On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 9

Q1 | For RSA to work, the value of P must be less than the value of
  • p
  • q
  • n
  • r
Q2 | In RSA, ?(n) = _______ in terms of p and q.
  •  (p)/(q)
  •  (p)(q)
  • (p-1)(q-1)
  •  (p+1)(q+1)
Q3 | In RSA, we select a value ‘e’ such that it lies between 0 and ?(n) and it is relatively prime to ?(n).
  • TRUE
  • FALSE
Q4 | RSA is also a stream cipher like Merkel-Hellman.
  • TRUE
  • FALSE
Q5 | USENET falls under which category of public key sharing?
  • public announcement
  • publicly available directory
  • public key authority
  • public key certificate
Q6 | PGP makes use of which cryptographic algorithm?
  • rsa
  • aes
  • des
  • robin
Q7 | Public key cryptography also called as________
  • asymmetric key cryptography
  • symmetric key cryptography
  • both a and b
  • none of the above
Q8 | ECC stands for
  • elliptic curve cryptography
  • elliptic cryptography curve
  • error correcting code
  • none of the above
Q9 | Diffie-Hellman algorithm is widely known as_________
  • key exchange algorithm
  • key agreement algorithm
  • only a
  • both a and b
Q10 | Hash function is used for________
  • message authentication
  • digital signature
  • both a and b
  • only a
Q11 | RSA algorithm is best example of_______
  • asymmetric key cryptography
  • symmetric key cryptography
  • elliptic curve cryptography
  • all of the above
Q12 | In tunnel mode, IPSec protects the ______
  • entire ip packet
  • ip header
  • ip payload
  • ip trailer
Q13 | HTTPS is abbreviated as _________
  • hypertexts transfer protocol secured
  • secured hyper text transfer protocol
  • hyperlinked text transfer protocol secured
  • hyper text transfer protocol secure
Q14 | An attempt to make a computer resource unavailable to its intended users is called ______
  • denial-of-service attack
  • virus attack
  • worms attack
  • botnet process
Q15 | SSL primarily focuses on _______
  • integrity and authenticity
  • integrity and non-repudiation
  • authenticity and privacy
  • confidentiality and integrity
Q16 | Pretty good privacy (PGP) is used in ______
  • browser security
  • email security
  • wifi security
  • ftp security
Q17 | __________ is used for encrypting data at network level
  • ipsec
  • https
  • smtp
  • s/mime
Q18 | WPA2 is used for security in _______
  • ethernet
  • wi-fi
  • bluetooth
  • e-mail
Q19 | Which of the following is not a strong security protocol
  • ssl
  • httpl
  • smtp
  • sftp
Q20 | TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
  • TRUE
  • FALSE
Q21 | IPSec operates in..... different modes
  • 3
  • 2
  • 4
  • 5
Q22 | length of the IPv4 address is ....
  • 32 bits
  • 64 bits
  • 16 bits
  • 128 bit
Q23 | Internet Key Exchange has .... phases and modes of operations
  • 4
  • 3
  • 2
  • 5
Q24 | PGP is abbreviated as
  • pretty good privacy
  • pretty good policy
  • policy good privacy
  • pretty good protection
Q25 | SET stands for
  • set electronic transaction
  • secure electronic transaction
  • simple electronic transaction
  • none of the above