Information Cyber Security Set 7
On This Page
This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 7
Q1 | In tunnel mode, IPSec protects the ______
- entire ip packet
- ip header
- ip payload
- ip trailer
Q2 | Pretty good privacy (PGP) is used in ______
- browser security
- email security
- ftp security
- wifi security
Q3 | PGP encrypts data by using a block cipher called ______
- international data encryption algorithm
- private data encryption algorithm
- internet data encryption algorithm
- local data encryption algorithm
Q4 | IKE creates SAs for _____.
- ssl
- pgp
- ipsec
- vp
Q5 | SSL provides _________.
- message integrity
- confidentiality
- compression
- all of the above
Q6 | IKE uses _______
- oakley
- skeme
- isakmp
- all of the above
Q7 | In ______, there is a single path from the fully trusted authority to any certificate.
- x509
- pgp
- kdc
- none of the above
Q8 | _______ uses the idea of certificate trust levels.
- x509
- pgp
- kdc
- none of the above
Q9 | ________ provides privacy, integrity, and authentication in e-mail.
- ipsec
- ssl
- pgp
- none of the above
Q10 | In _____, there can be multiple paths from fully or partially trusted authorities.
- x509
- pgp
- kdc
- none of the above
Q11 | ______ provides authentication at the IP level.
- ah
- esp
- pgp
- ssl
Q12 | In _______, the cryptographic algorithms and secrets are sent with the message.
- ipsec
- ssl
- tls
- pgp
Q13 | ______ was invented by Phil Zimmerman.
- ipsec
- ssl
- pgp
- none of the above
Q14 | ISAKMP stands for ______
- internet system association and key management packet
- internet security association and key management protocol
- interchange system and key modeling protocol
- internet security association and key modeling protocol
Q15 | PGP makes use of which cryptographic algorithm?
- des
- aes
- rsa
- rabin
Q16 | What is the key size allowed in PGP?
- 1024-1056
- 1024-4056
- 1024-4096
- 1024-2048
Q17 | In SSL, what is used for authenticating a message?
- mac (message access code)
- mac (message authentication code)
- mac (machine authentication code)
- mac (machine access code)
Q18 | S/MIME is abbreviated as __________________
- secure/multimedia internet mailing extensions
- secure/multipurpose internet mailing extensions
- secure/multimedia internet mail extensions
- secure/multipurpose internet mail extensions
Q19 | Security Measures Needed to protect ________ during their transmission
- file
- data
- packet
- all of above
Q20 | __________ means knowledge obtained from investigation, study , intelligence new ,facts .
- security
- data
- information
- none of these
Q21 | Prevention of the unauthorised used of Resources refers too?
- data integrity
- data confidentiality
- acess control
- none of these
Q22 | Protection against Denial by one of these parties in a communication refers to?
- non-repudiation
- data integrity
- authentication
- none of these
Q23 | Which One of them is Passive attack?
- denial of service
- modify message in transit
- replay previous message
- obtain message contain
Q24 | What is lying of IP address called as?
- ip spoofing
- ip scamming
- ip lying
- none of theses
Q25 | What is full form of DDoS?
- derived denial of service
- distributed denial of service
- denial of service
- none of these