On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 11

Q1 | The procedure to add bits to the last block is termed as
  • decryption
  • hashing
  • tuning
  • padding
Q2 | Cryptanalysis is used                      
  • to find some insecurity in a cryptographic scheme
  • to increase the speed
  • to encrypt the data
  • to make new ciphers
Q3 | Conventional cryptography is also known as or symmetric-key encryption.
  • secret-key
  • public key
  • protected key
  • primary key
Q4 |                                            is the art & science of cracking the cipher-text without knowing the key.
  • cracking
  • cryptanalysis
  • cryptography
  • crypto-hacking
Q5 | In cryptography, what is cipher?
  • algorithm for performing encryption and decryption
  • encrypted message
  • both algorithm for performing encryption and decryption and encrypted message
  • decrypted message
Q6 | In asymmetric key cryptography, the private key is kept by __________
  • sender
  • receiver
  • sender and receiver
  • all the connected devices to the network
Q7 | In cryptography, the order of the letters in a message is rearranged by __________
  • transpositional ciphers
  • substitution ciphers
  • both transpositional ciphers and substitution ciphers
  • quadratic ciphers
Q8 | Cryptanalysis is used __________
  • to find some insecurity in a cryptographic scheme
  • to increase the speed
  • to encrypt the data
  • to make new ciphers
Q9 | Which one of the following is a cryptographic protocol used to secure HTTP connection?
  • stream control transmission protocol (sctp)
  • transport layer security (tls)
  • explicit congestion notification (ecn)
  • resource reservation protocol
Q10 | Voice privacy in GSM cellular telephone protocol is provided by _______
  • a5/2 cipher
  • b5/4 cipher
  • b5/6 cipher
  • b5/8 cipher
Q11 | ElGamal encryption system is __________
  • symmetric key encryption algorithm
  • asymmetric key encryption algorithm
  • not an encryption algorithm
  • block cipher method
Q12 | Cryptographic hash function takes an arbitrary block of data and returns _________
  • fixed size bit string
  • variable size bit string
  • both fixed size bit string and variable size bit string
  • variable sized byte string
Q13 | In the above figure from left to right, the correct order of the shaded levels are
  • network level, application level, transport level
  • application level, network level, transport level
  • transport level, application level, network level
  • network level, transport level, application level
Q14 | In the above figure, which of the above shaded block is transparent to end users and applications?
  • ip/ipsec
  • ssl
  • kerberos
  • s/mime
Q15 | In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
  • TRUE
  • FALSE
Q16 | Which one of the following is not a higher –layer SSL protocol?
  • alert protocol
  • handshake protocol
  • alarm protocol
  • change cipher spec protocol
Q17 | In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
  • 216
  • 232
  • 214
  • 212
Q18 | The full form of SSL is
  • serial session layer
  • secure socket layer
  • session secure layer
  • series socket layer
Q19 | Which protocol is used to convey SSL related alerts to the peer entity?
  • alert protocol
  • handshake protocol
  • upper-layer protocol
  • change cipher spec protocol
Q20 | Which protocol consists of only 1 bit?
  • alert protocol
  • handshake protocol
  • upper-layer protocol
  • change cipher spec protocol
Q21 | Which protocol is used for the purpose of copying the pending state into the current state?
  • alert protocol
  • handshake protocol
  • upper-layer protocol
  • change cipher spec protocol
Q22 | In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
  • select, alarm
  • alert, alarm
  • warning, alarm
  • warning, fatal
Q23 | Pretty good privacy (PGP) security system uses
  • public key cryptosystem
  • private key cryptosystem
  • public & private key cryptosystem
  • none of the mentioned
Q24 | Data compression includes
  • removal of redundant character
  • uniform distribution of characters
  • removal of redundant character & uniform distribution of characters
  • none of the mentioned
Q25 | PGP offers _____ block ciphers for message encryption.
  • triple-des
  • cast
  • idea
  • all of the mentioned