0% found this document useful (0 votes)
73 views

Ics MCQ Set

The document contains questions and answers about cybersecurity concepts like the CIA triad, encryption, hashing, digital signatures, public key infrastructure, VPNs, SSL/TLS, PGP, S/MIME, IPSec, and other topics. Specifically: - The CIA triad is represented by a triangle. Integrity means protecting data from unauthorized modification. Authenticity helps identify the origin of information. Encryption is used to ensure confidentiality. - Passive attacks involve release of message contents or traffic analysis. Cipher text is encrypted text. Asymmetric key ciphers use two keys. Cryptography is the process of encrypting and decrypting data. - DES is a block cipher. A

Uploaded by

Nisha Mate
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views

Ics MCQ Set

The document contains questions and answers about cybersecurity concepts like the CIA triad, encryption, hashing, digital signatures, public key infrastructure, VPNs, SSL/TLS, PGP, S/MIME, IPSec, and other topics. Specifically: - The CIA triad is represented by a triangle. Integrity means protecting data from unauthorized modification. Authenticity helps identify the origin of information. Encryption is used to ensure confidentiality. - Passive attacks involve release of message contents or traffic analysis. Cipher text is encrypted text. Asymmetric key ciphers use two keys. Cryptography is the process of encrypting and decrypting data. - DES is a block cipher. A

Uploaded by

Nisha Mate
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Q. 5 The CIA triad is often represented by which of the following?

A : Triangle
B : Diagonal
C : Ellipse
D : Circle

Show Answer
Triangle

Q. 8 _______ means the protection of data from modification by unknown users.


A : Confidentiality
B : Integrity
C : Authentication
D : Non-repudiation

Show Answer
Integrity

Q. 10 This helps in identifying the origin of information and authentic user. This
referred to here as __________
A : Confidentiality
B : Integrity
C : Authenticity
D : Availability

Show Answer
Authenticity

Q. 11 Data ___________ is used to ensure confidentiality.


A : Encryption
B : Locking
C : Decryption
D : Backup

Q. 14 Release of message contents and Traffic analysis are two types of _________
attacks.
A : Active Attack
B : Modification of Attack
C : Passive attack
D : DoS Attack
Show Answer
Passive attack

Q. 15 The ________ is encrypted text.


A : Cipher scricpt
B : Cipher text
C : Secret text
D : Secret script

Cipher text

Q. 17 Which of the following Algorithms not belong to symmetric encryption


A : 3DES (TripleDES)
B : RSA
C : RC5
D : IDEA

Show Answer
RSA

Q. 18 Which is the largest disadvantage of the symmetric Encryption?


A : More complex and therefore more time-consuming calculations.
B : Problem of the secure transmission of the Secret Key.
C : Less secure encryption function.
D : Isn’t used any more.

Show Answer
Problem of the secure transmission of the Secret Key.

Q. 19 In cryptography, what is cipher?


A : algorithm for performing encryption and decryption
B : encrypted message
C : both algorithm for performing encryption and decryption and encrypted message
D : decrypted message

algorithm for performing encryption and decryption

Q. 21 Which one of the following algorithm is not used in asymmetric-key


cryptography?
A : rsa algorithm
B : diffie-hellman algorithm
C : electronic code book algorithm
D : dsa algorithm

Show Answer
electronic code book algorithm

Q. 23 What is data encryption standard (DES)?


A : block cipher
B : stream cipher
C : bit cipher
D : byte cipher

Show Answer
block cipher

Q. 24 A asymmetric-key (or public key ) cipher uses


A : 1 key
B : 2 key
C : 3 key
D : 4 key

Show Answer
2 key

Q. 26 _________________ is the process or mechanism used for converting ordinary plain


text into garbled non-human readable text & vice-versa.
A : Malware Analysis
B : Exploit writing
C : Reverse engineering
D : Cryptography

Cryptography

Q.27 ______________ is a means of storing & transmitting information in a specific


format so that only those for whom it is planned can understand or process it.
A : Malware Analysis
B : Cryptography
C : Reverse engineering
D : Exploit writing
Show Answer
Cryptography

Q. 28 Cryptographic algorithms are based on mathematical algorithms where these


algorithms use ___________ for a secure transformation of data.
A : secret key
B : external programs
C : add-ons
D : secondary key

