Home / Engineering / Information Cyber Security (ICS) MCQs / Page 22

Information Cyber Security (ICS) MCQs | Page - 22

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 211) If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

(A) release of message content-passive attack
(B) traffic analysis -passive attacks
(C) release of message content- active attacks
(D) traffic analysis -active attacks
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 212) The information that gets transformed in encryption is

(A) plain text
(B) parallel text
(C) encrypted text
(D) decrypted text
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 213) A unique piece of information that is used in encryption.

(A) cipher
(B) plain text
(C) key
(D) cipher
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 214) Study of creating a d using encryption and decryption techniques.

(A) cipher
(B) cryptography
(C) encryption
(D) decryption
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 215) An attack in which the user receives unwanted amount of e- mails.

(A) smurfing
(B) denial of service
(C) e-mail bombing
(D) ping storm
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 216) In same keys are implemented for encrypting as well as decrypting the information.

(A) symmetric key encryption
(B) asymmetric key encryption
(C) asymmetric key decryption
(D) hash-based key encryption
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 217) The procedure to add bits to the last block is termed as

(A) decryption
(B) hashing
(C) tuning
(D) padding
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 218) Cryptanalysis is used                      

(A) to find some insecurity in a cryptographic scheme
(B) to increase the speed
(C) to encrypt the data
(D) to make new ciphers
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 219) Conventional cryptography is also known as or symmetric-key encryption.

(A) secret-key
(B) public key
(C) protected key
(D) primary key
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 220)                                            is the art & science of cracking the cipher-text without knowing the key.

(A) cracking
(B) cryptanalysis
(C) cryptography
(D) crypto-hacking
View Answer Discuss Share