Top 80+ Solved Information and Cyber Security (ICS) MCQ Questions Answer

From 61 to 70 of 70

Q. Assurance that authentic user is taking part in communication is:

a. authentication

b. authorization

c. access control

d. auditing

  • a. authentication

Q. ATM pin while withdrawing money is an example of using:

a. authentication

b. authorization

c. access control

d. auditing

  • a. authentication

Q. Study of creating a d using encryption and decryption techniques.

a. cipher

b. cryptography

c. encryption

d. decryption

  • b. cryptography

Q. An attack in which the user receives unwanted amount of e- mails.

a. smurfing

b. denial of service

c. e-mail bombing

d. ping storm

  • c. e-mail bombing

Q. In same keys are implemented for encrypting as well as decrypting the information.

a. symmetric key encryption

b. asymmetric key encryption

c. asymmetric key decryption

d. hash-based key encryption

  • a. symmetric key encryption

Q. The procedure to add bits to the last block is termed as

a. decryption

b. hashing

c. tuning

d. padding

  • d. padding

Q. In asymmetric key cryptography, the private key is kept by

a. sender

b. receiver

c. sender and receiver

d. all the connected devices to the network

  • b. receiver

Q. Cryptanalysis is used                      

a. to find some insecurity in a cryptographic scheme

b. to increase the speed

c. to encrypt the data

d. to make new ciphers

  • a. to find some insecurity in a cryptographic scheme

Q. Conventional cryptography is also known as or symmetric-key encryption.

a. secret-key

b. public key

c. protected key

d. primary key

  • a. secret-key
Subscribe Now

Get All Updates & News