GK/Information Cyber Security (ICS) MCQs Set 4 Sample Test,Sample questions

Question:
                  is the art & science of cracking the cipher-text without knowing the key.

1.cracking

2.cryptanalysis

3.cryptography

4.crypto-hacking


Question:
         of information means, only authorised users are capable of accessing the information.

1.confidentiality

2.integrity

3.non-repudiation

4. availability


Question:
       is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

1.network security

2.database security

3.information security

4.physical security


Question:
  In asymmetric key cryptography, the private key is kept by ____

1.sender

2.receiver

3.sender and receiver

4.all the connected devices to the network


Question:
 ElGamal encryption system is __________

1.symmetric key encryption algorithm

2.asymmetric key encryption algorithm

3.not an encryption algorithm

4.block cipher method


Question:
 HTTPS is abbreviated as _________

1.hypertexts transfer protocol secured

2.secured hyper text transfer protocol

3.hyperlinked text transfer protocol secured

4.hyper text transfer protocol secure


Question:
 If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

1. release of message content-passive attack

2. traffic analysis -passive attacks

3. release of message content- active attacks

4. traffic analysis -active attacks


Question:
 If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

1.release of message content-passive attack

2. traffic analysis -passive attacks

3.release of message content- active attacks

4. traffic analysis -active attacks


Question:
 In the above figure from left to right, the correct order of the shaded levels are

1.network level, application level, transport level

2.application level, network level, transport level

3.transport level, application level, network level

4. network level, transport level, application level


Question:
 In the above figure, which of the above shaded block is transparent to end users and applications?

1. ip/ipsec

2.ssl

3.kerberos

4.s/mime


Question:
 Which one of the following is a cryptographic protocol used to secure HTTP connection?

1.stream control transmission protocol (sctp)

2.transport layer security (tls)

3.explicit congestion notification (ecn)

4.resource reservation protocol


Question:
 Which protocol is used for the purpose of copying the pending state into the current state?

1. alert protocol

2. handshake protocol

3.upper-layer protocol

4.change cipher spec protocol


Question:
 _______ is used for encrypting data at network level

D. s/mime

1.ipsec

2.https

3.smtp

4.s/mime


Question:
. In cryptography, the order of the letters in a message is rearranged by __________

1. A. transpositional ciphers

2.substitution ciphers

3.both transpositional ciphers and substitution ciphers

4.quadratic ciphers


Question:
A unique piece of information that is used in encryption.

1.cipher

2.plain text

3.key

4. cipher


Question:
An attack in which the user receives unwanted amount of e- mails.

1.smurfing

2.denial of service

3.e-mail bombing

4. ping storm


Question:
CIA triad is also known as           

1.nic (non-repudiation, integrity, confidentiality)

2.aic (availability, integrity, confidentiality)

3. ain (availability, integrity, non-repudiation)

4.aic (authenticity, integrity, confidentiality)


Question:
Conventional cryptography is also known as or symmetric-key encryption.

1.secret-key

2.public key

3.protected key

4.primary key


Question:
Cryptanalysis is used      

1. to find some insecurity in a cryptographic scheme

2.to increase the speed

3.to encrypt the data

4. to make new ciphers


Question:
Cryptanalysis is used __________

1.to find some insecurity in a cryptographic scheme

2.to increase the speed

3.to encrypt the data

4. to make new ciphers


Question:
Cryptographic hash function takes an arbitrary block of data and returns _________

1. fixed size bit string

2.variable size bit string

3.both fixed size bit string and variable size bit string

4. variable sized byte string


Question:
Data integrity gets compromised when and are taken control off.

1.access control, file deletion

2.network, file permission

3.access control, file permission

4.network, system


Question:
Data is used to ensure confidentiality.

1.encryption

2.locking

3.deleting

4.backup


Question:
Diffie-Hellman algorithm is widely known as_________

1.key exchange algorithm

2.key agreement algorithm

3.only

4. both a and b


Question:
ECC stands for

1. A. elliptic curve cryptography

2.elliptic cryptography curve

3.error correcting code

4.none of the above


Question:
Firewalls can be of _______ kinds.

1.1

2.2

3.3

4.4


Question:
From the options below, which of them is not a threat to information security?

1.disaster

2.eavesdropping

3.information leakage

4.unchanged default password


Question:
Hash function is used for________

1.message authentication

2.digital signature

3.both a and b

4.only a


Question:
In layer, vulnerabilities are directly associated with physical access to networks and hardware.

1. physical

2.data-link

3.network

4.application


Question:
In same keys are implemented for encrypting as well as decrypting the information.

1.symmetric key encryption

2.asymmetric key encryption

3.asymmetric key decryption

4.hash-based key encryption


Question:
In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.

