# Computer Hardware and Networking/Information Cyber Security (ICS) MCQs Set 2 Sample Test,Sample questions

## Question: ` ECC stands for`

1. elliptic curve cryptography

2.enhanced curve cryptography

3.elliptic cone cryptography

4.eclipse curve cryptography

1.others

2.data

3.keys

4.each other

## Question: ` In cryptography, the order of the letters in a message is rearranged by __________`

1. transpositional ciphers

2.substitution ciphers

3.both transpositional ciphers and substitution ciphers

1.8

2.16

3.32

4.64

1.one

2.two

3.three

4. four

## Question: ` In the course of conducting forensic analysis, which of the following actions are carried out?`

1. critical thinking

2.fusion

3.validation

4.All of the above

## Question: ` Security Measures Needed to protect ________ during their transmission`

1.file

2.data

3.packet

4.All of the above

## Question: ` What is full form of DDoS?`

1.derived denial of service

2.distributed denial ofservice

3.denial of service

4.None of these

1.. ip spoofing

2.ip scamming

3.ip lying

4.None of These

## Question: ` When reconstructing evidence surrounding a violent crime, it is generally helpful to:`

1. lay out all the evidence so it can be viewed in its entirety

2. work with the crime scene technicians so that a better understanding of the crime is achieved

3.construct a timeline of events from digital evidence

4.begin the process of converting field notes to a final report

## Question: ` When you use the word ______it means you are protecting your data from getting disclosed.`

1.confidentiality

2.integrity

3.authentication

4.availability

## Question: ` Which one of the following algorithm is not used in asymmetric-key cryptography?`

1.rsa algorithm

2.diffie-hellman algorithm

3.electronic code book algorithm

4.dsa algorithm

1.key expansion

2.initial round

3.finale round

4.none of these

## Question: `4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.`

1.secret key

2. external programs

4.secondary key

1. 1 key

2.2 key

3.3 key

4. 4 key

## Question: `A company requires its users to change passwords every month. This improves the ________ of the network.`

1.performance

2.reliability

3.security

4.None of the above

## Question: `A digital signature needs ____ system`

1.symmetric-key

2.asymmetric-key

3. either (a) or (b)

4.neither (a) nor (b)

## Question: `A hacker guessing suggested password to a program is call as?`

2.dictionary attack

4.none of these

1.authentication

2.accountability

3.identification

4.security

## Question: `AES stands for ?`

1.authorized encryption standard

4.none of these

## Question: `An act of protecting information from unauthorised disclouser to an entity.-`

1.intergrity

2.avability

3.confidentiality

4.none of these

## Question: `An attempt to harm, damage or cause threat to a system or network is broadly termed as ______`

1.cyber-crime

2.cyber attack

3.system hijacking

4.digital crime

## Question: `An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:`

1.part of the blame can be assigned to the victim.

2. the offender is likely to be found in the same area as the victim C

3.investigators should pay particular attention to acquaintances of the victim

4. investigators should always check the immediate family

1.private key

2.public key

3.both a & b

4.none of these

1.temporary

2.immediate

3.remote

4.secondary

1.secret-key

2.public key

3.protected key

4.primary key

1.encryption

2.decryption

3.simple text

4.none of these

## Question: `Conversion of plain text into Cipher text is called as________.`

1.encryption

2.decryption

3.hidden text

4.None of the above

1.encryption

2.locking

3.decryption

4.backup

## Question: `ECC encryption system is __________`

1.symmetric key encryption algorithm

2.asymmetric key encryption algorithm

3.not an encryption algorithm

4. block cipher method

1.1

2.2

3.3

4.4

1.10

2.12

3.14

4.16

## Question: `In asymmetric key cryptography, the private key is kept by __________`

1. sender

4.all the connected devices to the network

## Question: `Prevention of the unauthorised used of Resources refers too?`

1.data integrity

2. data confidentiality

3.acess control

4.None of These

## Question: `Protection against Denial by one of these parties in a communication refers to?`

1.non-repudiation

2.data integrity

3.authentication

4.none of these

1.closure

2.disclosure

3.disaster

4.disposal

## Question: `Release of message contents and Traffic analysis are two types of _________ attacks.`

1.active attack

2.modification of attack

3.passive attack

4.dos attack

## Question: `Symmetric key encryption is also called as?`

1.public key encryption

2.private keyencryption

3.both of these

4.none of these

## Question: `That part of cyberstalking where the offender is using the Internet to find a victim is known as:`

1. profiling

2.trolling

3.surreptitious monitoring

4. none of the above.

1.riangle

2.diagonal

3.ellipse

4.circle

## Question: `The full form of OSI is OSI model__.`

1.open systemsinterconnection

2.open softwareinterconnection

3. open connection

4.open system internet

1.cipher text

2.plain text

3.hidden text

4.both a & c

1. decryption

2.hashing

3.tuning

1. transposition

2.substitution

3.combinational

4.None of these

1.cipher scricpt

2.cipher text

3.secret text

4.secret script

## Question: `The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.`

1.evidence inventory

2.evidence intake

3.evidence intake

4. preservation notes

1. tcp

2.osi

3.ois

4.none of these

## Question: `This helps in identifying the origin of information and authentic user. This referred to here as __________`

1.confidentiality

2.integrity

3.authenticity

4.availability

## Question: `What does OSI stand for in the OSI Security Architecure?`

1.open system interface

2.open systems interconnections

3.open source initiative

4.open standard interconnections

1.block cipher

2.stream cipher

3.bit cipher

4.byte cipher

## Question: `What is the 4th step in DES Algorithm?`

1.key transformation

2.s-box substitution

3.p-box permutation

4.expansion permutation

1.ntlm

2.mitm

3.netbios

4.smb

## Question: `When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:`

1. the victim might have been withholding information during the first interview.

2. the information that investigators have gathered might help the victim recall additional details.

3. the time between the first and second interviews has given the victim time to seek counseling.

4. none of the above

1.message field

2.message digest

3. message score

4.message leap

## Question: `When you have developed a theory, what can you do to confirm that your hypothesis is correct?`

1.predict, based on your hypothesis, where artifacts should be located

2.perform experiments to test results and rule out alternate explanations

3.conclude, based on your findings, whether the evidence supports the hypothesis

4.All of the above

## Question: `Which is the largest disadvantage of the symmetric Encryption?`

1.more complex and therefore more time-consuming calculations.

2.problem of the secure transmission of the secret key.

3.less secure encryption function

4.isn used any more.

1.stream cipher

2. block cipher

3.both of them

4.None of these

## Question: `Which One of them is Passive attack?`

1.denial of service

2.modify message intransit

3. replay previous message

4.obtain message contain

## Question: `__ platforms are used for safety and protection of information in the cloud.`

2.cloud security protocols

3.aws

4.one drive

1.program policy

2.purpose

3.security

4.none of these

## Question: `___function creates a message digest out of a message.`

1.encryption

2.decryption

3.hash

4.none of the above

## Question: `_____ means the protection of data from modification by unknown users.`

1.confidentiality

2.integrity

3.authentication

4.non-repudiation

## Question: `______ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.`

1.malware analysis

2.cryptography

3.reverse engineering

4.exploit writing

## Question: `________ means knowledge obtained from investigation, study , intelligence new ,facts .`

1.security

2.data

3.information

4.None of the above

## Question: `_____________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.`

1.malware analysis

2.exploit writing

3.reverse engineering

4.cryptography

## More MCQS

##### Olete Team
Online Exam TestTop Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on Online Exam Testwebsite is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!