On This Page

This set of Information Cyber Security (ICS) Multiple Choice Questions & Answers (MCQs) focuses on Information Cyber Security Set 9

Q1 | For RSA to work, the value of P must be less than the value of
Q2 | In RSA, ?(n) = _______ in terms of p and q.
Q3 | In RSA, we select a value ‘e’ such that it lies between 0 and ?(n) and it is relatively prime to ?(n).
Q4 | RSA is also a stream cipher like Merkel-Hellman.
Q5 | USENET falls under which category of public key sharing?
Q6 | PGP makes use of which cryptographic algorithm?
Q7 | Public key cryptography also called as________
Q8 | ECC stands for
Q9 | Diffie-Hellman algorithm is widely known as_________
Q10 | Hash function is used for________
Q11 | RSA algorithm is best example of_______
Q12 | In tunnel mode, IPSec protects the ______
Q13 | HTTPS is abbreviated as _________
Q14 | An attempt to make a computer resource unavailable to its intended users is called ______
Q15 | SSL primarily focuses on _______
Q16 | Pretty good privacy (PGP) is used in ______
Q17 | __________ is used for encrypting data at network level
Q18 | WPA2 is used for security in _______
Q19 | Which of the following is not a strong security protocol
Q20 | TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
Q21 | IPSec operates in..... different modes
Q22 | length of the IPv4 address is ....
Q23 | Internet Key Exchange has .... phases and modes of operations
Q24 | PGP is abbreviated as
Q25 | SET stands for