Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 166 to 180 of 239

Q. A company requires its users to change passwords every month. This improves the ________ of the network.

a. a) performance

b. b) reliability

c. c) security

d. d) none of the above

  • c. c) security

Q. Release of message contents and Traffic analysis are two types of _________ attacks.

a. a) active attack

b. b) modification of attack

c. c) passive attack

d. d) dos attack

  • c. c) passive attack

Q. The ________ is encrypted text.

a. a) cipher scricpt

b. b) cipher text

c. c) secret text

d. d) secret script

  • b. b) cipher text

Q. What type of attack uses a fraudulent server with a relay address?

a. ntlm

b. mitm

c. netbios

d. smb

  • b. mitm

Q. Which of the following Algorithms not belong to symmetric encryption

a. 3des (tripledes)

b. rsa

c. rc5

d. idea

  • b. rsa

Q. Which is the largest disadvantage of the symmetric Encryption?

a. more complex and therefore more time-consuming calculations.

b. problem of the secure transmission of the secret key.

c. less secure encryption function.

d. isn\t used any more.

  • b. problem of the secure transmission of the secret key.

Q. In cryptography, what is cipher?

a. algorithm for performing encryption and decryption

b. encrypted message

c. both algorithm for performing encryption and decryption and encrypted message

d. decrypted message

  • a. algorithm for performing encryption and decryption

Q. In asymmetric key cryptography, the private key is kept by __________

a. sender

b. receiver

c. sender and receiver

d. all the connected devices to the network

  • b. receiver

Q. Which one of the following algorithm is not used in asymmetric-key cryptography?

a. rsa algorithm

b. diffie-hellman algorithm

c. electronic code book algorithm

d. dsa algorithm

  • c. electronic code book algorithm

Q. In cryptography, the order of the letters in a message is rearranged by __________

a. transpositional ciphers

b. substitution ciphers

c. both transpositional ciphers and substitution ciphers

d. quadratic ciphers

  • a. transpositional ciphers

Q. What is data encryption standard (DES)?

a. block cipher

b. stream cipher

c. bit cipher

d. byte cipher

  • a. block cipher

Q. A asymmetric-key (or public key ) cipher uses

a. 1 key

b. 2 key

c. 3 key

d. 4 key

  • b. 2 key

Q. In asymmetric key cryptography, the two keys e and d, have special relationship to

a. others

b. data

c. keys

d. each other

  • d. each other

Q. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

a. malware analysis

b. exploit writing

c. reverse engineering

d. cryptography

  • d. cryptography
Subscribe Now

Get All Updates & News