Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer
Q. 4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
a. secret key
b. external programs
c. add-ons
d. secondary key
Q. Conventional cryptography is also known as _____________ or symmetric-key encryption.
a. secret-key
b. public key
c. protected key
d. primary key
Q. The procedure to add bits to the last block is termed as _________________
a. decryption
b. hashing
c. tuning
d. padding
Q. ECC encryption system is __________
a. symmetric key encryption algorithm
b. asymmetric key encryption algorithm
c. not an encryption algorithm
d. block cipher method
Q. ________function creates a message digest out of a message.
a. encryption
b. decryption
c. hash
d. none of the above
Q. A digital signature needs ____ system
a. symmetric-key
b. asymmetric-key
c. either (a) or (b)
d. neither (a) nor (b)
Q. In tunnel mode, IPSec protects the ______
a. entire ip packet
b. ip header
c. ip payload
d. ip trailer
Q. Pretty good privacy (PGP) is used in ______
a. browser security
b. email security
c. ftp security
d. wifi security
Q. PGP encrypts data by using a block cipher called ______
a. international data encryption algorithm
b. private data encryption algorithm
c. internet data encryption algorithm
d. local data encryption algorithm
Q. SSL provides _________.
a. message integrity
b. confidentiality
c. compression
d. all of the above
Q. In ______, there is a single path from the fully trusted authority to any certificate.
a. x509
b. pgp
c. kdc
d. none of the above