Information Cyber Security Set 6
On This Page
This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 6
Q1 | ECC encryption system is __________
- symmetric key encryption algorithm
- asymmetric key encryption algorithm
- not an encryption algorithm
- block cipher method
Q2 | ________function creates a message digest out of a message.
- encryption
- decryption
- hash
- none of the above
Q3 | Extensions to the X.509 certificates were added in version ____
- 1
- 2
- 3
- 4
Q4 | A digital signature needs ____ system
- symmetric-key
- asymmetric-key
- either (a) or (b)
- neither (a) nor (b)
Q5 | “Elliptic curve cryptography follows the associative property.”
- TRUE
- FALSE
Q6 | ECC stands for
- elliptic curve cryptography
- enhanced curve cryptography
- elliptic cone cryptography
- eclipse curve cryptography
Q7 | When a hash function is used to provide message authentication, the hash function value is referred to as
- message field
- message digest
- message score
- message leap
Q8 | Message authentication code is also known as
- key code
- hash code
- keyed hash function
- message key hash function
Q9 | The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.
- TRUE
- FALSE
Q10 | The DSS signature uses which hash algorithm?
- md5
- sha-2
- sha-1
- does not use hash algorithm
Q11 | What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
- 42 bytes
- 32 bytes
- 36 bytes
- 48 bytes
Q12 | In the handshake protocol which is the message type first sent between client and server ?
- server_hello
- client_hello
- hello_request
- certificate_request
Q13 | One commonly used public-key cryptography method is the ______ algorithm.
- rss
- ras
- rsa
- raa
Q14 | he ________ method provides a one-time session key for two parties.
- diffie-hellman
- rsa
- des
- aes
Q15 | The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
- man-in-the-middle
- ciphertext attack
- plaintext attack
- none of the above
Q16 | 1. VPN is abbreviated as __________
- visual private network
- virtual protocol network
- virtual private network
- virtual protocol networking
Q17 | __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.
- visual private network
- virtual protocol network
- virtual protocol networking
- virtual private network
Q18 | Which of the statements are not true to classify VPN systems?
- protocols used for tunnelling the traffic
- whether vpns are providing site-to-site or remote access connection
- securing the network from bots and malwares
- levels of security provided for sending and receiving data privately
Q19 | What types of protocols are used in VPNs?
- application level protocols
- tunnelling protocols
- network protocols
- mailing protocols
Q20 | VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
- TRUE
- FALSE
Q21 | There are _________ types of VPNs.
- 3
- 2
- 5
- 4
Q22 | _________ type of VPNs are used for home private and secure connectivity.
- remote access vpns
- site-to-site vpns
- peer-to-peer vpns
- router-to-router vpns
Q23 | Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
- remote access vpns
- site-to-site vpns
- peer-to-peer vpns
- country-to-country vpns
Q24 | Site-to-Site VPN architecture is also known as _________
- remote connection based vpns
- peer-to-peer vpns
- extranet based vpn
- country-to-country vpns
Q25 | There are ________ types of VPN protocols.
- 3
- 4
- 5
- 6