Information Cyber Security Set 4
On This Page
This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 4
Q1 | What is full form of DDoS?
- derived denial of service
- distributed denial ofservice
- denial of service
- none of these
Q2 | A hacker guessing suggested password to a program is call as?
- password guessing
- dictionary attack
- default password attack
- none of these
Q3 | Symmetric key encryption is also called as?
- public key encryption
- private keyencryption
- both of these
- none of these
Q4 | Conversion of Cypher text to plain text?
- encryption
- decryption
- simple text
- none of these
Q5 | __is used to create the organisation's overall security program.
- program policy
- purpose
- security
- none of these
Q6 | An act of protecting information from unauthorised disclouser to an entity.-
- intergrity
- avability
- confidentiality
- none of these
Q7 | A way to ensure that the entity is indeed what it claims to be.-
- authentication
- accountability
- identification
- security
Q8 | The__model is 7 layer architecture where each layer is having some specific functionality to perform.
- tcp
- osi
- ois
- none of these
Q9 | The full form of OSI is OSI model__.
- open systemsinterconnection
- open softwareinterconnection
- open connection
- open system internet
Q10 | The technique in which when one character is replaced by another Character is called as?
- transposition
- substitution
- combinational
- none of these
Q11 | Conversion of plain text into Cipher text is called as________.
- encryption
- decryption
- hidden text
- none of above
Q12 | In Symmetric schemes requires both parties to share how many secret key?
- one
- two
- three
- four
Q13 | Blum Blum Shub Generator is based on which Algorithm?
- private key
- public key
- both a & b
- none of these
Q14 | In DES step both LPT and RPT undergoes in how much key Rounds?
- 8
- 16
- 32
- 64
Q15 | What is the 4th step in DES Algorithm?
- key transformation
- s-box substitution
- p-box permutation
- expansion permutation
Q16 | In AES in which Round Subkeys are Generated from Original key for each round?
- key expansion
- initial round
- finale round
- none of these
Q17 | AES stands for?
- authorized encryptionstandard
- advance encryptionstandard
- advance encryption strategy
- none of these
Q18 | Which of them is type of Cipher?
- stream cipher
- block cipher
- both of them
- none of these
Q19 | The message which is not understandable is called as?
- cipher text
- plain text
- hidden text
- both a & c
Q20 | _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.
- a) network security
- b) database security
- c) information security
- d) physical security
Q21 | _______ platforms are used for safety and protection of information in the cloud.
- a) cloud workload protection platforms
- b) cloud security protocols
- c) aws
- d) one drive
Q22 | Compromising confidential information comes under _________
- a) bug
- b) threat
- c) vulnerability
- d) attack
Q23 | An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
- a) cyber-crime
- b) cyber attack
- c) system hijacking
- d) digital crime
Q24 | The CIA triad is often represented by which of the following?
- a) triangle
- b) diagonal
- c) ellipse
- d) circle
Q25 | Related to information security, confidentiality is the opposite of which of the following?
- a) closure
- b) disclosure
- c) disaster
- d) disposal