Show Answer
secret key

Q. 29 Conventional cryptography is also known as _____________ or symmetric-key


encryption.
A : secret-key
B : public key
C : protected key
D : primary key

secret-key

Q. 30 The procedure to add bits to the last block is termed as _________________


A : decryption
B : hashing
C : tuning
D : padding

Show Answer
padding

. 32 ECC encryption system is __________


A : symmetric key encryption algorithm
B : asymmetric key encryption algorithm
C : not an encryption algorithm
D : block cipher method

asymmetric key encryption algorithm


Q. 33 ________function creates a message digest out of a message.
A : encryption
B : decryption
C : hash
D : none of the above

Show Answer
hash

Q. 34 Extensions to the X.509 certificates were added in version ____


A:1
B:2
C:3
D:4

Show Answer
3

Q. 35 A digital signature needs ____ system


A : symmetric-key
B : asymmetric-key
C : either (a) or (b)
D : neither (a) nor (b)

asymmetric-key

Q. 36 Elliptic curve cryptography follows the associative property.


A : TRUE
B : FALSE

Show Answer
TRUE

Q. 37 ECC stands for


A : Elliptic curve cryptography
B : Enhanced curve cryptography
C : Elliptic cone cryptography
D : Eclipse curve cryptography

Show Answer
Elliptic curve cryptography

Q. 38 When a hash function is used to provide message authentication, the hash


function value is referred to as
A : Message Field
B : Message Digest
C : Message Score
D : Message Leap

Show Answer
Message Leap

Q. 39 Message authentication code is also known as


A : key code
B : hash code
C : keyed hash function
D : message key hash function

hash code

Q. 40 The main difference in MACs and digital signatures is that, in digital signatures
the hash value of the message is encrypted with a user’s public key.
A : TRUE
B : FALSE

Show Answer
FALSE

Q. 41 The DSS signature uses which hash algorithm?


A : MD5
B : SHA-2
C : SHA-1
D : Does not use hash algorithm

Show Answer
SHA-1

Q. 42 What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
A : 42 bytes
B : 32 bytes
C : 36 bytes
D : 48 bytes

Show Answer
36 bytes

Q. 43 In the handshake protocol which is the message type first sent between client
and server ?
A : server_hello
B : client_hello
C : hello_request
D : certificate_request
Show Answer
client_hello

Q. 44 One commonly used public-key cryptography method is the ______ algorithm.


A : RSS
B : RAS
C : RSA
D : RAA

RSA

Q. 45 The ________ method provides a one-time session key for two parties.
A : Diffie-Hellman
B : RSA
C : DES
D : AES

Show Answer
Diffie-Hellman

Q. 46 The _________ attack can endanger the security of the Diffie-Hellman method if
two parties are not authenticated to each other.
A : man-in-the-middle
B : ciphertext attack
C : plaintext attack
D : none of the above

Show Answer
man-in-the-middle

Q. 48 VPN is abbreviated as __________


A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Private Network
D : Virtual Protocol Networking

Show Answer
Virtual Private Network

Q. 49 __________ provides an isolated tunnel across a public network for sending and
receiving data privately as if the computing devices were directly connected to the
private network.
A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Protocol Networking
D : Virtual Private Network

Q. 58 IPSec is designed to provide security at the _________


A : Transport layer
B : Network layer
C : Application layer
D : Session layer

Show Answer
Network layer

Q. 59 In tunnel mode, IPSec protects the ______


A : Entire IP packet
B : IP header
C : IP payload
D : IP trailer

Show Answer
Entire IP packet

Q. 60 Pretty good privacy (PGP) is used in ______


A : Browser security
B : Email security
C : FTP security
D : WiFi security

Email security

Q. 61 PGP encrypts data by using a block cipher called ______


A : International data encryption algorithm
B : Private data encryption algorithm
C : Internet data encryption algorithm
D : Local data encryption algorithm

Show Answer
International data encryption algorithm

Q. 62 IKE creates SAs for _____.


A : SSL
B : PGP
C : IPSec
D : VP

Show Answer
IPSec

Q. 63 ______ provides either authentication or encryption, or both, for packets at the IP


level.
A : AH
B : ESP
C : PGP
D : SSL

ESP

Q. 64 A _______network is used inside an organization.


A : private
B : public
C : semi-private
D : semi-public

Show Answer
private
Q. 65 SSL provides _________.
A : message integrity
B : confidentiality
C : compression
D : all of the above

Show Answer
all of the above

Q. 66 IKE uses _______


A : Oakley
B : SKEME
C : ISAKMP
D : all of the above

all of the above

Q. 67 In ______, there is a single path from the fully trusted authority to any certificate.
A : X509
B : PGP
C : KDC
D : none of the above

