Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 211 to 225 of 239

Q. Which One of them is Passive attack?

a. denial of service

b. modify message in transit

c. replay previous message

d. obtain message contain

  • d. obtain message contain

Q. What is lying of IP address called as?

a. ip spoofing

b. ip scamming

c. ip lying

d. none of theses

  • a. ip spoofing

Q. What is full form of DDoS?

a. derived denial of service

b. distributed denial of service

c. denial of service

d. none of these

  • b. distributed denial of service

Q. A hacker guessing suggested password to a program is call as?

a. password guessing

b. dictionary attack

c. default password attack

d. none of these

  • c. default password attack

Q. Symmetric key encryption is also called as?

a. public key encryption

b. private key encryption

c. both of these

d. none of these

  • b. private key encryption

Q. Conversion of Cypher text to plain text?

a. encryption

b. decryption

c. simple text

d. none of these

  • b. decryption

Q. __is used to create the organisation's overall security program.

a. program policy

b. purpose

c. security

d. none of these

  • a. program policy

Q. An act of protecting information from unauthorised disclouser to an entity.-

a. intergrity

b. avability

c. confidentiality

d. none of these

  • c. confidentiality

Q. A way to ensure that the entity is indeed what it claims to be.-

a. authentication

b. accountability

c. identification

d. security

  • a. authentication

Q. The full form of OSI is OSI model__.

a. open systems interconnection

b. open software interconnection

c. open connection

d. open system internet

  • a. open systems interconnection

Q. The technique in which when one character is replaced by another Character is called as?

a. transposition

b. substitution

c. combinational

d. none of these

  • b. substitution

Q. Conversion of plain text into Cipher text is called as________.

a. encryption

b. decryption

c. hidden text

d. none of above

  • a. encryption

Q. Blum Blum Shub Generator is based on which Algorithm?

a. private key

b. public key

c. both a & b

d. none of these

  • b. public key
Subscribe Now

Get All Updates & News