On This Page
This set of Information and Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information And Cyber Security Set 5
Q1 | An attack in which the user receives unwanted amount of e- mails.
- smurfing
- denial of service
- e-mail bombing
- ping storm
Q2 | In same keys are implemented for encrypting as well as decrypting the information.
- symmetric key encryption
- asymmetric key encryption
- asymmetric key decryption
- hash-based key encryption
Q3 | The procedure to add bits to the last block is termed as
- decryption
- hashing
- tuning
- padding
Q4 | In asymmetric key cryptography, the private key is kept by
- sender
- receiver
- sender and receiver
- all the connected devices to the network
Q5 | Cryptanalysis is used
- to find some insecurity in a cryptographic scheme
- to increase the speed
- to encrypt the data
- to make new ciphers
Q6 | Conventional cryptography is also known as or symmetric-key encryption.
- secret-key
- public key
- protected key
- primary key
Q7 | is the art & science of cracking the cipher-text without knowing the key.
- cracking
- cryptanalysis
- cryptography
- crypto-hacking