On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 5

Q1 | When you use the word ______it means you are protecting your data from getting disclosed.
Q2 | _______ means the protection of data from modification by unknown users.
Q3 | _______ of information means, only authorized users are capable of accessing the information.
Q4 | This helps in identifying the origin of information and authentic user. This referred to here as __________
Q5 | Data ___________ is used to ensure confidentiality.
Q6 | What does OSI stand for in the OSI Security Architecure?
Q7 | A company requires its users to change passwords every month. This improves the ________ of the network.
Q8 | Release of message contents and Traffic analysis are two types of _________ attacks.
Q9 | The ________ is encrypted text.
Q10 | What type of attack uses a fraudulent server with a relay address?
Q11 | Which of the following Algorithms not belong to symmetric encryption
Q12 | Which is the largest disadvantage of the symmetric Encryption?
Q13 | In cryptography, what is cipher?
Q14 | In asymmetric key cryptography, the private key is kept by __________
Q15 | Which one of the following algorithm is not used in asymmetric-key cryptography?
Q16 | In cryptography, the order of the letters in a message is rearranged by __________
Q17 | What is data encryption standard (DES)?
Q18 | A asymmetric-key (or public key ) cipher uses
Q19 | In asymmetric key cryptography, the two keys e and d, have special relationship to
Q20 | _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
Q21 | ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
Q22 | 4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
Q23 | Conventional cryptography is also known as _____________ or symmetric-key encryption.
Q24 | The procedure to add bits to the last block is termed as _________________
Q25 | How many rounds does the AES-192 perform?