Ics MCQ Set
Ics MCQ Set
A : Triangle
B : Diagonal
C : Ellipse
D : Circle
Show Answer
Triangle
Show Answer
Integrity
Q. 10 This helps in identifying the origin of information and authentic user. This
referred to here as __________
A : Confidentiality
B : Integrity
C : Authenticity
D : Availability
Show Answer
Authenticity
Q. 14 Release of message contents and Traffic analysis are two types of _________
attacks.
A : Active Attack
B : Modification of Attack
C : Passive attack
D : DoS Attack
Show Answer
Passive attack
Cipher text
Show Answer
RSA
Show Answer
Problem of the secure transmission of the Secret Key.
Show Answer
electronic code book algorithm
Show Answer
block cipher
Show Answer
2 key
Cryptography
Show Answer
secret key
secret-key
Show Answer
padding
Show Answer
hash
Show Answer
3
asymmetric-key
Show Answer
TRUE
Show Answer
Elliptic curve cryptography
Show Answer
Message Leap
hash code
Q. 40 The main difference in MACs and digital signatures is that, in digital signatures
the hash value of the message is encrypted with a user’s public key.
A : TRUE
B : FALSE
Show Answer
FALSE
Show Answer
SHA-1
Q. 42 What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
A : 42 bytes
B : 32 bytes
C : 36 bytes
D : 48 bytes
Show Answer
36 bytes
Q. 43 In the handshake protocol which is the message type first sent between client
and server ?
A : server_hello
B : client_hello
C : hello_request
D : certificate_request
Show Answer
client_hello
RSA
Q. 45 The ________ method provides a one-time session key for two parties.
A : Diffie-Hellman
B : RSA
C : DES
D : AES
Show Answer
Diffie-Hellman
Q. 46 The _________ attack can endanger the security of the Diffie-Hellman method if
two parties are not authenticated to each other.
A : man-in-the-middle
B : ciphertext attack
C : plaintext attack
D : none of the above
Show Answer
man-in-the-middle
Show Answer
Virtual Private Network
Q. 49 __________ provides an isolated tunnel across a public network for sending and
receiving data privately as if the computing devices were directly connected to the
private network.
A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Protocol Networking
D : Virtual Private Network
Show Answer
Network layer
Show Answer
Entire IP packet
Email security
Show Answer
International data encryption algorithm
Show Answer
IPSec
ESP
Show Answer
private
Q. 65 SSL provides _________.
A : message integrity
B : confidentiality
C : compression
D : all of the above
Show Answer
all of the above
Q. 67 In ______, there is a single path from the fully trusted authority to any certificate.
A : X509
B : PGP
C : KDC
D : none of the above
Show Answer
X509
Q. 68 A ______ provides privacy for LANs that must communicate through the global
Internet.
A : VPP
B : VNP
C : VNN
D : VPN
Show Answer
VPN
Show Answer
PGP
PGP
. 73 In _______, the cryptographic algorithms and secrets are sent with the message.
A : IPSec
B : SSL
C : TLS
D : PGP
Show Answer
PGP
PGP
Show Answer
RSA
Show Answer
Secure/Multipurpose Internet Mail Extensions
Data
Show Answer
Information
Show Answer
Access Control
Q. 83 Protection against Denial by one of these parties in a communication refers to?
A : Non-Repudiation
B : Data integrity
C : Authentication
D : None of these
Non-Repudiation
Show Answer
obtain message contain
Show Answer
Distributed Denial of service
Show Answer
Decryption
Show Answer
program policy
confidentiality
Authentication
Show Answer
Q. 97 In Symmetric schemes requires both parties to share how many secret key?
A : one
B : two
C : three
D : four
Show Answer
One
Q. 101 In AES in which Round Subkeys are Generated from Original key for each
round?
A : Key Expansion
B : Initial Round
C : Finale Round
D : none of these
Show Answer
Key Expansion
Show Answer
Advance Encryption Standard
both of Them
Q. 105 The__is a polygraphic substitution cipher based on linear algebra.
A : Hill cipher
B : playfair cipher
C : Affine cipher
D : none of these
Show Answer
Hill cipher
Show Answer
Long
Q. 112 The man-in-the-middle attack can endanger the security of the Diffie-Hellman
method if two parties are not
A : Authenticated
B : Joined
C : Submit
D : Separate
Authenticated
Q. 114 For RSA to work, the value of P must be less than the value of
A:p
B:q
C:n
D:r
Show Answer
n
Q. 116 In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is
relatively prime to Ф(n).
A : TRUE
B : FALSE
Show Answer
FALSE
Show Answer
TRUE
Show Answer
Elliptic Curve Cryptography
Show Answer
Key exchange algorithm
Both a and b
Q. 124 RSA algorithm is best example of_______
A : Asymmetric key cryptography
B : Symmetric key cryptography
C : Elliptic Curve Cryptography
D : All of the above
Show Answer
Asymmetric key cryptography
Show Answer
Denial-of-service attack
Show Answer
integrity and authenticity
Email security
Show Answer
IPSec
Show Answer
Wi-Fi
Show Answer
SMTP
Q. 134 TSL (Transport Layer Security) is a cryptographic protocol used for securing
HTTP/HTTPS based connection.
A : TRUE
B : FALSE
Show Answer
TRUE
Q. 135 IPSec operates in….. different modes
A:3
B:2
C:4
D:5
Show Answer
2
32 bits
Show Answer
2
Show Answer
Pretty Good Privacy
Show Answer
2
Show Answer
128 bits
Show Answer
all of the above
Show Answer
7
32 bits