# Computer Hardware and Networking/Information Cyber Security (ICS) MCQs Set 2 Sample Test,Sample questions

## Question: ` ECC stands for`

1. elliptic curve cryptography

2.enhanced curve cryptography

3.elliptic cone cryptography

4.eclipse curve cryptography

Posted Date:-2022-07-20 12:42:01

## Question: ` In asymmetric key cryptography, the two keys e and d, have special relationship to`

1.others

2.data

3.keys

4.each other

Posted Date:-2022-07-20 12:32:45

## Question: ` In cryptography, the order of the letters in a message is rearranged by __________`

1. transpositional ciphers

2.substitution ciphers

3.both transpositional ciphers and substitution ciphers

Posted Date:-2022-07-20 12:29:59

## Question: ` In DES step both LPT and RPT undergoes in how much key Rounds?`

1.8

2.16

3.32

4.64

Posted Date:-2022-07-20 12:10:02

## Question: ` In Symmetric schemes requires both parties to share how many secret key?`

1.one

2.two

3.three

4. four

Posted Date:-2022-07-20 12:08:32

## Question: ` In the course of conducting forensic analysis, which of the following actions are carried out?`

1. critical thinking

2.fusion

3.validation

4.All of the above

Posted Date:-2022-07-19 10:50:26

## Question: ` Security Measures Needed to protect ________ during their transmission`

1.file

2.data

3.packet

4.All of the above

Posted Date:-2022-07-19 10:51:07

## Question: ` What is full form of DDoS?`

1.derived denial of service

2.distributed denial ofservice

3.denial of service

4.None of these

Posted Date:-2022-07-20 11:56:55

## Question: ` What is lying of IP address called as?`

1.. ip spoofing

2.ip scamming

3.ip lying

4.None of These

Posted Date:-2022-07-20 11:55:41

## Question: ` When reconstructing evidence surrounding a violent crime, it is generally helpful to:`

1. lay out all the evidence so it can be viewed in its entirety

2. work with the crime scene technicians so that a better understanding of the crime is achieved

3.construct a timeline of events from digital evidence

4.begin the process of converting field notes to a final report

Posted Date:-2022-07-19 10:48:48

## Question: ` When you use the word ______it means you are protecting your data from getting disclosed.`

1.confidentiality

2.integrity

3.authentication

4.availability

Posted Date:-2022-07-20 12:18:44

## Question: ` Which one of the following algorithm is not used in asymmetric-key cryptography?`

1.rsa algorithm

2.diffie-hellman algorithm

3.electronic code book algorithm

4.dsa algorithm

Posted Date:-2022-07-20 12:29:10

## Question: `. In AES in which Round Subkeys are Generated from Original key for each round?`

1.key expansion

2.initial round

3.finale round

4.none of these

Posted Date:-2022-07-20 12:11:24

## Question: `4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.`

1.secret key

2. external programs

4.secondary key

Posted Date:-2022-07-20 12:35:20

## Question: `A asymmetric-key (or public key ) cipher uses`

1. 1 key

2.2 key

3.3 key

4. 4 key

Posted Date:-2022-07-20 12:31:47

## Question: `A company requires its users to change passwords every month. This improves the ________ of the network.`

1.performance

2.reliability

3.security

4.None of the above

Posted Date:-2022-07-20 12:21:55

## Question: `A digital signature needs ____ system`

1.symmetric-key

2.asymmetric-key

3. either (a) or (b)

4.neither (a) nor (b)

Posted Date:-2022-07-20 12:40:33

## Question: `A hacker guessing suggested password to a program is call as?`

2.dictionary attack

4.none of these

Posted Date:-2022-07-20 11:57:51

## Question: `A way to ensure that the entity is indeed what it claims to be.-`

1.authentication

2.accountability

3.identification

4.security

Posted Date:-2022-07-20 12:01:34

## Question: `AES stands for ?`

1.authorized encryption standard

4.none of these

Posted Date:-2022-07-20 12:12:10

## Question: `An act of protecting information from unauthorised disclouser to an entity.-`

1.intergrity

2.avability

3.confidentiality

4.none of these

Posted Date:-2022-07-20 12:00:53

## Question: `An attempt to harm, damage or cause threat to a system or network is broadly termed as ______`

1.cyber-crime

2.cyber attack

3.system hijacking

4.digital crime

Posted Date:-2022-07-20 12:16:05

## Question: `An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:`

1.part of the blame can be assigned to the victim.

