On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 6

Q1 | ECC encryption system is __________
Q2 | ________function creates a message digest out of a message.
Q3 | Extensions to the X.509 certificates were added in version ____
Q4 | A digital signature needs ____ system
Q5 | “Elliptic curve cryptography follows the associative property.”
Q6 | ECC stands for
Q7 | When a hash function is used to provide message authentication, the hash function value is referred to as
Q8 | Message authentication code is also known as
Q9 | The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.
Q10 | The DSS signature uses which hash algorithm?
Q11 | What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
Q12 | In the handshake protocol which is the message type first sent between client and server ?
Q13 | One commonly used public-key cryptography method is the ______ algorithm.
Q14 | he ________ method provides a one-time session key for two parties.
Q15 | The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
Q16 | 1. VPN is abbreviated as __________
Q17 | __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.
Q18 | Which of the statements are not true to classify VPN systems?
Q19 | What types of protocols are used in VPNs?
Q20 | VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
Q21 | There are _________ types of VPNs.
Q22 | _________ type of VPNs are used for home private and secure connectivity.
Q23 | Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
Q24 | Site-to-Site VPN architecture is also known as _________
Q25 | There are ________ types of VPN protocols.