On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 6

Q1 | ECC encryption system is __________
  • symmetric key encryption algorithm
  • asymmetric key encryption algorithm
  • not an encryption algorithm
  • block cipher method
Q2 | ________function creates a message digest out of a message.
  • encryption
  • decryption
  • hash
  • none of the above
Q3 | Extensions to the X.509 certificates were added in version ____
  • 1
  • 2
  • 3
  • 4
Q4 | A digital signature needs ____ system
  • symmetric-key
  • asymmetric-key
  • either (a) or (b)
  • neither (a) nor (b)
Q5 | “Elliptic curve cryptography follows the associative property.”
  • TRUE
  • FALSE
Q6 | ECC stands for
  • elliptic curve cryptography
  • enhanced curve cryptography
  • elliptic cone cryptography
  • eclipse curve cryptography
Q7 | When a hash function is used to provide message authentication, the hash function value is referred to as
  • message field
  • message digest
  • message score
  • message leap
Q8 | Message authentication code is also known as
  • key code
  • hash code
  • keyed hash function
  • message key hash function
Q9 | The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.
  • TRUE
  • FALSE
Q10 | The DSS signature uses which hash algorithm?
  • md5
  • sha-2
  • sha-1
  • does not use hash algorithm
Q11 | What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
  • 42 bytes
  • 32 bytes
  • 36 bytes
  • 48 bytes
Q12 | In the handshake protocol which is the message type first sent between client and server ?
  • server_hello
  • client_hello
  • hello_request
  • certificate_request
Q13 | One commonly used public-key cryptography method is the ______ algorithm.
  • rss
  • ras
  • rsa
  • raa
Q14 | he ________ method provides a one-time session key for two parties.
  • diffie-hellman
  • rsa
  • des
  • aes
Q15 | The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
  • man-in-the-middle
  • ciphertext attack
  • plaintext attack
  • none of the above
Q16 | 1. VPN is abbreviated as __________
  • visual private network
  • virtual protocol network
  • virtual private network
  • virtual protocol networking
Q17 | __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.
  • visual private network
  • virtual protocol network
  • virtual protocol networking
  • virtual private network
Q18 | Which of the statements are not true to classify VPN systems?
  • protocols used for tunnelling the traffic
  • whether vpns are providing site-to-site or remote access connection
  • securing the network from bots and malwares
  • levels of security provided for sending and receiving data privately
Q19 | What types of protocols are used in VPNs?
  • application level protocols
  • tunnelling protocols
  • network protocols
  • mailing protocols
Q20 | VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
  • TRUE
  • FALSE
Q21 | There are _________ types of VPNs.
  • 3
  • 2
  • 5
  • 4
Q22 | _________ type of VPNs are used for home private and secure connectivity.
  • remote access vpns
  • site-to-site vpns
  • peer-to-peer vpns
  • router-to-router vpns
Q23 | Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
  • remote access vpns
  • site-to-site vpns
  • peer-to-peer vpns
  • country-to-country vpns
Q24 | Site-to-Site VPN architecture is also known as _________
  • remote connection based vpns
  • peer-to-peer vpns
  • extranet based vpn
  • country-to-country vpns
Q25 | There are ________ types of VPN protocols.
  • 3
  • 4
  • 5
  • 6