Home / Engineering / Information Cyber Security (ICS) MCQs / Page 23

Information Cyber Security (ICS) MCQs | Page - 23

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 221) Cryptanalysis is used __________

(A) to find some insecurity in a cryptographic scheme
(B) to increase the speed
(C) to encrypt the data
(D) to make new ciphers
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 222) Which one of the following is a cryptographic protocol used to secure HTTP connection?

(A) stream control transmission protocol (sctp)
(B) transport layer security (tls)
(C) explicit congestion notification (ecn)
(D) resource reservation protocol
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 223) Voice privacy in GSM cellular telephone protocol is provided by _______

(A) a5/2 cipher
(B) b5/4 cipher
(C) b5/6 cipher
(D) b5/8 cipher
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 224) ElGamal encryption system is __________

(A) symmetric key encryption algorithm
(B) asymmetric key encryption algorithm
(C) not an encryption algorithm
(D) block cipher method
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 225) Cryptographic hash function takes an arbitrary block of data and returns _________

(A) fixed size bit string
(B) variable size bit string
(C) both fixed size bit string and variable size bit string
(D) variable sized byte string
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 226) In the above figure from left to right, the correct order of the shaded levels are

(A) network level, application level, transport level
(B) application level, network level, transport level
(C) transport level, application level, network level
(D) network level, transport level, application level
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 227) In the above figure, which of the above shaded block is transparent to end users and applications?

(A) ip/ipsec
(B) ssl
(C) kerberos
(D) s/mime
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 228) In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

(A) true
(B) false
(C) ---
(D) ---
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 229) Which one of the following is not a higher –layer SSL protocol?

(A) alert protocol
(B) handshake protocol
(C) alarm protocol
(D) change cipher spec protocol
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 230) In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

(A) 216
(B) 232
(C) 214
(D) 212
View Answer Discuss Share