Computer Hardware and Networking/Information Cyber Security (ICS) MCQs Set 4 Sample Test,Sample questions

Question:
                  is the art & science of cracking the cipher-text without knowing the key.

1.cracking

2.cryptanalysis

3.cryptography

4.crypto-hacking

Posted Date:-2022-07-23 08:50:25


Question:
         of information means, only authorised users are capable of accessing the information.

1.confidentiality

2.integrity

3.non-repudiation

4. availability

Posted Date:-2022-07-23 07:50:18


Question:
       is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

1.network security

2.database security

3.information security

4.physical security

Posted Date:-2022-07-23 08:37:34


Question:
  In asymmetric key cryptography, the private key is kept by ____

1.sender

2.receiver

3.sender and receiver

4.all the connected devices to the network

Posted Date:-2022-07-23 08:51:55


Question:
 ElGamal encryption system is __________

1.symmetric key encryption algorithm

2.asymmetric key encryption algorithm

3.not an encryption algorithm

4.block cipher method

Posted Date:-2022-07-23 09:36:36


Question:
 HTTPS is abbreviated as _________

1.hypertexts transfer protocol secured

2.secured hyper text transfer protocol

3.hyperlinked text transfer protocol secured

4.hyper text transfer protocol secure

Posted Date:-2022-07-21 12:44:56


Question:
 If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

1. release of message content-passive attack

2. traffic analysis -passive attacks

3. release of message content- active attacks

4. traffic analysis -active attacks

Posted Date:-2022-07-23 08:42:51


Question:
 If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

1.release of message content-passive attack

2. traffic analysis -passive attacks

3.release of message content- active attacks

4. traffic analysis -active attacks

Posted Date:-2022-07-23 08:41:50


Question:
 In the above figure from left to right, the correct order of the shaded levels are

1.network level, application level, transport level

2.application level, network level, transport level

3.transport level, application level, network level

4. network level, transport level, application level

Posted Date:-2022-07-23 09:39:23


Question:
 In the above figure, which of the above shaded block is transparent to end users and applications?

1. ip/ipsec

2.ssl

3.kerberos

4.s/mime

Posted Date:-2022-07-23 09:40:22


Question:
 Which one of the following is a cryptographic protocol used to secure HTTP connection?

1.stream control transmission protocol (sctp)

2.transport layer security (tls)

3.explicit congestion notification (ecn)

4.resource reservation protocol

Posted Date:-2022-07-23 08:56:00


Question:
 Which protocol is used for the purpose of copying the pending state into the current state?

1. alert protocol

2. handshake protocol

3.upper-layer protocol

4.change cipher spec protocol

Posted Date:-2022-07-23 09:46:38


Question:
 _______ is used for encrypting data at network level

D. s/mime

1.ipsec

2.https

3.smtp

4.s/mime

Posted Date:-2022-07-21 12:47:34


Question:
. In cryptography, the order of the letters in a message is rearranged by __________

1. A. transpositional ciphers

2.substitution ciphers

3.both transpositional ciphers and substitution ciphers

4.quadratic ciphers

Posted Date:-2022-07-23 08:53:00


Question:
A unique piece of information that is used in encryption.

1.cipher

2.plain text

3.key

4. cipher

Posted Date:-2022-07-23 08:44:01


Question:
An attack in which the user receives unwanted amount of e- mails.

1.smurfing

2.denial of service

3.e-mail bombing

4. ping storm

Posted Date:-2022-07-23 08:45:35


Question:
CIA triad is also known as           

1.nic (non-repudiation, integrity, confidentiality)

2.aic (availability, integrity, confidentiality)

3. ain (availability, integrity, non-repudiation)

4.aic (authenticity, integrity, confidentiality)

Posted Date:-2022-07-23 07:49:38


Question:
Conventional cryptography is also known as or symmetric-key encryption.