Show Answer
X509

Q. 68 A ______ provides privacy for LANs that must communicate through the global
Internet.
A : VPP
B : VNP
C : VNN
D : VPN

Show Answer
VPN

Q. 69 _______ uses the idea of certificate trust levels.


A : X509
B : PGP
C : KDC
D : none of the above

Show Answer
PGP

Q. 70 ________ provides privacy, integrity, and authentication in e-mail.


A : IPSec
B : SSL
C : PGP
D : none of the above

PGP

. 73 In _______, the cryptographic algorithms and secrets are sent with the message.
A : IPSec
B : SSL
C : TLS
D : PGP
Show Answer
PGP

Q. 74 ______ was invented by Phil Zimmerman.


A : IPSec
B : SSL
C : PGP
D : none of the above

PGP

Q. 76 PGP makes use of which cryptographic algorithm?


A : DES
B : AES
C : RSA
D : Rabin

Show Answer
RSA

Q. 78 In SSL, what is used for authenticating a message?


A : MAC (Message Access Code)
B : MAC (Message Authentication Code)
C : MAC (Machine Authentication Code)
D : MAC (Machine Access Code)
MAC (Message Authentication Code)

Q. 79 S/MIME is abbreviated as __________________


A : Secure/Multimedia Internet Mailing Extensions
B : Secure/Multipurpose Internet Mailing Extensions
C : Secure/Multimedia Internet Mail Extensions
D : Secure/Multipurpose Internet Mail Extensions

Show Answer
Secure/Multipurpose Internet Mail Extensions

Q. 80 Security Measures Needed to protect ________ during their transmission


A : file
B : Data
C : packet
D : All of above

Data

Q. 81 __________ means knowledge obtained from investigation, study , intelligence


new ,facts .
A : Security
B : Data
C : Information
D : None of These

Show Answer
Information

Q. 82 Prevention of the unauthorised used of Resources refers too?


A : Data Integrity
B : Data confidentiality
C : Access Control
D : None of these

Show Answer
Access Control
Q. 83 Protection against Denial by one of these parties in a communication refers to?
A : Non-Repudiation
B : Data integrity
C : Authentication
D : None of these

Non-Repudiation

Q. 84 Which One of them is Passive attack?


A : Denial of Service
B : modify message in transit
C : Replay previous message
D : obtain message contain
85 What is lying of IP address called as?IP Spoofing IP Scamming IP Lying None Of theses a

Show Answer
obtain message contain

Q. 86 What is full form of DDoS?


A : Derived Denial of service
B : Distributed Denial of service
C : Denial of service
D : None of these

Show Answer
Distributed Denial of service

Q. 87 A hacker guessing suggested password to a program is call as?


A : Password Guessing
B : Dictionary Attack
C : Default password attack
D : None of these

Default password attack

Q. 88 Symmetric key encryption is also called as?


A : public key Encryption
B : Private Key Encryption
C : Both of these
D : None of these
Private Key Encryption

Q. 89 Conversion of Cypher text to plain text?


A : Encryption
B : Decryption
C : Simple text
D : none of these

Show Answer
Decryption

Q. 90 __is used to create the organisation’s overall security program.


A : program policy
B : purpose
C : security
D : none of these

Show Answer
program policy

Q. 91 An act of protecting information from unauthorised disclouser to an entity.-


A : intergrity
B : avability
C : confidentiality
D : none of these

confidentiality

Q. 92 A way to ensure that the entity is indeed what it claims to be.-


A : Authentication
B : Accountability
C : identification
D : security

Authentication

Q. 93 The__model is 7 layer architecture where each layer is having some specific


functionality to perform.
A : TCP
B : OSI
C : OIS
D : none of these

Show Answer

Q. 97 In Symmetric schemes requires both parties to share how many secret key?
A : one
B : two
C : three
D : four

Show Answer
One

Q. 101 In AES in which Round Subkeys are Generated from Original key for each
round?
A : Key Expansion
B : Initial Round
C : Finale Round
D : none of these

Show Answer
Key Expansion

Q. 102 AES stands for?


A : Authorized Encryption Standard
B : Advance Encryption Standard
C : Advance Encryption Strategy
D : none of these

Show Answer
Advance Encryption Standard

Q. 103 Which of them is type of Cipher?


A : Stream Cipher
B : Block Cipher
C : both of Them
D : none of these

both of Them
Q. 105 The__is a polygraphic substitution cipher based on linear algebra.
A : Hill cipher
B : playfair cipher
C : Affine cipher
D : none of these

