Information Cyber Security Set 9
On This Page
This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 9
Q1 | For RSA to work, the value of P must be less than the value of
- p
- q
- n
- r
Q2 | In RSA, ?(n) = _______ in terms of p and q.
- (p)/(q)
- (p)(q)
- (p-1)(q-1)
- (p+1)(q+1)
Q3 | In RSA, we select a value ‘e’ such that it lies between 0 and ?(n) and it is relatively prime to ?(n).
- TRUE
- FALSE
Q4 | RSA is also a stream cipher like Merkel-Hellman.
- TRUE
- FALSE
Q5 | USENET falls under which category of public key sharing?
- public announcement
- publicly available directory
- public key authority
- public key certificate
Q6 | PGP makes use of which cryptographic algorithm?
- rsa
- aes
- des
- robin
Q7 | Public key cryptography also called as________
- asymmetric key cryptography
- symmetric key cryptography
- both a and b
- none of the above
Q8 | ECC stands for
- elliptic curve cryptography
- elliptic cryptography curve
- error correcting code
- none of the above
Q9 | Diffie-Hellman algorithm is widely known as_________
- key exchange algorithm
- key agreement algorithm
- only a
- both a and b
Q10 | Hash function is used for________
- message authentication
- digital signature
- both a and b
- only a
Q11 | RSA algorithm is best example of_______
- asymmetric key cryptography
- symmetric key cryptography
- elliptic curve cryptography
- all of the above
Q12 | In tunnel mode, IPSec protects the ______
- entire ip packet
- ip header
- ip payload
- ip trailer
Q13 | HTTPS is abbreviated as _________
- hypertexts transfer protocol secured
- secured hyper text transfer protocol
- hyperlinked text transfer protocol secured
- hyper text transfer protocol secure
Q14 | An attempt to make a computer resource unavailable to its intended users is called ______
- denial-of-service attack
- virus attack
- worms attack
- botnet process
Q15 | SSL primarily focuses on _______
- integrity and authenticity
- integrity and non-repudiation
- authenticity and privacy
- confidentiality and integrity
Q16 | Pretty good privacy (PGP) is used in ______
- browser security
- email security
- wifi security
- ftp security
Q17 | __________ is used for encrypting data at network level
- ipsec
- https
- smtp
- s/mime
Q18 | WPA2 is used for security in _______
- ethernet
- wi-fi
- bluetooth
Q19 | Which of the following is not a strong security protocol
- ssl
- httpl
- smtp
- sftp
Q20 | TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
- TRUE
- FALSE
Q21 | IPSec operates in..... different modes
- 3
- 2
- 4
- 5
Q22 | length of the IPv4 address is ....
- 32 bits
- 64 bits
- 16 bits
- 128 bit
Q23 | Internet Key Exchange has .... phases and modes of operations
- 4
- 3
- 2
- 5
Q24 | PGP is abbreviated as
- pretty good privacy
- pretty good policy
- policy good privacy
- pretty good protection
Q25 | SET stands for
- set electronic transaction
- secure electronic transaction
- simple electronic transaction
- none of the above