Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer
Q. ElGamal encryption system is __________
a. symmetric key encryption algorithm
b. asymmetric key encryption algorithm
c. not an encryption algorithm
d. block cipher method
Q. Cryptographic hash function takes an arbitrary block of data and returns _________
a. fixed size bit string
b. variable size bit string
c. both fixed size bit string and variable size bit string
d. variable sized byte string
Q. In the above figure from left to right, the correct order of the shaded levels are
a. network level, application level, transport level
b. application level, network level, transport level
c. transport level, application level, network level
d. network level, transport level, application level
Q. In the above figure, which of the above shaded block is transparent to end users and applications?
a. ip/ipsec
b. ssl
c. kerberos
d. s/mime
Q. Which of the following is not a secured mail transferring methodology?
a. pop3
b. ssmtp
c. mail using pgp
d. s/mime
Q. S/MIME is abbreviated as __________________
a. secure/multimedia internet mailing extensions
b. secure/multipurpose internet mailing extensions
c. secure/multimedia internet mail extensions
d. secure/multipurpose internet mail extensions
Q. PGP encrypts data by using a block cipher called ______
a. international data encryption algorithm
b. private data encryption algorithm
c. internet data encryption algorithm
d. local data encryption algorithm
Q. When were VPNs introduced into the commercial world?
a. early 80’s
b. late 80’s
c. early 90’s
d. late 90’s
Q. Which of the following statements is NOT true concerning VPNs?
a. financially rewarding compared to leased lines
b. allows remote workers to access corporate data
c. allows lan-to-lan connectivity over public networks
d. is the backbone of the internet
Q. Traffic in a VPN is NOT ____________
a. invisible from public networks
b. logically separated from other traffic
c. accessible from unauthorized public networks
d. restricted to a single protocol in ipsec
Q. Which layer 3 protocols can be transmitted over an L2TP VPN?
a. only ip
b. only ipx
c. only icmp
d. ip and ipx
Q. ESP (Encapsulating Security Protocol) is defined in which of the following standards?
a. ipsec
b. pptp
c. ppp
d. l2tp