Show Answer
Hill cipher

Q. 111 In Asymmetric-Key Cryptography, although RSA can be used to encrypt and


decrypt actual messages, it is very slow if the message is
A : Short
B : Flat
C : Long
D : Thin

Show Answer
Long

Q. 112 The man-in-the-middle attack can endanger the security of the Diffie-Hellman
method if two parties are not
A : Authenticated
B : Joined
C : Submit
D : Separate

Authenticated

Q. 114 For RSA to work, the value of P must be less than the value of
A:p
B:q
C:n
D:r

Show Answer
n

Q. 116 In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is
relatively prime to Ф(n).
A : TRUE
B : FALSE

Show Answer
FALSE

Q. 117 RSA is also a stream cipher like Merkel-Hellman.


A : TRUE
B : FALSE

Show Answer
TRUE

Q. 121 ECC stands for


A : Elliptic Curve Cryptography
B : Elliptic Cryptography Curve
C : Error Correcting Code
D : None of the above

Show Answer
Elliptic Curve Cryptography

Q. 122 Diffie-Hellman algorithm is widely known as_________


A : Key exchange algorithm
B : key agreement algorithm
C : only a
D : Both a and b

Show Answer
Key exchange algorithm

Q. 123 Hash function is used for________


A : Message authentication
B : Digital Signature
C : Both a and b
D : only a

Both a and b
Q. 124 RSA algorithm is best example of_______
A : Asymmetric key cryptography
B : Symmetric key cryptography
C : Elliptic Curve Cryptography
D : All of the above

Show Answer
Asymmetric key cryptography

Q. 127 HTTPS is abbreviated as _________


A : Hypertexts Transfer Protocol Secured
B : Secured Hyper Text Transfer Protocol
C : Hyperlinked Text Transfer Protocol Secured
D : Hyper Text Transfer Protocol Secure

Secured Hyper Text Transfer Protocol

Q. 128 An attempt to make a computer resource unavailable to its intended users is


called ______
A : Denial-of-service attack
B : Virus attack
C : Worms attack
D : Botnet process

Show Answer
Denial-of-service attack

Q. 129 SSL primarily focuses on _______


A : integrity and authenticity
B : integrity and non-repudiation
C : authenticity and privacy
D : confidentiality and integrity

Show Answer
integrity and authenticity

Q. 130 Pretty good privacy (PGP) is used in ______


A : Browser security
B : Email security
C : WiFi security
D : FTP security

Email security

Q. 131 __________ is used for encrypting data at network level


A : IPSec
B : HTTPS
C : SMTP
D : S/MIME

Show Answer
IPSec

Q. 132 WPA2 is used for security in _______


A : Ethernet
B : Wi-Fi
C : Bluetooth
D : E-mail

Show Answer
Wi-Fi

Q. 133 Which of the following is not a strong security protocol


A : SSL
B : HTTPL
C : SMTP
D : SFTP

Show Answer
SMTP

Q. 134 TSL (Transport Layer Security) is a cryptographic protocol used for securing
HTTP/HTTPS based connection.
A : TRUE
B : FALSE

Show Answer
TRUE
Q. 135 IPSec operates in….. different modes
A:3
B:2
C:4
D:5

Show Answer
2

Q. 136 length of the IPv4 address is ….


A : 32 bits
B : 64 bits
C : 16 bits
D : 128 bit

32 bits

Q. 137 Internet Key Exchange has …. phases and modes of operations


A:4
B:3
C:2
D:5

Show Answer
2

Q. 138 PGP is abbreviated as


A : Pretty Good Privacy
B : Pretty Good Policy
C : Policy Good Privacy
D : Pretty Good Protection

Show Answer
Pretty Good Privacy

Q. 139 SET stands for


A : Set Electronic Transaction
B : Secure Electronic Transaction
C : Simple Electronic Transaction
D : none of the above
Secure Electronic Transaction

Q. 140 Transport layer Protocol consists of … main components


A:2
B:1
C:3
D:4

Show Answer
2

Q. 141 length of the IPv6 acddress is ….


A : 32 bits
B : 64 bits
C : 16 bits
D : 128 bit

Show Answer
128 bits

Q. 142 SSL provides _________.


A : message integrity
B : confidentiality
C : compression
D : all of the above

Show Answer
all of the above

Q. 143 IPSec provides ….protocols for network layer


A:7
B:3
C:1
D:4

Show Answer
7

Q. 144 length of the IPv6 header is….


A : 64 bits
B : 16 bits
C : 32 bits
D : 8 bits

32 bits

You might also like