Computer Hardware and Networking/Information Cyber Security (ICS) MCQs Set 3 Sample Test,Sample questions

Question:
  IKE creates SAs for _____.

1. ssl

2.pgp

3.ipsec

4.vp

Posted Date:-2022-07-21 11:16:08


Question:
 1. VPN is abbreviated as __________

1.visual private network

2.virtual protocol network

3. virtual private network

4.virtual protocol networking

Posted Date:-2022-07-21 06:20:12


Question:
 AES stands for?

1.authorized encryption standard

2.advance encryption standard

3.advance encryption strategy

4.none of these

Posted Date:-2022-07-21 12:03:47


Question:
 An asymmetric-key (or public-key) cipher uses

1. 1 key

2.2 key

3.3 key

4.4 key

Posted Date:-2022-07-21 12:18:44


Question:
 In DES step both LPT and RPT undergoes in how much key Rounds?

1.8

2.16

3.32

4.64

Posted Date:-2022-07-21 12:00:49


Question:
 In Symmetric schemes requires both parties to share how many secret key?

1.one

2.two

3.three

4.four

Posted Date:-2022-07-21 11:58:57


Question:
 In the handshake protocol which is the message type first sent between client and server ?

1.server_hello

2.client_hello

3.hello_request

4.certificate_request

Posted Date:-2022-07-21 06:16:44


Question:
 In _____, there can be multiple paths from fully or partially trusted authorities.

1.x509 .

2.pgp

3.kdc

4.none of the above

Posted Date:-2022-07-21 11:33:26


Question:
 In ______, there is a single path from the fully trusted authority to any certificate.

1. x509

2.pgp

3.kdc

4.None of the above

Posted Date:-2022-07-21 11:21:29


Question:
 The full form of OSI is OSI model__.

1.open systems interconnection

2.open software interconnection

3.open connection

4.open system internet

Posted Date:-2022-07-21 11:56:39


Question:
 What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

1.42 bytes

2.32 bytes

3.36 bytes

4.48 bytes

Posted Date:-2022-07-21 06:14:35


Question:
 Which One of them is Passive attack?

1.denial of service

2.replay previous message

3.modify message in transit

4.obtain message contain

Posted Date:-2022-07-21 11:47:57


Question:
 Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?

1.remote access vpns

2. site-to-site vpns

3.peer-to-peer vpns

4.country-to-country vpns

Posted Date:-2022-07-21 11:08:44


Question:
A hacker guessing suggested password to a program is call as?

1. password guessing

2.dictionary attack

3.default password attack

4.none of these

Posted Date:-2022-07-21 11:50:45


Question:
A way to ensure that the entity is indeed what it claims to be.-

1.authentication

2.accountability

3.identification

4.security

Posted Date:-2022-07-21 11:54:42


Question:
Blum Blum Shub Generator is based on which Algorithm?

1. private key

2.public key

3.both a & b

4.none of these

Posted Date:-2022-07-21 11:59:47


Question:
Conversion of Cypher text to plain text?

1.encryption

2.decryption

3.simple text

4. none of these

Posted Date:-2022-07-21 11:52:19


Question:
Conversion of plain text into Cipher text is called as________.

1.encryption

2.decryption

3.hidden text

4.none of above

Posted Date:-2022-07-21 11:58:02


Question:
Conversion of plain text into Cipher text is called as________.

1.encryption

2.decryption

3.hidden text

4.none of above

Posted Date:-2022-07-21 11:58:03


Question:
For RSA to work, the value of P must be less than the value of

1.p

2.q

3.n

4.r

Posted Date:-2022-07-21 12:27:41


Question:
he ________ method provides a one-time session key for two parties.

1. diffie-hellman

2.rsa

3.des

4.aes

Posted Date:-2022-07-21 06:18:31


Question:
IKE uses _______

1.oakley

2.skeme

3.isakmp

4.All of the above

Posted Date:-2022-07-21 11:19:54


Question:
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

1.short

2.flat

3.long

4.thin

Posted Date:-2022-07-21 12:19:55


Question:
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

1.other

2.data

3.keys

4. each other

Posted Date:-2022-07-21 12:26:39


Question:
In SSL, what is used for authenticating a message?

