On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 5

Q1 | When you use the word ______it means you are protecting your data from getting disclosed.
  • a) confidentiality
  • b) integrity
  • c) authentication
  • d) availability
Q2 | _______ means the protection of data from modification by unknown users.
  • a) confidentiality
  • b) integrity
  • c) authentication
  • d) non-repudiation
Q3 | _______ of information means, only authorized users are capable of accessing the information.
  • a) confidentiality
  • b) integrity
  • c) non-repudiation
  • d) availability
Q4 | This helps in identifying the origin of information and authentic user. This referred to here as __________
  • a) confidentiality
  • b) integrity
  • c) authenticity
  • d) availability
Q5 | Data ___________ is used to ensure confidentiality.
  • a) encryption
  • b) locking
  • c) decryption
  • d) backup
Q6 | What does OSI stand for in the OSI Security Architecure?
  • a) open system interface
  • b) open systems interconnections
  • c) open source initiative
  • d) open standard interconnections
Q7 | A company requires its users to change passwords every month. This improves the ________ of the network.
  • a) performance
  • b) reliability
  • c) security
  • d) none of the above
Q8 | Release of message contents and Traffic analysis are two types of _________ attacks.
  • a) active attack
  • b) modification of attack
  • c) passive attack
  • d) dos attack
Q9 | The ________ is encrypted text.
  • a) cipher scricpt
  • b) cipher text
  • c) secret text
  • d) secret script
Q10 | What type of attack uses a fraudulent server with a relay address?
  • ntlm
  • mitm
  • netbios
  • smb
Q11 | Which of the following Algorithms not belong to symmetric encryption
  • 3des (tripledes)
  • rsa
  • rc5
  • idea
Q12 | Which is the largest disadvantage of the symmetric Encryption?
  • more complex and therefore more time-consuming calculations.
  • problem of the secure transmission of the secret key.
  • less secure encryption function.
  • isn\t used any more.
Q13 | In cryptography, what is cipher?
  • algorithm for performing encryption and decryption
  • encrypted message
  • both algorithm for performing encryption and decryption and encrypted message
  • decrypted message
Q14 | In asymmetric key cryptography, the private key is kept by __________
  • sender
  • receiver
  • sender and receiver
  • all the connected devices to the network
Q15 | Which one of the following algorithm is not used in asymmetric-key cryptography?
  • rsa algorithm
  • diffie-hellman algorithm
  • electronic code book algorithm
  • dsa algorithm
Q16 | In cryptography, the order of the letters in a message is rearranged by __________
  • transpositional ciphers
  • substitution ciphers
  • both transpositional ciphers and substitution ciphers
  • quadratic ciphers
Q17 | What is data encryption standard (DES)?
  • block cipher
  • stream cipher
  • bit cipher
  • byte cipher
Q18 | A asymmetric-key (or public key ) cipher uses
  • 1 key
  • 2 key
  • 3 key
  • 4 key
Q19 | In asymmetric key cryptography, the two keys e and d, have special relationship to
  • others
  • data
  • keys
  • each other
Q20 | _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
  • malware analysis
  • exploit writing
  • reverse engineering
  • cryptography
Q21 | ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
  • malware analysis
  • cryptography
  • reverse engineering
  • exploit writing
Q22 | 4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
  • secret key
  • external programs
  • add-ons
  • secondary key
Q23 | Conventional cryptography is also known as _____________ or symmetric-key encryption.
  • secret-key
  • public key
  • protected key
  • primary key
Q24 | The procedure to add bits to the last block is termed as _________________
  • decryption
  • hashing
  • tuning
  • padding
Q25 | How many rounds does the AES-192 perform?
  • 10
  • 12
  • 14
  • 16