Home / Engineering / Information Cyber Security (ICS) MCQs / Page 19

Information Cyber Security (ICS) MCQs | Page - 19

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 181) _________ type of VPNs are used for home private and secure connectivity.

(A) remote access vpns
(B) site-to-site vpns
(C) peer-to-peer vpns
(D) router-to-router vpns
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 182) Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?

(A) remote access vpns
(B) site-to-site vpns
(C) peer-to-peer vpns
(D) country-to-country vpns
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 183) Site-to-Site VPN architecture is also known as _________

(A) remote connection based vpns
(B) peer-to-peer vpns
(C) extranet based vpn
(D) country-to-country vpns
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 184) There are ________ types of VPN protocols.

(A) 3
(B) 4
(C) 5
(D) 6
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 185) AES stands for?

(A) authorized encryption standard
(B) advance encryption standard
(C) advance encryption strategy
(D) none of these
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 186) The__is a polygraphic substitution cipher based on linear algebra.

(A) hill cipher
(B) playfair cipher
(C) affine cipher
(D) none of these
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 187) __is the practice of concealing a message within another message,image or file.

(A) steganography
(B) cryptography
(C) cipher
(D) receiver
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 188) In asymmetric key cryptography, the private key is kept by __________

(A) sender
(B) receiver
(C) sender and receiver
(D) none of these
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 189) In cryptography the original message before being transform is called

(A) simple text
(B) plain text
(C) empty text
(D) filled text
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 190) An asymmetric-key (or public-key) cipher uses

(A) 1 key
(B) 2 key
(C) 3 key
(D) 4 key
View Answer Discuss Share