
Information and cyber security (ics) mcq for online exams of universities like sppu, Anna university, Mumbai university are provided. These ICS (cyber security) mcq are helpful to crack aptitude exams, interviews of mass recruiters like tcs, cognizant, accenture, capgemini etc. We are planing to provide information and cyber security mcq pdf along with the multiple choice questions.
These ics mcq questions primarily includes data encryption standard mcq, cryptography mcq, information security mcq, mcqs on firewall and intrusion detection system and lots of other. You can comment download your interest for information and cyber security mcq pdf and we will definitely try to bring you one. Happy learning.
Information and Cyber Security mcq
Q. 71 In _____, there can be multiple paths from fully or partially trusted authorities.
A : X509
B : PGP
C : KDC
D : none of the above
PGP
Q. 72 ______ provides authentication at the IP level.
A : AH
B : ESP
C : PGP
D : SSL
AH
Q. 73 In _______, the cryptographic algorithms and secrets are sent with the message.
A : IPSec
B : SSL
C : TLS
D : PGP
PGP
Q. 74 ______ was invented by Phil Zimmerman.
A : IPSec
B : SSL
C : PGP
D : none of the above
PGP
Q. 75 ISAKMP stands for ______
A : Internet system Association and Key Management Packet
B : Internet Security Association and Key Management Protocol
C : Interchange System And Key Modeling Protocol
D : Internet Security Association and Key Modeling Protocol
Internet Security Association and Key Management Protocol
Q. 76 PGP makes use of which cryptographic algorithm?
A : DES
B : AES
C : RSA
D : Rabin
RSA
ICS mcq questions and answers
Q. 77 What is the key size allowed in PGP?
A : 1024-1056
B : 1024-4056
C : 1024-4096
D : 1024-2048
1024-4096
Q. 78 In SSL, what is used for authenticating a message?
A : MAC (Message Access Code)
B : MAC (Message Authentication Code)
C : MAC (Machine Authentication Code)
D : MAC (Machine Access Code)
MAC (Message Authentication Code)
