On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 1

Q1 | In the _______ mode, IPSec protects the whole IP packet, including the original IP header.
Q2 | An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL
Q3 | What port does Telnet use?
Q4 | A digital Signature is
Q5 | A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.
Q6 | ______uses the idea of certificate trust levels
Q7 | A digital signature needs a
Q8 | Pretty good privacy (PGP) is used in ______
Q9 | What is necessary for a cross-site script attack with cookies to be thwarted
Q10 | The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.
Q11 | For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.
Q12 | The basic Web Services platform is combination of _____ and _______
Q13 | For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.
Q14 | What is one advantage of setting up a DMZ with two firewalls?
Q15 | What are the two primary classifications of cross-site scripting?
Q16 | Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text.
Q17 | Why would a hacker use a proxy server?
Q18 | IPSec is designed to provide security at the _________
Q19 | Which component is included in IP security?
Q20 | What is Firewall?
Q21 | SSL stands for?
Q22 | What is the most important activity in system hacking?
Q23 | Why would HTTP Tunneling be used?
Q24 | The domain name space (tree) is devided into---------different sections
Q25 | The _____domains define registered hosts according to their generic behaviour.