false
Answer» A. true
362.

SET stands for

A. set electronic transaction
B. secure electronic transaction
C. simple electronic transaction
D. none of the above
Answer» B. secure electronic transaction
363.

length of the IPv6 acddress is ....

A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Answer» B. 64 bits
364.

SSL provides .

A. message integrity
B. confidentiality
C. compression
D. all of the above
Answer» D. all of the above
365.

According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

A. confidentiality
B. integrity
C. authenticity
D. availability
Answer» C. authenticity
366.

Which of the following are not security policies?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» C. availability
367.

Examples of User Policies is/are:

A. password policies
B. internet usage
C. system use
D. all of the above
Answer» D. all of the above
368.

           Policy ensures that the organization is maintaining standards set by specific industry regulation.

A. regulatory
B. advisory
C. availability
D. user policies
Answer» A. regulatory
369.

             Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior

A. regulatory
B. advisory
C. availability
D. user policies
Answer» B. advisory
370.

What defines the restrictions on employees such as usage?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» D. user policies
371.

Which of the following attack can actively modify communications or data?

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» C. active attacks
372.

Categories of Security Service

A. 1
B. 1 &3
C. 2& 3
D. 1,2,3
Answer» D. 1,2,3
373.

Release of Message Content and Traffic analysis are type of :

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» D. passive attacks
374.

             means when an attacker pretends to be authentic user

A. masquerade
B. replay
C. modification
D. traffic analysis
Answer» A. masquerade
375.

                       attack is when original data is modified and malicious data is inserted

A. masquerade
B. replay(rewrite)
C. modification
D. traffic analysis
Answer» B. replay(rewrite)
376.

When original data is changed to make it non-meaningful by attacker it is known as

A. masquerade
B. replay
C. modification of messages
D. traffic analysis
Answer» C. modification of messages
377.

Which is the type of attack when Network is made unavailable for user

A. masquerade
B. replay
C. modification
D. denial of service
Answer» D. denial of service
378.

Modification of Data is done in:

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» A. both active and passive attacks
379.

A process of making the encrypted text readable again.

A. decryption
B. encryption
C. network security
D. information hiding
Answer» A. decryption
380.

Assurance that authentic user is taking part in communication is:

A. authentication
B. authorization
C. access control
D. auditing
Answer» A. authentication
381.

ATM pin while withdrawing money is an example of using:

A. authentication
B. authorization
C. access control
D. auditing
Answer» A. authentication
382.

In asymmetric key cryptography, the private key is kept by

A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» B. receiver

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.