Computer Hardware and Networking/Information Cyber Security (ICS) MCQs Set 2 Sample Test,Sample questions

Question:
 ECC stands for

1. elliptic curve cryptography

2.enhanced curve cryptography

3.elliptic cone cryptography

4.eclipse curve cryptography


Question:
 In asymmetric key cryptography, the two keys e and d, have special relationship to

1.others

2.data

3.keys

4.each other


Question:
 In cryptography, the order of the letters in a message is rearranged by __________

1. transpositional ciphers

2.substitution ciphers

3.both transpositional ciphers and substitution ciphers

4.quadratic ciphers


Question:
 In DES step both LPT and RPT undergoes in how much key Rounds?

1.8

2.16

3.32

4.64


Question:
 In Symmetric schemes requires both parties to share how many secret key?

1.one

2.two

3.three

4. four


Question:
 In the course of conducting forensic analysis, which of the following actions are carried out?

1. critical thinking

2.fusion

3.validation

4.All of the above


Question:
 Security Measures Needed to protect ________ during their transmission

1.file

2.data

3.packet

4.All of the above


Question:
 What is full form of DDoS?

1.derived denial of service

2.distributed denial ofservice

3.denial of service

4.None of these


Question:
 What is lying of IP address called as?

1.. ip spoofing

2.ip scamming

3.ip lying

4.None of These


Question:
 When reconstructing evidence surrounding a violent crime, it is generally helpful to:

1. lay out all the evidence so it can be viewed in its entirety

2. work with the crime scene technicians so that a better understanding of the crime is achieved

3.construct a timeline of events from digital evidence

4.begin the process of converting field notes to a final report


Question:
 When you use the word ______it means you are protecting your data from getting disclosed.

1.confidentiality

2.integrity

3.authentication

4.availability


Question:
 Which one of the following algorithm is not used in asymmetric-key cryptography?

1.rsa algorithm

2.diffie-hellman algorithm

3.electronic code book algorithm

4.dsa algorithm


Question:
. In AES in which Round Subkeys are Generated from Original key for each round?

1.key expansion

2.initial round

3.finale round

4.none of these


Question:
4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

1.secret key

2. external programs

3.add-ons

4.secondary key


Question:
A asymmetric-key (or public key ) cipher uses

1. 1 key

2.2 key

3.3 key

4. 4 key


Question:
A company requires its users to change passwords every month. This improves the ________ of the network.

1.performance

2.reliability

3.security

4.None of the above


Question:
A digital signature needs ____ system

1.symmetric-key

2.asymmetric-key

3. either (a) or (b)

4.neither (a) nor (b)


Question:
A hacker guessing suggested password to a program is call as?

1. password guessing

2.dictionary attack

3. default password attack

4.none of these


Question:
A way to ensure that the entity is indeed what it claims to be.-

1.authentication

2.accountability

3.identification

4.security


Question:
AES stands for ?

1.authorized encryption standard

2.advance encryption standard

3.advance encryption strategy

4.none of these


Question:
An act of protecting information from unauthorised disclouser to an entity.-

1.intergrity

2.avability

3.confidentiality

4.none of these


Question:
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

1.cyber-crime

2.cyber attack

3.system hijacking

4.digital crime


Question:
An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:

1.part of the blame can be assigned to the victim.

2. the offender is likely to be found in the same area as the victim C

3.investigators should pay particular attention to acquaintances of the victim

4. investigators should always check the immediate family


Question:
Blum Blum Shub Generator is based on which Algorithm?

1.private key

2.public key

3.both a & b

4.none of these


Question:
Computers and mobile devices are treated as _________ crime scenes in violent crime investigations.

1.temporary

2.immediate

3.remote

4.secondary


Question:
Conventional cryptography is also known as _____________ or symmetric-key encryption.

1.secret-key

2.public key

3.protected key

4.primary key


Question:
Conversion of Cypher text to plain text?

1.encryption

2.decryption

3.simple text

4.none of these


Question:
Conversion of plain text into Cipher text is called as________.

1.encryption

2.decryption

3.hidden text

4.None of the above


Question:
Data ___________ is used to ensure confidentiality.

1.encryption

2.locking

3.decryption

4.backup


Question:
ECC encryption system is __________

1.symmetric key encryption algorithm

2.asymmetric key encryption algorithm

3.not an encryption algorithm

4. block cipher method


Question:
Extensions to the X.509 certificates were added in version ____

1.1

2.2

3.3

4.4


Question:
How many rounds does the AES-192 perform?

1.10

2.12

3.14

4.16


Question:
In asymmetric key cryptography, the private key is kept by __________

1. sender

2.receiver

3.sender and receiver

4.all the connected devices to the network


Question:
Prevention of the unauthorised used of Resources refers too?

1.data integrity

2. data confidentiality

3.acess control

4.None of These


Question:
Protection against Denial by one of these parties in a communication refers to?

1.non-repudiation

2.data integrity

3.authentication

4.none of these


Question:
Related to information security, confidentiality is the opposite of which of the following?

1.closure

2.disclosure

3.disaster

4.disposal


Question:
Release of message contents and Traffic analysis are two types of _________ attacks.

1.active attack

2.modification of attack

3.passive attack

4.dos attack


Question:
Symmetric key encryption is also called as?

1.public key encryption

2.private keyencryption

3.both of these

4.none of these


Question:
That part of cyberstalking where the offender is using the Internet to find a victim is known as:

1. profiling

2.trolling

3.surreptitious monitoring

4. none of the above.


Question:
The CIA triad is often represented by which of the following?

1.riangle

2.diagonal

3.ellipse

4.circle


Question:
The full form of OSI is OSI model__.

