Home / Engineering / Information Cyber Security (ICS) MCQs / Page 18

Information Cyber Security (ICS) MCQs | Page - 18

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 171) The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.

(A) true
(B) false
(C) ---
(D) ---
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 172) One commonly used public-key cryptography method is the ______ algorithm.

(A) rss
(B) ras
(C) rsa
(D) raa
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 173) he ________ method provides a one-time session key for two parties.

(A) diffie-hellman
(B) rsa
(C) des
(D) aes
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 174) The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.

(A) man-in-the-middle
(B) ciphertext attack
(C) plaintext attack
(D) none of the above
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 175) 1. VPN is abbreviated as __________

(A) visual private network
(B) virtual protocol network
(C) virtual private network
(D) virtual protocol networking
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 176) __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

(A) visual private network
(B) virtual protocol network
(C) virtual protocol networking
(D) virtual private network
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 177) Which of the statements are not true to classify VPN systems?

(A) protocols used for tunnelling the traffic
(B) whether vpns are providing site-to-site or remote access connection
(C) securing the network from bots and malwares
(D) levels of security provided for sending and receiving data privately
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 178) What types of protocols are used in VPNs?

(A) application level protocols
(B) tunnelling protocols
(C) network protocols
(D) mailing protocols
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 179) VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.

(A) true
(B) false
(C) ---
(D) ---
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 180) There are _________ types of VPNs.

(A) 3
(B) 2
(C) 5
(D) 4
View Answer Discuss Share