Top 80+ Solved Information and Cyber Security (ICS) MCQ Questions Answer
Q. Assurance that authentic user is taking part in communication is:
a. authentication
b. authorization
c. access control
d. auditing
Q. ATM pin while withdrawing money is an example of using:
a. authentication
b. authorization
c. access control
d. auditing
Q. Study of creating a d using encryption and decryption techniques.
a. cipher
b. cryptography
c. encryption
d. decryption
Q. An attack in which the user receives unwanted amount of e- mails.
a. smurfing
b. denial of service
c. e-mail bombing
d. ping storm
Q. In same keys are implemented for encrypting as well as decrypting the information.
a. symmetric key encryption
b. asymmetric key encryption
c. asymmetric key decryption
d. hash-based key encryption
Q. The procedure to add bits to the last block is termed as
a. decryption
b. hashing
c. tuning
d. padding
Q. In asymmetric key cryptography, the private key is kept by
a. sender
b. receiver
c. sender and receiver
d. all the connected devices to the network
Q. Cryptanalysis is used
a. to find some insecurity in a cryptographic scheme
b. to increase the speed
c. to encrypt the data
d. to make new ciphers
Q. Conventional cryptography is also known as or symmetric-key encryption.
a. secret-key
b. public key
c. protected key
d. primary key
Q. is the art & science of cracking the cipher-text without knowing the key.
a. cracking
b. cryptanalysis
c. cryptography
d. crypto-hacking