1.mac (message access code)

2.mac (message authentication code)

3.mac (machine authentication code)

4.mac (machine access code)

Posted Date:-2022-07-21 11:42:08


Question:
In tunnel mode, IPSec protects the ______

1.entire ip packet

2. ip header

3. ip payload

4. ip trailer

Posted Date:-2022-07-21 11:11:32


Question:
In _______, the cryptographic algorithms and secrets are sent with the message.

1. ipsec

2.ssl

3.tls

4.pgp

Posted Date:-2022-07-21 11:35:37


Question:
ISAKMP stands for ______

1.internet system association and key management packet

2.internet security association and key management protocol

3. interchange system and key modeling protocol

4. internet security association and key modeling protocol

Posted Date:-2022-07-21 11:38:29


Question:
Message authentication code is also known as

1.key code

2.hash code

3.keyed hash function

4.message key hash function

Posted Date:-2022-07-21 06:12:46


Question:
One commonly used public-key cryptography method is the ______ algorithm.

1. rss

2.ras

3.rsa

4.raa

Posted Date:-2022-07-21 06:17:42


Question:
PGP makes use of which cryptographic algorithm?

1.des

2.aes

3.rsa

4.rabin

Posted Date:-2022-07-21 11:39:10


Question:
PGP makes use of which cryptographic algorithm?

1. rsa

2.aes

3.des

4.robin

Posted Date:-2022-07-21 12:37:31


Question:
Protection against Denial by one of these parties in a communication refers to?

1.non-repudiation

2.data integrity

3.authentication

4.none of these

Posted Date:-2022-07-21 11:47:08


Question:
Public key cryptography also called as________

1.asymmetric key cryptography

2.symmetric key cryptography

3.both a and b

4.none of the above

Posted Date:-2022-07-21 12:38:22


Question:
S/MIME is abbreviated as __________________

1.secure/multimedia internet mailing extensions

2.secure/multipurpose internet mailing extensions

3.secure/multimedia internet mail extensions

4.secure/multipurpose internet mail extensions

Posted Date:-2022-07-21 11:43:23


Question:
Security Measures Needed to protect ________ during their transmission

1.file

2.data

3.packet

4. all of above

Posted Date:-2022-07-21 11:44:10


Question:
Site-to-Site VPN architecture is also known as _________

1.remote connection based vpns

2.peer-to-peer vpns

3. extranet based vpn

4. country-to-country vpns

Posted Date:-2022-07-21 11:09:27


Question:
SSL provides _________.

1.message integrity

2.confidentiality

3.compression

4.all of the above

Posted Date:-2022-07-21 11:19:08


Question:
The DSS signature uses which hash algorithm?

1.md5

2.sha-2

3.sha-1

4.does not use hash algorithm

Posted Date:-2022-07-21 06:13:33


Question:
The message which is not understandable is called as?

1.cipher text

2.plain text

3.hidden text

4.both a & c

Posted Date:-2022-07-21 12:06:46


Question:
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.

1.man-in-the-middle

2.ciphertext attack

3.plaintext attack

4.none of the above

Posted Date:-2022-07-21 06:19:24


Question:
There are ________ types of VPN protocols.

1.3

2.4

3.5

4.6

Posted Date:-2022-07-21 11:09:54


Question:
There are _________ types of VPNs.

1.3

2.4

3.5

4.4

Posted Date:-2022-07-21 11:06:46


Question:
The__is a polygraphic substitution cipher based on linear algebra.

1.hill cipher

2.playfair cipher

3.affine cipher

4.none of these

Posted Date:-2022-07-21 12:08:21


Question:
USENET falls under which category of public key sharing?

1.public announcement

2.publicly available directory

3.public key authority

4. public key certificate

Posted Date:-2022-07-21 12:36:20


Question:
What is full form of DDoS?

1.derived denial of service

2.distributed denial of service

3.denial of service

4.none of these

Posted Date:-2022-07-21 11:49:21


Question:
What is the 4th step in DES Algorithm?

1.key transformation

2.s-box substitution

3.p-box permutation

4.expansion permutation

Posted Date:-2022-07-21 12:01:53


Question:
What is the key size allowed in PGP?

1.1024-1056

2.1024-4056

3.1024-4096

4.1024-2048

Posted Date:-2022-07-21 11:40:45


Question:
What types of protocols are used in VPNs?
A. application level protocols

B. tunnelling protocols

C. network protocols

D. 

1. application level protocols

2.tunnelling protocols

3.network protocols

4.mailing protocols

Posted Date:-2022-07-21 11:05:26


Question:
Which of the statements are not true to classify VPN systems?

