Top 80+ Solved Information and Cyber Security (ICS) MCQ Questions Answer
Q. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages,it is very slow if the message is
a. short
b. flat
c. long
d. thin
Q. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two partiesare not
a. authenticated
b. joined
c. submit
d. separate
Q. In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
a. other
b. data
c. keys
d. each other
Q. From the options below, which of them is not a threat to information security?
a. disaster
b. eavesdropping
c. information leakage
d. unchanged default password
Q. Which of the following are not security policies?
a. regulatory
b. advisory
c. availability
d. user policies
Q. Examples of User Policies is/are:
a. password policies
b. internet usage
c. system use
d. all of the above
Q. Policy ensures that the organization is maintaining standards set by specific industry regulation.
a. regulatory
b. advisory
c. availability
d. user policies
Q. Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior
a. regulatory
b. advisory
c. availability
d. user policies
Q. What defines the restrictions on employees such as usage?
a. regulatory
b. advisory
c. availability
d. user policies