Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 46 to 60 of 239

Q. The information that gets transformed in encryption is

a. plain text

b. parallel text

c. encrypted text

d. decrypted text

  • a. plain text

Q. A unique piece of information that is used in encryption.

a. cipher

b. plain text

c. key

d. cipher

  • c. key

Q. Study of creating a d using encryption and decryption techniques.

a. cipher

b. cryptography

c. encryption

d. decryption

  • b. cryptography

Q. An attack in which the user receives unwanted amount of e- mails.

a. smurfing

b. denial of service

c. e-mail bombing

d. ping storm

  • c. e-mail bombing

Q. In same keys are implemented for encrypting as well as decrypting the information.

a. symmetric key encryption

b. asymmetric key encryption

c. asymmetric key decryption

d. hash-based key encryption

  • a. symmetric key encryption

Q. The procedure to add bits to the last block is termed as

a. decryption

b. hashing

c. tuning

d. padding

  • d. padding

Q. Cryptanalysis is used                      

a. to find some insecurity in a cryptographic scheme

b. to increase the speed

c. to encrypt the data

d. to make new ciphers

  • a. to find some insecurity in a cryptographic scheme

Q. Conventional cryptography is also known as or symmetric-key encryption.

a. secret-key

b. public key

c. protected key

d. primary key

  • a. secret-key

Q. In cryptography, what is cipher?

a. algorithm for performing encryption and decryption

b. encrypted message

c. both algorithm for performing encryption and decryption and encrypted message

d. decrypted message

  • a. algorithm for performing encryption and decryption

Q. In asymmetric key cryptography, the private key is kept by __________

a. sender

b. receiver

c. sender and receiver

d. all the connected devices to the network

  • b. receiver

Q. In cryptography, the order of the letters in a message is rearranged by __________

a. transpositional ciphers

b. substitution ciphers

c. both transpositional ciphers and substitution ciphers

d. quadratic ciphers

  • a. transpositional ciphers

Q. Cryptanalysis is used __________

a. to find some insecurity in a cryptographic scheme

b. to increase the speed

c. to encrypt the data

d. to make new ciphers

  • a. to find some insecurity in a cryptographic scheme

Q. Which one of the following is a cryptographic protocol used to secure HTTP connection?

a. stream control transmission protocol (sctp)

b. transport layer security (tls)

c. explicit congestion notification (ecn)

d. resource reservation protocol

  • b. transport layer security (tls)

Q. Voice privacy in GSM cellular telephone protocol is provided by _______

a. a5/2 cipher

b. b5/4 cipher

c. b5/6 cipher

d. b5/8 cipher

  • a. a5/2 cipher
Subscribe Now

Get All Updates & News