1.protocols used for tunnelling the traffic

2.whether vpns are providing site-to-site or remote access connection C.

3.securing the network from bots and malwares D

4.levels of security provided for sending and receiving data privately

Posted Date:-2022-07-21 06:26:21


Question:
Which of the statements are not true to classify VPN systems?

1.protocols used for tunnelling the traffic

2.whether vpns are providing site-to-site or remote access connection

3.securing the network from bots and malwares

4.levels of security provided for sending and receiving data privately

Posted Date:-2022-07-21 11:04:02


Question:
__is the practice of concealing a message within another message,image or file.

1. steganography

2.cryptography

3.cipher

4.receiver

Posted Date:-2022-07-21 12:09:02


Question:
__is used to create the organisation's overall security program.

1.program policy

2.purpose

3.security

4.none of these

Posted Date:-2022-07-21 11:53:17


Question:
___ provides privacy, integrity, and authentication in e-mail.

1.ipsec

2.ssl

3.pgp

4. none of the above

Posted Date:-2022-07-21 11:32:16


Question:
____ provides authentication at the IP level.

1. ah

2.esp

3.pgp

4.ssl

Posted Date:-2022-07-21 11:34:30


Question:
____ was invented by Phil Zimmerman.

1.ipsec

2.ssl

3.pgp

4.none of the above

Posted Date:-2022-07-21 11:36:29


Question:
_____ type of VPNs are used for home private and secure connectivity.

1.remote access vpns

2. site-to-site vpns

3. peer-to-peer vpns

4.router-to-router vpns

Posted Date:-2022-07-21 11:07:54


Question:
_____ uses the idea of certificate trust levels.

1.x509

2.pgp

3.kdc

4.None of the above

Posted Date:-2022-07-21 11:22:26


Question:
______ means knowledge obtained from investigation, study , intelligence new ,facts .

1.security

2.data

3.information

4.none of these

Posted Date:-2022-07-21 11:44:59


Question:
_________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

1. visual private network

2.virtual protocol network

3.virtual protocol networking

4.virtual private network

Posted Date:-2022-07-21 06:22:12


More MCQS

  1. MCQ Questions from Computer Hardware Concept
  2. Computer Communication and Networking MCQS Quiz
  3. Computer Hardware Quiz Set 1
  4. Computer Hardware Quiz Set 2
  5. Computer Hardware Quiz Set 3
  6. Computer Hardware Quiz Set 4
  7. Computer Hardware Quiz Set 5
  8. Computer Hardware Quiz Set 6
  9. Computer Hardware Quiz Set 7
  10. Computer Hardware Quiz Set 8
  11. Computer Hardware Multiple Choice Questions(MCQs) and Answers
  12. Graphics Hardware and Display devices Input Devices
  13. Computer Hardware MCQ GK Questions Set 1
  14. Computer Hardware MCQ GK Questions Set 2
  15. Computer Hardware Multiple Choice Questions
  16. CDMA Multiple Choice Questions
  17. Network Security Multiple Choice questions
  18. Opengl Multiple Choice Questions
  19. Opengl Multiple Choice Questions.
  20. Web Development Multiple-choice Questions
  21. WiFi Multiple Choice Questions
  22. 4G Multiple Choice Question
  23. NETWORK MODELS MCQ
  24. INTERNET AND PROTOCOLS MCQ SET 1
  25. INTERNET AND PROTOCOLS MCQ SET 2
  26. INTERNET AND PROTOCOLS MCQ SET 3
  27. INTERNET AND PROTOCOLS MCQ SET 4
  28. INTERNET AND PROTOCOLS MCQ SET 5
  29. NETWORKING /PHYSICAL LAYER SET 1
  30. NETWORKING /PHYSICAL LAYER SET 2
  31. NETWORKING /PHYSICAL LAYER SET 3
  32. NETWORKING /PHYSICAL LAYER SET 4
  33. Information and Network Security Set 1
  34. Information and Network Security Set 2
  35. Information Cyber Security (ICS) MCQs Set 1
  36. Information Cyber Security (ICS) MCQs Set 2
  37. Information Cyber Security (ICS) MCQs Set 3
  38. Information Cyber Security (ICS) MCQs Set 4
  39. Information Cyber Security (ICS) MCQs Set 5
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!