On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 4

Q1 | What is full form of DDoS?
  • derived denial of service
  • distributed denial ofservice
  • denial of service
  • none of these
Q2 | A hacker guessing suggested password to a program is call as?
  • password guessing
  • dictionary attack
  • default password attack
  • none of these
Q3 | Symmetric key encryption is also called as?
  • public key encryption
  • private keyencryption
  • both of these
  • none of these
Q4 | Conversion of Cypher text to plain text?
  • encryption
  • decryption
  • simple text
  • none of these
Q5 | __is used to create the organisation's overall security program.
  • program policy
  • purpose
  • security
  • none of these
Q6 | An act of protecting information from unauthorised disclouser to an entity.-
  • intergrity
  • avability
  • confidentiality
  • none of these
Q7 | A way to ensure that the entity is indeed what it claims to be.-
  • authentication
  • accountability
  • identification
  • security
Q8 | The__model is 7 layer architecture where each layer is having some specific functionality to perform.
  • tcp
  • osi
  • ois
  • none of these
Q9 | The full form of OSI is OSI model__.
  • open systemsinterconnection
  • open softwareinterconnection
  • open connection
  • open system internet
Q10 | The technique in which when one character is replaced by another Character is called as?
  • transposition
  • substitution
  • combinational
  • none of these
Q11 | Conversion of plain text into Cipher text is called as________.
  • encryption
  • decryption
  • hidden text
  • none of above
Q12 | In Symmetric schemes requires both parties to share how many secret key?
  • one
  • two
  • three
  • four
Q13 | Blum Blum Shub Generator is based on which Algorithm?
  • private key
  • public key
  • both a & b
  • none of these
Q14 | In DES step both LPT and RPT undergoes in how much key Rounds?
  • 8
  • 16
  • 32
  • 64
Q15 | What is the 4th step in DES Algorithm?
  • key transformation
  • s-box substitution
  • p-box permutation
  • expansion permutation
Q16 | In AES in which Round Subkeys are Generated from Original key for each round?
  • key expansion
  • initial round
  • finale round
  • none of these
Q17 | AES stands for?
  • authorized encryptionstandard
  • advance encryptionstandard
  • advance encryption strategy
  • none of these
Q18 | Which of them is type of Cipher?
  • stream cipher
  • block cipher
  • both of them
  • none of these
Q19 | The message which is not understandable is called as?
  • cipher text
  • plain text
  • hidden text
  • both a & c
Q20 | _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.
  • a) network security
  • b) database security
  • c) information security
  • d) physical security
Q21 | _______ platforms are used for safety and protection of information in the cloud.
  • a) cloud workload protection platforms
  • b) cloud security protocols
  • c) aws
  • d) one drive
Q22 | Compromising confidential information comes under _________
  • a) bug
  • b) threat
  • c) vulnerability
  • d) attack
Q23 | An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
  • a) cyber-crime
  • b) cyber attack
  • c) system hijacking
  • d) digital crime
Q24 | The CIA triad is often represented by which of the following?
  • a) triangle
  • b) diagonal
  • c) ellipse
  • d) circle
Q25 | Related to information security, confidentiality is the opposite of which of the following?
  • a) closure
  • b) disclosure
  • c) disaster
  • d) disposal