1.secret-key

2.public key

3.protected key

4.primary key

Posted Date:-2022-07-23 08:49:31


Question:
Cryptanalysis is used      

1. to find some insecurity in a cryptographic scheme

2.to increase the speed

3.to encrypt the data

4. to make new ciphers

Posted Date:-2022-07-23 08:48:41


Question:
Cryptanalysis is used __________

1.to find some insecurity in a cryptographic scheme

2.to increase the speed

3.to encrypt the data

4. to make new ciphers

Posted Date:-2022-07-23 08:54:32


Question:
Cryptographic hash function takes an arbitrary block of data and returns _________

1. fixed size bit string

2.variable size bit string

3.both fixed size bit string and variable size bit string

4. variable sized byte string

Posted Date:-2022-07-23 09:38:07


Question:
Data integrity gets compromised when and are taken control off.

1.access control, file deletion

2.network, file permission

3.access control, file permission

4.network, system

Posted Date:-2022-07-23 08:36:45


Question:
Data is used to ensure confidentiality.

1.encryption

2.locking

3.deleting

4.backup

Posted Date:-2022-07-23 08:35:23


Question:
Diffie-Hellman algorithm is widely known as_________

1.key exchange algorithm

2.key agreement algorithm

3.only

4. both a and b

Posted Date:-2022-07-21 12:42:08


Question:
ECC stands for

1. A. elliptic curve cryptography

2.elliptic cryptography curve

3.error correcting code

4.none of the above

Posted Date:-2022-07-21 12:41:20


Question:
Firewalls can be of _______ kinds.

1.1

2.2

3.3

4.4

Posted Date:-2022-07-23 10:50:13


Question:
From the options below, which of them is not a threat to information security?

1.disaster

2.eavesdropping

3.information leakage

4.unchanged default password

Posted Date:-2022-07-23 08:38:28


Question:
Hash function is used for________

1.message authentication

2.digital signature

3.both a and b

4.only a

Posted Date:-2022-07-21 12:42:55


Question:
In layer, vulnerabilities are directly associated with physical access to networks and hardware.

1. physical

2.data-link

3.network

4.application

Posted Date:-2022-07-23 08:40:25


Question:
In same keys are implemented for encrypting as well as decrypting the information.

1.symmetric key encryption

2.asymmetric key encryption

3.asymmetric key decryption

4.hash-based key encryption

Posted Date:-2022-07-23 08:46:29


Question:
In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.

1.select, alarm

2. alert, alarm

3.warning, alarm

4.warning, fatal

Posted Date:-2022-07-23 10:41:25


Question:
In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

1. 216

2.232

3.214

4.212

Posted Date:-2022-07-23 09:41:42


Question:
IPSec provides ....protocols for network layer

1.7

2.1

3.3

4.4

Posted Date:-2022-07-23 07:39:23


Question:
length of the IPv6 acddress is ....

1.32 bits

2.64 bits

3.16 bits

4.128 bit

Posted Date:-2022-07-23 07:38:52


Question:
length of the IPv6 header is....

1. 64 bits

2.16 bits

3.32 bits

4.8 bits

Posted Date:-2022-07-23 07:48:46


Question:
RSA algorithm is best example of_______

1.asymmetric key cryptography

2.symmetric key cryptography

3.elliptic curve cryptography

4.All of the above

Posted Date:-2022-07-21 12:43:47


Question:
SSL primarily focuses on _______

1. integrity and authenticity

2. integrity and non-repudiation

3.authenticity and privacy

4.confidentiality and integrity

Posted Date:-2022-07-21 12:46:01


Question:
Study of creating a d using encryption and decryption techniques.

1.cipher

2.cryptography

3.encryption

4.decryption

Posted Date:-2022-07-23 08:44:45


Question:
The full form of OSI is OSI model is                              

1.open systems interconnection

2.open software interconnection

3.open systems internet

4. open software internet

Posted Date:-2022-07-23 08:39:41


Question:
The full form of SSL is

1.serial session layer

2.secure socket layer

3.session secure layer

4.series socket layer

Posted Date:-2022-07-23 09:42:41


Question:
Transport layer Protocol consists of ... main components

1.2

2.1

3.3

4.4

Posted Date:-2022-07-23 07:37:52


Question:
When integrity is lacking in a security system,                     occurs.

