On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 7

Q1 | In tunnel mode, IPSec protects the ______
  • entire ip packet
  • ip header
  • ip payload
  • ip trailer
Q2 | Pretty good privacy (PGP) is used in ______
  • browser security
  • email security
  • ftp security
  • wifi security
Q3 | PGP encrypts data by using a block cipher called ______
  • international data encryption algorithm
  • private data encryption algorithm
  • internet data encryption algorithm
  • local data encryption algorithm
Q4 | IKE creates SAs for _____.
  • ssl
  • pgp
  • ipsec
  • vp
Q5 | SSL provides _________.
  • message integrity
  • confidentiality
  • compression
  • all of the above
Q6 | IKE uses _______
  • oakley
  • skeme
  • isakmp
  • all of the above
Q7 | In ______, there is a single path from the fully trusted authority to any certificate.
  • x509
  • pgp
  • kdc
  • none of the above
Q8 | _______ uses the idea of certificate trust levels.
  • x509
  • pgp
  • kdc
  • none of the above
Q9 | ________ provides privacy, integrity, and authentication in e-mail.
  • ipsec
  • ssl
  • pgp
  • none of the above
Q10 | In _____, there can be multiple paths from fully or partially trusted authorities.
  • x509
  • pgp
  • kdc
  • none of the above
Q11 | ______ provides authentication at the IP level.
  • ah
  • esp
  • pgp
  • ssl
Q12 | In _______, the cryptographic algorithms and secrets are sent with the message.
  • ipsec
  • ssl
  • tls
  • pgp
Q13 | ______ was invented by Phil Zimmerman.
  • ipsec
  • ssl
  • pgp
  • none of the above
Q14 | ISAKMP stands for ______
  • internet system association and key management packet
  • internet security association and key management protocol
  • interchange system and key modeling protocol
  • internet security association and key modeling protocol
Q15 | PGP makes use of which cryptographic algorithm?
  • des
  • aes
  • rsa
  • rabin
Q16 | What is the key size allowed in PGP?
  • 1024-1056
  • 1024-4056
  • 1024-4096
  • 1024-2048
Q17 | In SSL, what is used for authenticating a message?
  • mac (message access code)
  • mac (message authentication code)
  • mac (machine authentication code)
  • mac (machine access code)
Q18 | S/MIME is abbreviated as __________________
  • secure/multimedia internet mailing extensions
  • secure/multipurpose internet mailing extensions
  • secure/multimedia internet mail extensions
  • secure/multipurpose internet mail extensions
Q19 | Security Measures Needed to protect ________ during their transmission
  • file
  • data
  • packet
  • all of above
Q20 | __________ means knowledge obtained from investigation, study , intelligence new ,facts .
  • security
  • data
  • information
  • none of these
Q21 | Prevention of the unauthorised used of Resources refers too?
  • data integrity
  • data confidentiality
  • acess control
  • none of these
Q22 | Protection against Denial by one of these parties in a communication refers to?
  • non-repudiation
  • data integrity
  • authentication
  • none of these
Q23 | Which One of them is Passive attack?
  • denial of service
  • modify message in transit
  • replay previous message
  • obtain message contain
Q24 | What is lying of IP address called as?
  • ip spoofing
  • ip scamming
  • ip lying
  • none of theses
Q25 | What is full form of DDoS?
  • derived denial of service
  • distributed denial of service
  • denial of service
  • none of these