1.select, alarm

2. alert, alarm

3.warning, alarm

4.warning, fatal


Question:
In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

1. 216

2.232

3.214

4.212


Question:
IPSec provides ....protocols for network layer

1.7

2.1

3.3

4.4


Question:
length of the IPv6 acddress is ....

1.32 bits

2.64 bits

3.16 bits

4.128 bit


Question:
length of the IPv6 header is....

1. 64 bits

2.16 bits

3.32 bits

4.8 bits


Question:
RSA algorithm is best example of_______

1.asymmetric key cryptography

2.symmetric key cryptography

3.elliptic curve cryptography

4.All of the above


Question:
SSL primarily focuses on _______

1. integrity and authenticity

2. integrity and non-repudiation

3.authenticity and privacy

4.confidentiality and integrity


Question:
Study of creating a d using encryption and decryption techniques.

1.cipher

2.cryptography

3.encryption

4.decryption


Question:
The full form of OSI is OSI model is                              

1.open systems interconnection

2.open software interconnection

3.open systems internet

4. open software internet


Question:
The full form of SSL is

1.serial session layer

2.secure socket layer

3.session secure layer

4.series socket layer


Question:
Transport layer Protocol consists of ... main components

1.2

2.1

3.3

4.4


Question:
When integrity is lacking in a security system,                     occurs.

1.database hacking

2.data deletion

3.data tampering

4.data leakage


Question:
When you use the word it means you are protecting your data from getting disclosed.

1.confidentiality

2.integrity

3.authentication

4.non-repudiation


Question:
Which of the following is not a secured mail transferring methodology?

1.pop3 .

2.ssmtp

3. mail using pgp

4.s/mime


Question:
Which one of the following is not a higher –layer SSL protocol?

1.alert protocol

2.handshake protocol

3.alarm protocol

4.change cipher spec protocol


Question:
Which protocol consists of only 1 bit?

1. alert protocol

2.handshake protocol

3.upper-layer protocol

4. change cipher spec protocol


Question:
Which protocol is used to convey SSL related alerts to the peer entity?

1.alert protocol

2. handshake protocol

3.upper-layer protocol

4.change cipher spec protocol


Question:
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

1. they help understanding hacking better

2. they are key elements to a security breach

3. they help understands security and its components better

4. they help to understand the cyber-crime better


Question:
_____ is used for encrypting data at network level.

1. ipsec

2.https

3.smtp

4.s/mime


Question:
__________ is the kind of firewall is connected between the device and the network connecting to internet.

1. hardware firewall

2.software firewall

3.stateful inspection firewall

4.microsoft firewall


More MCQS

  1. MCQ Questions from Computer Hardware Concept
  2. Computer Communication and Networking MCQS Quiz
  3. Computer Hardware Quiz Set 1
  4. Computer Hardware Quiz Set 2
  5. Computer Hardware Quiz Set 3
  6. Computer Hardware Quiz Set 4
  7. Computer Hardware Quiz Set 5
  8. Computer Hardware Quiz Set 6
  9. Computer Hardware Quiz Set 7
  10. Computer Hardware Quiz Set 8
  11. Computer Hardware Multiple Choice Questions(MCQs) and Answers
  12. Graphics Hardware and Display devices Input Devices
  13. Computer Hardware MCQ GK Questions Set 1
  14. Computer Hardware MCQ GK Questions Set 2
  15. Computer Hardware Multiple Choice Questions
  16. CDMA Multiple Choice Questions
  17. Network Security Multiple Choice questions
  18. Opengl Multiple Choice Questions
  19. Opengl Multiple Choice Questions.
  20. Web Development Multiple-choice Questions
  21. WiFi Multiple Choice Questions
  22. 4G Multiple Choice Question
  23. NETWORK MODELS MCQ
  24. INTERNET AND PROTOCOLS MCQ SET 1
  25. INTERNET AND PROTOCOLS MCQ SET 2
  26. INTERNET AND PROTOCOLS MCQ SET 3
  27. INTERNET AND PROTOCOLS MCQ SET 4
  28. INTERNET AND PROTOCOLS MCQ SET 5
  29. NETWORKING /PHYSICAL LAYER SET 1
  30. NETWORKING /PHYSICAL LAYER SET 2
  31. NETWORKING /PHYSICAL LAYER SET 3
  32. NETWORKING /PHYSICAL LAYER SET 4
  33. Information and Network Security Set 1
  34. Information and Network Security Set 2
  35. Information Cyber Security (ICS) MCQs Set 1
  36. Information Cyber Security (ICS) MCQs Set 2
  37. Information Cyber Security (ICS) MCQs Set 3
  38. Information Cyber Security (ICS) MCQs Set 4
  39. Information Cyber Security (ICS) MCQs Set 5
Learn Information Cyber Security (ICS) MCQs Set 4,Learn GK Objetive choice questions and answers,GK Multiple choice questions and answers,GK objective, GK questions , GK answers,GK MCQs questions and answer
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!