1.open systemsinterconnection

2.open softwareinterconnection

3. open connection

4.open system internet


Question:
The message which is not understandable is called as?

1.cipher text

2.plain text

3.hidden text

4.both a & c


Question:
The procedure to add bits to the last block is termed as _________________

1. decryption

2.hashing

3.tuning

4.padding


Question:
The technique in which when one character is replaced by another Character is called as?

1. transposition

2.substitution

3.combinational

4.None of these


Question:
The ________ is encrypted text.

1.cipher scricpt

2.cipher text

3.secret text

4.secret script


Question:
The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.

1.evidence inventory

2.evidence intake

3.evidence intake

4. preservation notes


Question:
The__model is 7 layer architecture where each layer is having some specific functionality to perform.

1. tcp

2.osi

3.ois

4.none of these


Question:
This helps in identifying the origin of information and authentic user. This referred to here as __________

1.confidentiality

2.integrity

3.authenticity

4.availability


Question:
What does OSI stand for in the OSI Security Architecure?

1.open system interface

2.open systems interconnections

3.open source initiative

4.open standard interconnections


Question:
What is data encryption standard (DES)?

1.block cipher

2.stream cipher

3.bit cipher

4.byte cipher


Question:
What is the 4th step in DES Algorithm?

1.key transformation

2.s-box substitution

3.p-box permutation

4.expansion permutation


Question:
What type of attack uses a fraudulent server with a relay address?

1.ntlm

2.mitm

3.netbios

4.smb


Question:
When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:

1. the victim might have been withholding information during the first interview.

2. the information that investigators have gathered might help the victim recall additional details.

3. the time between the first and second interviews has given the victim time to seek counseling.

4. none of the above


Question:
When a hash function is used to provide message authentication, the hash function value is referred to as

1.message field

2.message digest

3. message score

4.message leap


Question:
When you have developed a theory, what can you do to confirm that your hypothesis is correct?

1.predict, based on your hypothesis, where artifacts should be located

2.perform experiments to test results and rule out alternate explanations

3.conclude, based on your findings, whether the evidence supports the hypothesis

4.All of the above


Question:
Which is the largest disadvantage of the symmetric Encryption?

1.more complex and therefore more time-consuming calculations.

2.problem of the secure transmission of the secret key.

3.less secure encryption function

4.isn used any more.


Question:
Which of them is type of Cipher?

1.stream cipher

2. block cipher

3.both of them

4.None of these


Question:
Which One of them is Passive attack?

1.denial of service

2.modify message intransit

3. replay previous message

4.obtain message contain


Question:
__ platforms are used for safety and protection of information in the cloud.

1.cloud workload protection platforms

2.cloud security protocols

3.aws

4.one drive


Question:
__is used to create the organisation's overall security program.

1.program policy

2.purpose

3.security

4.none of these


Question:
___function creates a message digest out of a message.

1.encryption

2.decryption

3.hash

4.none of the above


Question:
_____ means the protection of data from modification by unknown users.

1.confidentiality

2.integrity

3.authentication

4.non-repudiation


Question:
______ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

1.malware analysis

2.cryptography

3.reverse engineering

4.exploit writing


Question:
________ means knowledge obtained from investigation, study , intelligence new ,facts .

1.security

2.data

3.information

4.None of the above


Question:
_____________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

1.malware analysis

2.exploit writing

3.reverse engineering

4.cryptography


More MCQS

  1. MCQ Questions from Computer Hardware Concept
  2. Computer Communication and Networking MCQS Quiz
  3. Computer Hardware Quiz Set 1
  4. Computer Hardware Quiz Set 2
  5. Computer Hardware Quiz Set 3
  6. Computer Hardware Quiz Set 4
  7. Computer Hardware Quiz Set 5
  8. Computer Hardware Quiz Set 6
  9. Computer Hardware Quiz Set 7
  10. Computer Hardware Quiz Set 8
  11. Computer Hardware Multiple Choice Questions(MCQs) and Answers
  12. Graphics Hardware and Display devices Input Devices
  13. Computer Hardware MCQ GK Questions Set 1
  14. Computer Hardware MCQ GK Questions Set 2
  15. Computer Hardware Multiple Choice Questions
  16. CDMA Multiple Choice Questions
  17. Network Security Multiple Choice questions
  18. Opengl Multiple Choice Questions
  19. Opengl Multiple Choice Questions.
  20. Web Development Multiple-choice Questions
  21. WiFi Multiple Choice Questions
  22. 4G Multiple Choice Question
  23. NETWORK MODELS MCQ
  24. INTERNET AND PROTOCOLS MCQ SET 1
  25. INTERNET AND PROTOCOLS MCQ SET 2
  26. INTERNET AND PROTOCOLS MCQ SET 3
  27. INTERNET AND PROTOCOLS MCQ SET 4
  28. INTERNET AND PROTOCOLS MCQ SET 5
  29. NETWORKING /PHYSICAL LAYER SET 1
  30. NETWORKING /PHYSICAL LAYER SET 2
  31. NETWORKING /PHYSICAL LAYER SET 3
  32. NETWORKING /PHYSICAL LAYER SET 4
  33. Information and Network Security Set 1
  34. Information and Network Security Set 2
  35. Information Cyber Security (ICS) MCQs Set 1
  36. Information Cyber Security (ICS) MCQs Set 2
  37. Information Cyber Security (ICS) MCQs Set 3
  38. Information Cyber Security (ICS) MCQs Set 4
  39. Information Cyber Security (ICS) MCQs Set 5
Search
Olete Team
Online Exam TestTop Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on Online Exam Testwebsite is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!