Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 196 to 210 of 239

Q. _______ uses the idea of certificate trust levels.

a. x509

b. pgp

c. kdc

d. none of the above

  • b. pgp

Q. ________ provides privacy, integrity, and authentication in e-mail.

a. ipsec

b. ssl

c. pgp

d. none of the above

  • c. pgp

Q. In _____, there can be multiple paths from fully or partially trusted authorities.

a. x509

b. pgp

c. kdc

d. none of the above

  • b. pgp

Q. ______ provides authentication at the IP level.

a. ah

b. esp

c. pgp

d. ssl

  • a. ah

Q. ______ was invented by Phil Zimmerman.

a. ipsec

b. ssl

c. pgp

d. none of the above

  • c. pgp

Q. ISAKMP stands for ______

a. internet system association and key management packet

b. internet security association and key management protocol

c. interchange system and key modeling protocol

d. internet security association and key modeling protocol

  • b. internet security association and key management protocol

Q. PGP makes use of which cryptographic algorithm?

a. des

b. aes

c. rsa

d. rabin

  • c. rsa

Q. What is the key size allowed in PGP?

a. 1024-1056

b. 1024-4056

c. 1024-4096

d. 1024-2048

  • c. 1024-4096

Q. In SSL, what is used for authenticating a message?

a. mac (message access code)

b. mac (message authentication code)

c. mac (machine authentication code)

d. mac (machine access code)

  • b. mac (message authentication code)

Q. S/MIME is abbreviated as __________________

a. secure/multimedia internet mailing extensions

b. secure/multipurpose internet mailing extensions

c. secure/multimedia internet mail extensions

d. secure/multipurpose internet mail extensions

  • d. secure/multipurpose internet mail extensions

Q. Security Measures Needed to protect ________ during their transmission

a. file

b. data

c. packet

d. all of above

  • b. data

Q. __________ means knowledge obtained from investigation, study , intelligence new ,facts .

a. security

b. data

c. information

d. none of these

  • c. information

Q. Prevention of the unauthorised used of Resources refers too?

a. data integrity

b. data confidentiality

c. acess control

d. none of these

  • c. acess control

Q. Protection against Denial by one of these parties in a communication refers to?

a. non-repudiation

b. data integrity

c. authentication

d. none of these

  • a. non-repudiation
Subscribe Now

Get All Updates & News