On This Page

This set of Information and Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information And Cyber Security Set 2

Q1 | The is a polygraphic substitution cipher based on linear algebra.
  • hill cipher
  • playfair cipher
  • affine cipher
  • none of these
Q2 |     is the practice of concealing a message within another message,image or file.
  • steganography
  • cryptography
  • cipher
  • receiver
Q3 | In asymmetric key cryptography, the private key is kept by                        
  • sender
  • receiver
  • sender and receiver
  • none of these
Q4 | What is data encryption standard (DES)?
  • block cipher
  • stream cipher
  • bit cipher
  • byte cipher
Q5 | In cryptography the original message before being transform is called
  • simple text
  • plain text
  • empty text
  • filled text
Q6 | An asymmetric-key (or public-key) cipher uses
  • 1 key
  • 2 key
  • 3 key
  • 4 key
Q7 | In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages,it is very slow if the message is
  • short
  • flat
  • long
  • thin
Q8 | The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two partiesare not
  • authenticated
  • joined
  • submit
  • separate
Q9 | In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
  • other
  • data
  • keys
  • each other
Q10 | For RSA to work, the value of P must be less than the value of
  • p
  • q
  • n
  • r
Q11 | In RSA, Ф(n) = in terms of p and q.
  • (p)/(q)
  • (p)(q)
  • (p-1)(q-1)
  • (p+1)(q+1)
Q12 | In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).
  • true
  • false
Q13 | RSA is also a stream cipher like Merkel-Hellman.
  • true
  • false
Q14 | USENET falls under which category of public key sharing?
  • public announcement
  • publicly availabledirectory
  • public key authority
  • public key certificate
Q15 | PGP makes use of which cryptographic algorithm?
  • rsa
  • aes
  • des
  • robin
Q16 | Public key cryptography also called as                   
  • asymmetric keycryptography
  • symmetric keycryptography
  • both a and b
  • none of the above
Q17 | ECC stands for
  • elliptic curve cryptography
  • elliptic cryptography curve
  • error correcting code
  • none of the above
Q18 | Diffie-Hellman algorithm is widely known as                     
  • key exchange algorithm
  • key agreementalgorithm
  • only a
  • both a and b
Q19 | Hash function is used for                   
  • message authentication
  • digital signature
  • both a and b
  • only a
Q20 | RSA algorithm is best example of                 
  • asymmetric keycryptography
  • symmetric keycryptography
  • elliptic curve cryptography
  • all of the above
Q21 | IPSec is designed to provide security at the                      
  • transport layer
  • network layer
  • application layer
  • session layer
Q22 | In tunnel mode, IPSec protects the               
  • entire ip packet
  • ip header
  • ip payload
  • ip trailer
Q23 | HTTPS is abbreviated as                      
  • secured hyper hypertexts transfer text transfer protocol secured protocol
  • none of the mentioned
  • hyperlinked text transfer protocol secured
  • hyper text transfer protocol secure
Q24 | An attempt to make a computer resource unavailable to its intended users is called               
  • denial-of-service attack
  • virus attack
  • worms attack
  • botnet process
Q25 | SSL primarily focuses on                  Pretty good privacy (PGP) is used in               
  • integrity and authenticity
  • integrity and non-repudiation
  • authenticity and privacy
  • confidentiality andintegrity