2. the offender is likely to be found in the same area as the victim C

3.investigators should pay particular attention to acquaintances of the victim

4. investigators should always check the immediate family

Posted Date:-2022-07-19 10:43:41

## Question: `Blum Blum Shub Generator is based on which Algorithm?`

1.private key

2.public key

3.both a & b

4.none of these

Posted Date:-2022-07-20 12:09:25

## Question: `Computers and mobile devices are treated as _________ crime scenes in violent crime investigations.`

1.temporary

2.immediate

3.remote

4.secondary

Posted Date:-2022-07-19 10:49:29

## Question: `Conventional cryptography is also known as _____________ or symmetric-key encryption.`

1.secret-key

2.public key

3.protected key

4.primary key

Posted Date:-2022-07-20 12:36:07

## Question: `Conversion of Cypher text to plain text?`

1.encryption

2.decryption

3.simple text

4.none of these

Posted Date:-2022-07-20 11:59:32

## Question: `Conversion of plain text into Cipher text is called as________.`

1.encryption

2.decryption

3.hidden text

4.None of the above

Posted Date:-2022-07-20 12:06:58

## Question: `Data ___________ is used to ensure confidentiality.`

1.encryption

2.locking

3.decryption

4.backup

Posted Date:-2022-07-20 12:20:33

## Question: `ECC encryption system is __________`

1.symmetric key encryption algorithm

2.asymmetric key encryption algorithm

3.not an encryption algorithm

4. block cipher method

Posted Date:-2022-07-20 12:38:32

## Question: `Extensions to the X.509 certificates were added in version ____`

1.1

2.2

3.3

4.4

Posted Date:-2022-07-20 12:39:56

## Question: `How many rounds does the AES-192 perform?`

1.10

2.12

3.14

4.16

Posted Date:-2022-07-20 12:37:30

## Question: `In asymmetric key cryptography, the private key is kept by __________`

1. sender

4.all the connected devices to the network

Posted Date:-2022-07-20 12:28:11

## Question: `Prevention of the unauthorised used of Resources refers too?`

1.data integrity

2. data confidentiality

3.acess control

4.None of These

Posted Date:-2022-07-19 10:55:41

## Question: `Protection against Denial by one of these parties in a communication refers to?`

1.non-repudiation

2.data integrity

3.authentication

4.none of these

Posted Date:-2022-07-20 11:53:46

## Question: `Related to information security, confidentiality is the opposite of which of the following?`

1.closure

2.disclosure

3.disaster

4.disposal

Posted Date:-2022-07-20 12:17:24

## Question: `Release of message contents and Traffic analysis are two types of _________ attacks.`

1.active attack

2.modification of attack

3.passive attack

4.dos attack

Posted Date:-2022-07-20 12:22:55

## Question: `Symmetric key encryption is also called as?`

1.public key encryption

2.private keyencryption

3.both of these

4.none of these

Posted Date:-2022-07-20 11:58:39

## Question: `That part of cyberstalking where the offender is using the Internet to find a victim is known as:`

1. profiling

2.trolling

3.surreptitious monitoring

4. none of the above.

