Home / Engineering / Information Cyber Security (ICS) MCQs / Page 17

Information Cyber Security (ICS) MCQs | Page - 17

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.17K Points
Coach

Q. 161) The CIA triad is often represented by which of the following?

(A) triangle
(B) diagonal
(C) ellipse
(D) circle
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 162) Related to information security, confidentiality is the opposite of which of the following?

(A) closure
(B) disclosure
(C) disaster
(D) disposal
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 163) ECC encryption system is __________

(A) symmetric key encryption algorithm
(B) asymmetric key encryption algorithm
(C) not an encryption algorithm
(D) block cipher method
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 164) ________function creates a message digest out of a message.

(A) encryption
(B) decryption
(C) hash
(D) none of the above
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 165) Extensions to the X.509 certificates were added in version ____

(A) 1
(B) 2
(C) 3
(D) 4
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 166) A digital signature needs ____ system

(A) symmetric-key
(B) asymmetric-key
(C) either (a) or (b)
(D) neither (a) nor (b)
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 167) “Elliptic curve cryptography follows the associative property.”

(A) true
(B) false
(C) ---
(D) ---
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 168) ECC stands for

(A) elliptic curve cryptography
(B) enhanced curve cryptography
(C) elliptic cone cryptography
(D) eclipse curve cryptography
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 169) When a hash function is used to provide message authentication, the hash function value is referred to as

(A) message field
(B) message digest
(C) message score
(D) message leap
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 170) Message authentication code is also known as

(A) key code
(B) hash code
(C) keyed hash function
(D) message key hash function
View Answer Discuss Share