Q. 79 S/MIME is abbreviated as __________________
A : Secure/Multimedia Internet Mailing Extensions
B : Secure/Multipurpose Internet Mailing Extensions
C : Secure/Multimedia Internet Mail Extensions
D : Secure/Multipurpose Internet Mail Extensions
Secure/Multipurpose Internet Mail Extensions
Q. 80 Security Measures Needed to protect ________ during their transmission
A : file
B : Data
C : packet
D : All of above
Data
Q. 81 __________ means knowledge obtained from investigation, study , intelligence new ,facts .
A : Security
B : Data
C : Information
D : None of These
Information
Q. 82 Prevention of the unauthorised used of Resources refers too?
A : Data Integrity
B : Data confidentiality
C : Access Control
D : None of these
Access Control
Q. 83 Protection against Denial by one of these parties in a communication refers to?
A : Non-Repudiation
B : Data integrity
C : Authentication
D : None of these
Non-Repudiation
Q. 84 Which One of them is Passive attack?
A : Denial of Service
B : modify message in transit
C : Replay previous message
D : obtain message contain
85 What is lying of IP address called as?IP Spoofing IP Scamming IP Lying None Of theses a
obtain message contain
Q. 86 What is full form of DDoS?
A : Derived Denial of service
B : Distributed Denial of service
C : Denial of service
D : None of these
Distributed Denial of service
Q. 87 A hacker guessing suggested password to a program is call as?
A : Password Guessing
B : Dictionary Attack
C : Default password attack
D : None of these
Default password attack
Q. 88 Symmetric key encryption is also called as?
A : public key Encryption
B : Private Key Encryption
C : Both of these
D : None of these
Private Key Encryption
Q. 89 Conversion of Cypher text to plain text?
A : Encryption
B : Decryption
C : Simple text
D : none of these
Decryption
Q. 90 __is used to create the organisation’s overall security program.
A : program policy
B : purpose
C : security
D : none of these
program policy
Q. 91 An act of protecting information from unauthorised disclouser to an entity.-
A : intergrity
B : avability
C : confidentiality
D : none of these
confidentiality
Q. 92 A way to ensure that the entity is indeed what it claims to be.-
A : Authentication
B : Accountability
C : identification
D : security
Authentication
Q. 93 The__model is 7 layer architecture where each layer is having some specific functionality to perform.
A : TCP
B : OSI
C : OIS
D : none of these
OSI
Q. 94 The full form of OSI is OSI model__.
A : open systems interconnection
B : open software interconnection
C : open connection
D : open system internet
open systems interconnection
Q. 96 Conversion of plain text into Cipher text is called as________.
A : Encryption
B : Decryption
C : Hidden Text
D : none of above
Encryption
Q. 97 In Symmetric schemes requires both parties to share how many secret key?
A : one
B : two
C : three
D : four
one
Q. 98 Blum Blum Shub Generator is based on which Algorithm?
A : Private key
B : Public key
C : both a & b
D : none of these
Public key
Q. 99 In DES step both LPT and RPT undergoes in how much key Rounds?
A : 8
B : 16
C : 32
D : 64
16
Q. 100 What is the 4th step in DES Algorithm?
A : key transformation
B : S-box Substitution
C : P-box Permutation
D : Expansion permutation
P-box Permutation
firewall and intrusion detection system mcq
Q. 101 In AES in which Round Subkeys are Generated from Original key for each round?
A : Key Expansion
B : Initial Round
C : Finale Round
D : none of these
Key Expansion
Q. 102 AES stands for?
A : Authorized Encryption Standard
B : Advance Encryption Standard
C : Advance Encryption Strategy
D : none of these
Advance Encryption Standard
Q. 103 Which of them is type of Cipher?
A : Stream Cipher
B : Block Cipher
C : both of Them
D : none of these
both of Them
Q. 104 The message which is not understandable is called as?
A : Cipher Text
B : plain text
C : Hidden text
D : both a & c
Cipher Text
Q. 105 The__is a polygraphic substitution cipher based on linear algebra.
A : Hill cipher
B : playfair cipher
C : Affine cipher
D : none of these
Hill cipher
Q. 106 __is the practice of concealing a message within another message,image or file.
A : steganography
B : cryptography
C : cipher
D : receiver
cryptography
Q. 108 What is data encryption standard (DES)?
A : block cipher
B : stream cipher
C : bit cipher
D : byte cipher
block cipher
Q. 109 In cryptography the original message before being transform is called
A : simple text
B : plain text
C : empty text
D : filled text
plain text
Q. 110 An asymmetric-key (or public-key) cipher uses
A : 1 key
B : 2 key
C : 3 key
D : 4 key
2 key
Q. 111 In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
A : Short
B : Flat
C : Long
D : Thin
Long
Q. 112 The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
A : Authenticated
B : Joined
C : Submit
D : Separate
Authenticated
Confidentiality And Cyber Forensic mcq with answers
Q. 114 For RSA to work, the value of P must be less than the value of
A : p
B : q
C : n
D : r
n
Q. 116 In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).
A : TRUE
B : FALSE
FALSE
Q. 117 RSA is also a stream cipher like Merkel-Hellman.
A : TRUE
B : FALSE
TRUE
Q. 118 USENET falls under which category of public key sharing?
A : public announcement
B : publicly available directory
C : public key authority
D : public key certificate
public announcement
Q. 119 PGP makes use of which cryptographic algorithm?
A : RSA
B : AES
C : DES
D : ROBIN
RSA
Q. 120 Public key cryptography also called as________
A : Asymmetric key cryptography
B : Symmetric key cryptography
C : Both a and b
D : None of the above
Asymmetric key cryptography
Q. 121 ECC stands for
A : Elliptic Curve Cryptography
B : Elliptic Cryptography Curve
C : Error Correcting Code
D : None of the above
Elliptic Curve Cryptography
Q. 122 Diffie-Hellman algorithm is widely known as_________
A : Key exchange algorithm
B : key agreement algorithm
C : only a
D : Both a and b
Key exchange algorithm
Q. 123 Hash function is used for________
A : Message authentication
B : Digital Signature
C : Both a and b
D : only a
Both a and b
Q. 124 RSA algorithm is best example of_______
A : Asymmetric key cryptography
B : Symmetric key cryptography
C : Elliptic Curve Cryptography
D : All of the above
Asymmetric key cryptography
Q. 127 HTTPS is abbreviated as _________
A : Hypertexts Transfer Protocol Secured
B : Secured Hyper Text Transfer Protocol
C : Hyperlinked Text Transfer Protocol Secured
D : Hyper Text Transfer Protocol Secure
Secured Hyper Text Transfer Protocol
Q. 128 An attempt to make a computer resource unavailable to its intended users is called ______
A : Denial-of-service attack
B : Virus attack
C : Worms attack
D : Botnet process
Denial-of-service attack
Q. 129 SSL primarily focuses on _______
A : integrity and authenticity
B : integrity and non-repudiation
C : authenticity and privacy
D : confidentiality and integrity
integrity and authenticity
Q. 130 Pretty good privacy (PGP) is used in ______
A : Browser security
B : Email security
C : WiFi security
D : FTP security
Email security
Q. 131 __________ is used for encrypting data at network level
A : IPSec
B : HTTPS
C : SMTP
D : S/MIME
IPSec
Q. 132 WPA2 is used for security in _______
A : Ethernet
B : Wi-Fi
C : Bluetooth
D : E-mail
Wi-Fi
Q. 133 Which of the following is not a strong security protocol
A : SSL
B : HTTPL
C : SMTP
D : SFTP
SMTP
Q. 134 TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
A : TRUE
B : FALSE
TRUE
Q. 135 IPSec operates in….. different modes
A : 3
B : 2
C : 4
D : 5
2
Q. 136 length of the IPv4 address is ….
A : 32 bits
B : 64 bits
C : 16 bits
D : 128 bit
32 bits
Q. 137 Internet Key Exchange has …. phases and modes of operations
A : 4
B : 3
C : 2
D : 5
2
Q. 138 PGP is abbreviated as
A : Pretty Good Privacy
B : Pretty Good Policy
C : Policy Good Privacy
D : Pretty Good Protection
Pretty Good Privacy
Q. 139 SET stands for
A : Set Electronic Transaction
B : Secure Electronic Transaction
C : Simple Electronic Transaction
D : none of the above
Secure Electronic Transaction
Q. 140 Transport layer Protocol consists of … main components
A : 2
B : 1
C : 3
D : 4
2
Q. 141 length of the IPv6 acddress is ….
A : 32 bits
B : 64 bits
C : 16 bits
D : 128 bit
128 bits
Q. 142 SSL provides _________.
A : message integrity
B : confidentiality
C : compression
D : all of the above
all of the above
Q. 143 IPSec provides ….protocols for network layer
A : 7
B : 3
C : 1
D : 4
7
Q. 144 length of the IPv6 header is….
A : 64 bits
B : 16 bits
C : 32 bits
D : 8 bits
32 bits
MORE CYBER SECURITY MCQ WITH ANSWERS AND PDFS
Information and Cyber Security mcq questions and answers pdf
Cyber Security mcq questions and answers pdf
Information and Cyber Security mcq sppu | ICS mcq sppu