Information And Cyber Security Set 2
On This Page
This set of Information and Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information And Cyber Security Set 2
Q1 | The is a polygraphic substitution cipher based on linear algebra.
- hill cipher
- playfair cipher
- affine cipher
- none of these
Q2 | is the practice of concealing a message within another message,image or file.
- steganography
- cryptography
- cipher
- receiver
Q3 | In asymmetric key cryptography, the private key is kept by
- sender
- receiver
- sender and receiver
- none of these
Q4 | What is data encryption standard (DES)?
- block cipher
- stream cipher
- bit cipher
- byte cipher
Q5 | In cryptography the original message before being transform is called
- simple text
- plain text
- empty text
- filled text
Q6 | An asymmetric-key (or public-key) cipher uses
- 1 key
- 2 key
- 3 key
- 4 key
Q7 | In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages,it is very slow if the message is
- short
- flat
- long
- thin
Q8 | The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two partiesare not
- authenticated
- joined
- submit
- separate
Q9 | In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
- other
- data
- keys
- each other
Q10 | For RSA to work, the value of P must be less than the value of
- p
- q
- n
- r
Q11 | In RSA, Ф(n) = in terms of p and q.
- (p)/(q)
- (p)(q)
- (p-1)(q-1)
- (p+1)(q+1)
Q12 | In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).
- true
- false
Q13 | RSA is also a stream cipher like Merkel-Hellman.
- true
- false
Q14 | USENET falls under which category of public key sharing?
- public announcement
- publicly availabledirectory
- public key authority
- public key certificate
Q15 | PGP makes use of which cryptographic algorithm?
- rsa
- aes
- des
- robin
Q16 | Public key cryptography also called as
- asymmetric keycryptography
- symmetric keycryptography
- both a and b
- none of the above
Q17 | ECC stands for
- elliptic curve cryptography
- elliptic cryptography curve
- error correcting code
- none of the above
Q18 | Diffie-Hellman algorithm is widely known as
- key exchange algorithm
- key agreementalgorithm
- only a
- both a and b
Q19 | Hash function is used for
- message authentication
- digital signature
- both a and b
- only a
Q20 | RSA algorithm is best example of
- asymmetric keycryptography
- symmetric keycryptography
- elliptic curve cryptography
- all of the above
Q21 | IPSec is designed to provide security at the
- transport layer
- network layer
- application layer
- session layer
Q22 | In tunnel mode, IPSec protects the
- entire ip packet
- ip header
- ip payload
- ip trailer
Q23 | HTTPS is abbreviated as
- secured hyper hypertexts transfer text transfer protocol secured protocol
- none of the mentioned
- hyperlinked text transfer protocol secured
- hyper text transfer protocol secure
Q24 | An attempt to make a computer resource unavailable to its intended users is called
- denial-of-service attack
- virus attack
- worms attack
- botnet process
Q25 | SSL primarily focuses on Pretty good privacy (PGP) is used in
- integrity and authenticity
- integrity and non-repudiation
- authenticity and privacy
- confidentiality andintegrity