Information Cyber Security

R

Rakesh Kumar • 18.39K Points
Tutor I

Q 1. In asymmetric key cryptography, the private key is kept by

(A) sender
(B) receiver
(C) sender and receiver
(D) all the connected devices to the network
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

P

Priyanka Tomar • 25.20K Points
Instructor II

Q 2. ATM pin while withdrawing money is an example of using:

(A) authentication
(B) authorization
(C) access control
(D) auditing
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

G

Gopal Sharma • 27.68K Points
Instructor II

Q 3. Assurance that authentic user is taking part in communication is:

(A) authentication
(B) authorization
(C) access control
(D) auditing
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

R

Ram Sharma • 188.01K Points
Coach

Q 4. A process of making the encrypted text readable again.

(A) decryption
(B) encryption
(C) network security
(D) information hiding
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

V

Vikash Gupta • 23.56K Points
Instructor III

Q 5. Modification of Data is done in:

(A) both active and passive attacks
(B) neither active and passive attacks
(C) active attacks
(D) passive attacks
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

R

Rakesh Kumar • 18.39K Points
Tutor I

Q 6. Which is the type of attack when Network is made unavailable for user

(A) masquerade
(B) replay
(C) modification
(D) denial of service
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

P

Priyanka Tomar • 25.20K Points
Instructor II

Q 7. When original data is changed to make it non-meaningful by attacker it is known as

(A) masquerade
(B) replay
(C) modification of messages
(D) traffic analysis
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

S

Shiva Ram • 20.56K Points
Instructor III

Q 8.                        attack is when original data is modified and malicious data is inserted

(A) masquerade
(B) replay(rewrite)
(C) modification
(D) traffic analysis
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

V

Vijay Sangwan • 18.30K Points
Tutor I

Q 9.              means when an attacker pretends to be authentic user

(A) masquerade
(B) replay
(C) modification
(D) traffic analysis
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

V

Vijay Sangwan • 18.30K Points
Tutor I

Q 10. Release of Message Content and Traffic analysis are type of :

(A) both active and passive attacks
(B) neither active and passive attacks
(C) active attacks
(D) passive attacks
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share