1.database hacking

2.data deletion

3.data tampering

4.data leakage

Posted Date:-2022-07-23 07:53:48


Question:
When you use the word it means you are protecting your data from getting disclosed.

1.confidentiality

2.integrity

3.authentication

4.non-repudiation

Posted Date:-2022-07-23 07:51:45


Question:
Which of the following is not a secured mail transferring methodology?

1.pop3 .

2.ssmtp

3. mail using pgp

4.s/mime

Posted Date:-2022-07-23 10:44:42


Question:
Which one of the following is not a higher –layer SSL protocol?

1.alert protocol

2.handshake protocol

3.alarm protocol

4.change cipher spec protocol

Posted Date:-2022-07-23 09:41:02


Question:
Which protocol consists of only 1 bit?

1. alert protocol

2.handshake protocol

3.upper-layer protocol

4. change cipher spec protocol

Posted Date:-2022-07-23 09:44:46


Question:
Which protocol is used to convey SSL related alerts to the peer entity?

1.alert protocol

2. handshake protocol

3.upper-layer protocol

4.change cipher spec protocol

Posted Date:-2022-07-23 09:43:52


Question:
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

1. they help understanding hacking better

2. they are key elements to a security breach

3. they help understands security and its components better

4. they help to understand the cyber-crime better

Posted Date:-2022-07-23 08:32:33


Question:
_____ is used for encrypting data at network level.

1. ipsec

2.https

3.smtp

4.s/mime

Posted Date:-2022-07-23 10:46:44


Question:
__________ is the kind of firewall is connected between the device and the network connecting to internet.

1. hardware firewall

2.software firewall

3.stateful inspection firewall

4.microsoft firewall

Posted Date:-2022-07-23 10:51:19


More MCQS

  1. MCQ Questions from Computer Hardware Concept
  2. Computer Communication and Networking MCQS Quiz
  3. Computer Hardware Quiz Set 1
  4. Computer Hardware Quiz Set 2
  5. Computer Hardware Quiz Set 3
  6. Computer Hardware Quiz Set 4
  7. Computer Hardware Quiz Set 5
  8. Computer Hardware Quiz Set 6
  9. Computer Hardware Quiz Set 7
  10. Computer Hardware Quiz Set 8
  11. Computer Hardware Multiple Choice Questions(MCQs) and Answers
  12. Graphics Hardware and Display devices Input Devices
  13. Computer Hardware MCQ GK Questions Set 1
  14. Computer Hardware MCQ GK Questions Set 2
  15. Computer Hardware Multiple Choice Questions
  16. CDMA Multiple Choice Questions
  17. Network Security Multiple Choice questions
  18. Opengl Multiple Choice Questions
  19. Opengl Multiple Choice Questions.
  20. Web Development Multiple-choice Questions
  21. WiFi Multiple Choice Questions
  22. 4G Multiple Choice Question
  23. NETWORK MODELS MCQ
  24. INTERNET AND PROTOCOLS MCQ SET 1
  25. INTERNET AND PROTOCOLS MCQ SET 2
  26. INTERNET AND PROTOCOLS MCQ SET 3
  27. INTERNET AND PROTOCOLS MCQ SET 4
  28. INTERNET AND PROTOCOLS MCQ SET 5
  29. NETWORKING /PHYSICAL LAYER SET 1
  30. NETWORKING /PHYSICAL LAYER SET 2
  31. NETWORKING /PHYSICAL LAYER SET 3
  32. NETWORKING /PHYSICAL LAYER SET 4
  33. Information and Network Security Set 1
  34. Information and Network Security Set 2
  35. Information Cyber Security (ICS) MCQs Set 1
  36. Information Cyber Security (ICS) MCQs Set 2
  37. Information Cyber Security (ICS) MCQs Set 3
  38. Information Cyber Security (ICS) MCQs Set 4
  39. Information Cyber Security (ICS) MCQs Set 5
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!