Information Cyber Security Set 11
On This Page
This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 11
Q1 | The procedure to add bits to the last block is termed as
- decryption
- hashing
- tuning
- padding
Q2 | Cryptanalysis is used
- to find some insecurity in a cryptographic scheme
- to increase the speed
- to encrypt the data
- to make new ciphers
Q3 | Conventional cryptography is also known as or symmetric-key encryption.
- secret-key
- public key
- protected key
- primary key
Q4 | is the art & science of cracking the cipher-text without knowing the key.
- cracking
- cryptanalysis
- cryptography
- crypto-hacking
Q5 | In cryptography, what is cipher?
- algorithm for performing encryption and decryption
- encrypted message
- both algorithm for performing encryption and decryption and encrypted message
- decrypted message
Q6 | In asymmetric key cryptography, the private key is kept by __________
- sender
- receiver
- sender and receiver
- all the connected devices to the network
Q7 | In cryptography, the order of the letters in a message is rearranged by __________
- transpositional ciphers
- substitution ciphers
- both transpositional ciphers and substitution ciphers
- quadratic ciphers
Q8 | Cryptanalysis is used __________
- to find some insecurity in a cryptographic scheme
- to increase the speed
- to encrypt the data
- to make new ciphers
Q9 | Which one of the following is a cryptographic protocol used to secure HTTP connection?
- stream control transmission protocol (sctp)
- transport layer security (tls)
- explicit congestion notification (ecn)
- resource reservation protocol
Q10 | Voice privacy in GSM cellular telephone protocol is provided by _______
- a5/2 cipher
- b5/4 cipher
- b5/6 cipher
- b5/8 cipher
Q11 | ElGamal encryption system is __________
- symmetric key encryption algorithm
- asymmetric key encryption algorithm
- not an encryption algorithm
- block cipher method
Q12 | Cryptographic hash function takes an arbitrary block of data and returns _________
- fixed size bit string
- variable size bit string
- both fixed size bit string and variable size bit string
- variable sized byte string
Q13 | In the above figure from left to right, the correct order of the shaded levels are
- network level, application level, transport level
- application level, network level, transport level
- transport level, application level, network level
- network level, transport level, application level
Q14 | In the above figure, which of the above shaded block is transparent to end users and applications?
- ip/ipsec
- ssl
- kerberos
- s/mime
Q15 | In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
- TRUE
- FALSE
Q16 | Which one of the following is not a higher –layer SSL protocol?
- alert protocol
- handshake protocol
- alarm protocol
- change cipher spec protocol
Q17 | In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
- 216
- 232
- 214
- 212
Q18 | The full form of SSL is
- serial session layer
- secure socket layer
- session secure layer
- series socket layer
Q19 | Which protocol is used to convey SSL related alerts to the peer entity?
- alert protocol
- handshake protocol
- upper-layer protocol
- change cipher spec protocol
Q20 | Which protocol consists of only 1 bit?
- alert protocol
- handshake protocol
- upper-layer protocol
- change cipher spec protocol
Q21 | Which protocol is used for the purpose of copying the pending state into the current state?
- alert protocol
- handshake protocol
- upper-layer protocol
- change cipher spec protocol
Q22 | In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
- select, alarm
- alert, alarm
- warning, alarm
- warning, fatal
Q23 | Pretty good privacy (PGP) security system uses
- public key cryptosystem
- private key cryptosystem
- public & private key cryptosystem
- none of the mentioned
Q24 | Data compression includes
- removal of redundant character
- uniform distribution of characters
- removal of redundant character & uniform distribution of characters
- none of the mentioned
Q25 | PGP offers _____ block ciphers for message encryption.
- triple-des
- cast
- idea
- all of the mentioned