Information And Cyber Security Set 5

On This Page

This set of Information and Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information And Cyber Security Set 5

Q1 | An attack in which the user receives unwanted amount of e- mails.
  • smurfing
  • denial of service
  • e-mail bombing
  • ping storm
Q2 | In same keys are implemented for encrypting as well as decrypting the information.
  • symmetric key encryption
  • asymmetric key encryption
  • asymmetric key decryption
  • hash-based key encryption
Q3 | The procedure to add bits to the last block is termed as
  • decryption
  • hashing
  • tuning
  • padding
Q4 | In asymmetric key cryptography, the private key is kept by
  • sender
  • receiver
  • sender and receiver
  • all the connected devices to the network
Q5 | Cryptanalysis is used                      
  • to find some insecurity in a cryptographic scheme
  • to increase the speed
  • to encrypt the data
  • to make new ciphers
Q6 | Conventional cryptography is also known as or symmetric-key encryption.
  • secret-key
  • public key
  • protected key
  • primary key
Q7 |                                            is the art & science of cracking the cipher-text without knowing the key.
  • cracking
  • cryptanalysis
  • cryptography
  • crypto-hacking