Top 80+ Solved Information and Cyber Security (ICS) MCQ Questions Answer
Q. The technique in which when one character is replaced by another Character is called as?
a. transposition
b. substitution
c. combinational
d. none of these
Q. Conversion of plain text into Cipher text is called as .
a. encryption
b. decryption
c. hidden text
d. none of above
Q. In Symmetric schemes requires both parties to share how many secret key?
a. one
b. two
c. three
d. four
Q. Blum Blum Shub Generator is based on which Algorithm?
a. private key
b. public key
c. both a & b
d. none of these
Q. What is the 4th step in DES Algorithm?
a. key transformation
b. s-box substitution
c. p-box permutation
d. expansion permutation
Q. In AES in which Round Subkeys are Generated from Original key for each round?
a. key expansion
b. initial round
c. finale round
d. none of these
Q. AES stands for?
a. authorized encryption standard
b. advance encryption standard
c. advance encryption strategy
d. none of these
Q. Which of them is type of Cipher?
a. stream cipher
b. block cipher
c. both of them
d. none of these
Q. The message which is not understandable is called as?
a. cipher text
b. plain text
c. hidden text
d. both a & c
Q. The is a polygraphic substitution cipher based on linear algebra.
a. hill cipher
b. playfair cipher
c. affine cipher
d. none of these
Q. is the practice of concealing a message within another message,image or file.
a. steganography
b. cryptography
c. cipher
d. receiver
Q. In asymmetric key cryptography, the private key is kept by
a. sender
b. receiver
c. sender and receiver
d. none of these
Q. What is data encryption standard (DES)?
a. block cipher
b. stream cipher
c. bit cipher
d. byte cipher
Q. In cryptography the original message before being transform is called
a. simple text
b. plain text
c. empty text
d. filled text