Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 181 to 195 of 239

Q. Conventional cryptography is also known as _____________ or symmetric-key encryption.

a. secret-key

b. public key

c. protected key

d. primary key

  • a. secret-key

Q. The procedure to add bits to the last block is termed as _________________

a. decryption

b. hashing

c. tuning

d. padding

  • d. padding

Q. How many rounds does the AES-192 perform?

a. 10

b. 12

c. 14

d. 16

  • b. 12

Q. ECC encryption system is __________

a. symmetric key encryption algorithm

b. asymmetric key encryption algorithm

c. not an encryption algorithm

d. block cipher method

  • b. asymmetric key encryption algorithm

Q. ________function creates a message digest out of a message.

a. encryption

b. decryption

c. hash

d. none of the above

  • c. hash

Q. A digital signature needs ____ system

a. symmetric-key

b. asymmetric-key

c. either (a) or (b)

d. neither (a) nor (b)

  • b. asymmetric-key

Q. In tunnel mode, IPSec protects the ______

a. entire ip packet

b. ip header

c. ip payload

d. ip trailer

  • a. entire ip packet

Q. Pretty good privacy (PGP) is used in ______

a. browser security

b. email security

c. ftp security

d. wifi security

  • b. email security

Q. PGP encrypts data by using a block cipher called ______

a. international data encryption algorithm

b. private data encryption algorithm

c. internet data encryption algorithm

d. local data encryption algorithm

  • a. international data encryption algorithm

Q. IKE creates SAs for _____.

a. ssl

b. pgp

c. ipsec

d. vp

  • c. ipsec

Q. SSL provides _________.

a. message integrity

b. confidentiality

c. compression

d. all of the above

  • d. all of the above

Q. IKE uses _______

a. oakley

b. skeme

c. isakmp

d. all of the above

  • d. all of the above
Subscribe Now

Get All Updates & News