Home / Engineering / Information Cyber Security (ICS) MCQs / Page 15

Information Cyber Security (ICS) MCQs | Page - 15

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 141) Symmetric key encryption is also called as?

(A) public key encryption
(B) private key encryption
(C) both of these
(D) none of these
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 142) Conversion of Cypher text to plain text?

(A) encryption
(B) decryption
(C) simple text
(D) none of these
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 143) __is used to create the organisation's overall security program.

(A) program policy
(B) purpose
(C) security
(D) none of these
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 144) An act of protecting information from unauthorised disclouser to an entity.-

(A) intergrity
(B) avability
(C) confidentiality
(D) none of these
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 145) A way to ensure that the entity is indeed what it claims to be.-

(A) authentication
(B) accountability
(C) identification
(D) security
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 146) The__model is 7 layer architecture where each layer is having some specific functionality to perform.

(A) tcp
(B) osi
(C) ois
(D) none of these
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 147) The full form of OSI is OSI model__.

(A) open systems interconnection
(B) open software interconnection
(C) open connection
(D) open system internet
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 148) The technique in which when one character is replaced by another Character is called as?

(A) transposition
(B) substitution
(C) combinational
(D) none of these
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 149) Conversion of plain text into Cipher text is called as________.

(A) encryption
(B) decryption
(C) hidden text
(D) none of above
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 150) In Symmetric schemes requires both parties to share how many secret key?

(A) one
(B) two
(C) three
(D) four
View Answer Discuss Share