Posted Date:-2022-07-19 10:45:14

## Question: `The CIA triad is often represented by which of the following?`

1.riangle

2.diagonal

3.ellipse

4.circle

Posted Date:-2022-07-20 12:16:40

## Question: `The full form of OSI is OSI model__.`

1.open systemsinterconnection

2.open softwareinterconnection

3. open connection

4.open system internet

Posted Date:-2022-07-20 12:03:13

## Question: `The message which is not understandable is called as?`

1.cipher text

2.plain text

3.hidden text

4.both a & c

Posted Date:-2022-07-20 12:13:36

## Question: `The procedure to add bits to the last block is termed as _________________`

1. decryption

2.hashing

3.tuning

Posted Date:-2022-07-20 12:36:53

## Question: `The technique in which when one character is replaced by another Character is called as?`

1. transposition

2.substitution

3.combinational

4.None of these

Posted Date:-2022-07-20 12:05:17

## Question: `The ________ is encrypted text.`

1.cipher scricpt

2.cipher text

3.secret text

4.secret script

Posted Date:-2022-07-20 12:23:50

## Question: `The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.`

1.evidence inventory

2.evidence intake

3.evidence intake

4. preservation notes

Posted Date:-2022-07-19 10:46:09

## Question: `The__model is 7 layer architecture where each layer is having some specific functionality to perform.`

1. tcp

2.osi

3.ois

4.none of these

Posted Date:-2022-07-20 12:02:13

## Question: `This helps in identifying the origin of information and authentic user. This referred to here as __________`

1.confidentiality

2.integrity

3.authenticity

4.availability

Posted Date:-2022-07-20 12:20:07

## Question: `What does OSI stand for in the OSI Security Architecure?`

1.open system interface

2.open systems interconnections

3.open source initiative

4.open standard interconnections

Posted Date:-2022-07-20 12:21:20

## Question: `What is data encryption standard (DES)?`

1.block cipher

2.stream cipher

3.bit cipher

4.byte cipher

Posted Date:-2022-07-20 12:31:07

## Question: `What is the 4th step in DES Algorithm?`

1.key transformation

2.s-box substitution

3.p-box permutation

4.expansion permutation

Posted Date:-2022-07-20 12:10:44

## Question: `What type of attack uses a fraudulent server with a relay address?`

1.ntlm

2.mitm

3.netbios

4.smb

Posted Date:-2022-07-20 12:25:38

## Question: `When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:`

1. the victim might have been withholding information during the first interview.

2. the information that investigators have gathered might help the victim recall additional details.

3. the time between the first and second interviews has given the victim time to seek counseling.

4. none of the above

Posted Date:-2022-07-19 10:44:28

## Question: `When a hash function is used to provide message authentication, the hash function value is referred to as`

1.message field

2.message digest

3. message score

4.message leap

Posted Date:-2022-07-20 12:42:42

## Question: `When you have developed a theory, what can you do to confirm that your hypothesis is correct?`

1.predict, based on your hypothesis, where artifacts should be located

2.perform experiments to test results and rule out alternate explanations

3.conclude, based on your findings, whether the evidence supports the hypothesis

4.All of the above

Posted Date:-2022-07-19 10:47:26

## Question: `Which is the largest disadvantage of the symmetric Encryption?`

1.more complex and therefore more time-consuming calculations.

2.problem of the secure transmission of the secret key.

3.less secure encryption function

4.isn used any more.

Posted Date:-2022-07-20 12:26:44

## Question: `Which of them is type of Cipher?`

1.stream cipher

2. block cipher

3.both of them

4.None of these

Posted Date:-2022-07-20 12:12:50

## Question: `Which One of them is Passive attack?`

1.denial of service

2.modify message intransit

3. replay previous message

4.obtain message contain

Posted Date:-2022-07-20 11:54:40

## Question: `__ platforms are used for safety and protection of information in the cloud.`

2.cloud security protocols

3.aws

4.one drive

Posted Date:-2022-07-20 12:14:59

## Question: `__is used to create the organisation's overall security program.`

1.program policy

2.purpose

3.security

4.none of these

Posted Date:-2022-07-20 12:00:05

## Question: `___function creates a message digest out of a message.`

1.encryption

2.decryption

3.hash

4.none of the above

Posted Date:-2022-07-20 12:39:20

## Question: `_____ means the protection of data from modification by unknown users.`

1.confidentiality

2.integrity

3.authentication

4.non-repudiation

Posted Date:-2022-07-20 12:19:21

## Question: `______ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.`

1.malware analysis

2.cryptography

3.reverse engineering

4.exploit writing

Posted Date:-2022-07-20 12:34:37

## Question: `________ means knowledge obtained from investigation, study , intelligence new ,facts .`

1.security

2.data

3.information

4.None of the above

Posted Date:-2022-07-19 10:52:01

## Question: `_____________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.`

1.malware analysis

2.exploit writing

3.reverse engineering

4.cryptography

Posted Date:-2022-07-20 12:33:39

## More MCQS

##### R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!