Information Cyber Security Set 5
On This Page
This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 5
Q1 | When you use the word ______it means you are protecting your data from getting disclosed.
- a) confidentiality
- b) integrity
- c) authentication
- d) availability
Q2 | _______ means the protection of data from modification by unknown users.
- a) confidentiality
- b) integrity
- c) authentication
- d) non-repudiation
Q3 | _______ of information means, only authorized users are capable of accessing the information.
- a) confidentiality
- b) integrity
- c) non-repudiation
- d) availability
Q4 | This helps in identifying the origin of information and authentic user. This referred to here as __________
- a) confidentiality
- b) integrity
- c) authenticity
- d) availability
Q5 | Data ___________ is used to ensure confidentiality.
- a) encryption
- b) locking
- c) decryption
- d) backup
Q6 | What does OSI stand for in the OSI Security Architecure?
- a) open system interface
- b) open systems interconnections
- c) open source initiative
- d) open standard interconnections
Q7 | A company requires its users to change passwords every month. This improves the ________ of the network.
- a) performance
- b) reliability
- c) security
- d) none of the above
Q8 | Release of message contents and Traffic analysis are two types of _________ attacks.
- a) active attack
- b) modification of attack
- c) passive attack
- d) dos attack
Q9 | The ________ is encrypted text.
- a) cipher scricpt
- b) cipher text
- c) secret text
- d) secret script
Q10 | What type of attack uses a fraudulent server with a relay address?
- ntlm
- mitm
- netbios
- smb
Q11 | Which of the following Algorithms not belong to symmetric encryption
- 3des (tripledes)
- rsa
- rc5
- idea
Q12 | Which is the largest disadvantage of the symmetric Encryption?
- more complex and therefore more time-consuming calculations.
- problem of the secure transmission of the secret key.
- less secure encryption function.
- isn\t used any more.
Q13 | In cryptography, what is cipher?
- algorithm for performing encryption and decryption
- encrypted message
- both algorithm for performing encryption and decryption and encrypted message
- decrypted message
Q14 | In asymmetric key cryptography, the private key is kept by __________
- sender
- receiver
- sender and receiver
- all the connected devices to the network
Q15 | Which one of the following algorithm is not used in asymmetric-key cryptography?
- rsa algorithm
- diffie-hellman algorithm
- electronic code book algorithm
- dsa algorithm
Q16 | In cryptography, the order of the letters in a message is rearranged by __________
- transpositional ciphers
- substitution ciphers
- both transpositional ciphers and substitution ciphers
- quadratic ciphers
Q17 | What is data encryption standard (DES)?
- block cipher
- stream cipher
- bit cipher
- byte cipher
Q18 | A asymmetric-key (or public key ) cipher uses
- 1 key
- 2 key
- 3 key
- 4 key
Q19 | In asymmetric key cryptography, the two keys e and d, have special relationship to
- others
- data
- keys
- each other
Q20 | _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
- malware analysis
- exploit writing
- reverse engineering
- cryptography
Q21 | ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
- malware analysis
- cryptography
- reverse engineering
- exploit writing
Q22 | 4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
- secret key
- external programs
- add-ons
- secondary key
Q23 | Conventional cryptography is also known as _____________ or symmetric-key encryption.
- secret-key
- public key
- protected key
- primary key
Q24 | The procedure to add bits to the last block is termed as _________________
- decryption
- hashing
- tuning
- padding
Q25 | How many rounds does the AES-192 perform?
- 10
- 12
- 14
- 16