Home / Engineering / Information Cyber Security (ICS) MCQs / Page 12

Information Cyber Security (ICS) MCQs | Page - 12

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 111) length of the IPv4 address is ....

(A) 32 bits
(B) 64 bits
(C) 16 bits
(D) 128 bit
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 112) Internet Key Exchange has .... phases and modes of operations

(A) 4
(B) 3
(C) 2
(D) 5
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 113) PGP is abbreviated as

(A) pretty good privacy
(B) pretty good policy
(C) policy good privacy
(D) pretty good protection
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 114) SET stands for

(A) set electronic transaction
(B) secure electronic transaction
(C) simple electronic transaction
(D) none of the above
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 115) DNS can use services of________using the well known port 53

(A) udp
(B) tcp
(C) either (a) or (b)
(D) none of the above
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 116) In the DNS the names are defined in _____ sturucture

(A) a linear list
(B) an invertred tree
(C) a graph
(D) none
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 117) The root of DNS tree is____

(A) a string of characters
(B) a string of 63 characters
(C) an empty string
(D) none
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 118) A full domain name is sequence of lables seperated by____

(A) semicolons
(B) dots
(C) colons
(D) none
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 119) When discussing IDS/IPS, what is a signature?

(A) an electronic signature used to authenticate the identity of a user on the network
(B) patterns of activity or code corresponding to attacks
(C) "normal," baseline network behavior
(D) none of the above
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 120) Which is true of a signature-based IDS?

(A) it cannot work with an ips
(B) it only identifies on known signatures
(C) it detects never-before-seen anomalies
(D) it works best in large enterprises.
View Answer Discuss Share