Top 80+ Solved Information and Cyber Security (ICS) MCQ Questions Answer

From 31 to 45 of 70

Q. An asymmetric-key (or public-key) cipher uses

a. 1 key

b. 2 key

c. 3 key

d. 4 key

  • a. 1 key

Q. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two partiesare not

a. authenticated

b. joined

c. submit

d. separate

  • a. authenticated

Q. In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

a. other

b. data

c. keys

d. each other

  • d. each other

Q. WPA2 is used for security in                  

a. ethernet

b. wi-fi

c. bluetooth

d. e-mail

  • b. wi-fi

Q. Which of the following is not a strong security protocol

a. ssl

b. httpl

c. smtp

d. sftp

  • c. smtp

Q. From the options below, which of them is not a threat to information security?

a. disaster

b. eavesdropping

c. information leakage

d. unchanged default password

  • d. unchanged default password

Q. Compromising confidential information comes under                    

a. bug

b. threat

c. vulnerability

d. attack

  • b. threat

Q. Which of the following are not security policies?

a. regulatory

b. advisory

c. availability

d. user policies

  • c. availability

Q. Examples of User Policies is/are:

a. password policies

b. internet usage

c. system use

d. all of the above

  • d. all of the above

Q. What defines the restrictions on employees such as usage?

a. regulatory

b. advisory

c. availability

d. user policies

  • d. user policies
Subscribe Now

Get All Updates & News