On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 11

Q1 | The procedure to add bits to the last block is termed as
Q2 | Cryptanalysis is used                      
Q3 | Conventional cryptography is also known as or symmetric-key encryption.
Q4 |                                            is the art & science of cracking the cipher-text without knowing the key.
Q5 | In cryptography, what is cipher?
Q6 | In asymmetric key cryptography, the private key is kept by __________
Q7 | In cryptography, the order of the letters in a message is rearranged by __________
Q8 | Cryptanalysis is used __________
Q9 | Which one of the following is a cryptographic protocol used to secure HTTP connection?
Q10 | Voice privacy in GSM cellular telephone protocol is provided by _______
Q11 | ElGamal encryption system is __________
Q12 | Cryptographic hash function takes an arbitrary block of data and returns _________
Q13 | In the above figure from left to right, the correct order of the shaded levels are
Q14 | In the above figure, which of the above shaded block is transparent to end users and applications?
Q15 | In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
Q16 | Which one of the following is not a higher –layer SSL protocol?
Q17 | In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
Q18 | The full form of SSL is
Q19 | Which protocol is used to convey SSL related alerts to the peer entity?
Q20 | Which protocol consists of only 1 bit?
Q21 | Which protocol is used for the purpose of copying the pending state into the current state?
Q22 | In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
Q23 | Pretty good privacy (PGP) security system uses
Q24 | Data compression includes
Q25 | PGP offers _____ block ciphers for message encryption.