Quiznetik
Information and Cyber Security (ICS) | Set 1
1. Security Measures Needed to protect during their transmission
A. file
B. data
C. packet
D. all of above
Correct : B. data
2. means knowledge obtained from investigation, study , intelligence new ,facts .
A. security
B. data
C. information
D. none of these
Correct : C. information
3. Prevention of the unauthorised used of Resources refers too?
A. data integrity
B. data confidentiality
C. acess control
D. none of these
Correct : C. acess control
4. Protection against Denial by one of these parties in a communication refers to?
A. non-repudiation
B. data integrity
C. authentication
D. none of these
Correct : A. non-repudiation
5. Which One of them is Passive attack?
A. denial of service
B. modify message in transit
C. replay previous message
D. obtain message contain
Correct : D. obtain message contain
6. What is lying of IP address called as?
A. ip spoofing
B. ip scamming
C. ip lying
D. none of theses
Correct : A. ip spoofing
7. What is full form of DDoS?
A. derived denial of service
B. distributed denial of service
C. denial of service
D. none of these
Correct : B. distributed denial of service
8. A hacker guessing suggested password to a program is call as?
A. password guessing
B. dictionary attack
C. default password attack
D. none of these
Correct : C. default password attack
9. Symmetric key encryption is also called as?
A. public key encryption
B. private key encryption
C. both of these
D. none of these
Correct : B. private key encryption
10. Conversion of Cypher text to plain text?
A. encryption
B. decryption
C. simple text
D. none of these
Correct : B. decryption
11. is used to create the organisation's overall security program.
A. program policy
B. purpose
C. security
D. none of these
Correct : A. program policy
12. An act of protecting information from unauthorised disclouser to an entity.-
A. intergrity
B. avability
C. confidentiality
D. none of these
Correct : C. confidentiality
13. A way to ensure that the entity is indeed what it claims to be.-
A. authentication
B. accountability
C. identification
D. security
Correct : A. authentication
14. The model is 7 layer architecture where each layer is having some specific functionality to perform.
A. tcp
B. osi
C. ois
D. none of these
Correct : B. osi
15. The full form of OSI is OSI model .
A. open systems interconnection
B. open software interconnection
C. open connection
D. open system internet
Correct : A. open systems interconnection
16. The technique in which when one character is replaced by another Character is called as?
A. transposition
B. substitution
C. combinational
D. none of these
Correct : B. substitution
17. Conversion of plain text into Cipher text is called as .
A. encryption
B. decryption
C. hidden text
D. none of above
Correct : A. encryption
18. In Symmetric schemes requires both parties to share how many secret key?
A. one
B. two
C. three
D. four
Correct : A. one
19. Blum Blum Shub Generator is based on which Algorithm?
A. private key
B. public key
C. both a & b
D. none of these
Correct : B. public key
20. In DES step both LPT and RPT undergoes in how much key Rounds?
A. 8
B. 16
C. 32
D. 64
Correct : B. 16
21. What is the 4th step in DES Algorithm?
A. key transformation
B. s-box substitution
C. p-box permutation
D. expansion permutation
Correct : C. p-box permutation
22. In AES in which Round Subkeys are Generated from Original key for each round?
A. key expansion
B. initial round
C. finale round
D. none of these
Correct : A. key expansion
23. AES stands for?
A. authorized encryption standard
B. advance encryption standard
C. advance encryption strategy
D. none of these
Correct : B. advance encryption standard
24. Which of them is type of Cipher?
A. stream cipher
B. block cipher
C. both of them
D. none of these
Correct : C. both of them
25. The message which is not understandable is called as?
A. cipher text
B. plain text
C. hidden text
D. both a & c
Correct : A. cipher text
26. The is a polygraphic substitution cipher based on linear algebra.
A. hill cipher
B. playfair cipher
C. affine cipher
D. none of these
Correct : A. hill cipher
27. is the practice of concealing a message within another message,image or file.
A. steganography
B. cryptography
C. cipher
D. receiver
Correct : A. steganography
28. In asymmetric key cryptography, the private key is kept by
A. sender
B. receiver
C. sender and receiver
D. none of these
Correct : B. receiver
29. What is data encryption standard (DES)?
A. block cipher
B. stream cipher
C. bit cipher
D. byte cipher
Correct : A. block cipher
30. In cryptography the original message before being transform is called
A. simple text
B. plain text
C. empty text
D. filled text
Correct : B. plain text
31. An asymmetric-key (or public-key) cipher uses
A. 1 key
B. 2 key
C. 3 key
D. 4 key
Correct : A. 1 key
32. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
A. short
B. flat
C. long
D. thin
Correct : C. long
33. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
A. authenticated
B. joined
C. submit
D. separate
Correct : A. authenticated
34. In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
A. other
B. data
C. keys
D. each other
Correct : D. each other
35. For RSA to work, the value of P must be less than the value of
A. p
B. q
C. n
D. r
Correct : C. n
36. In RSA, Ф(n) = in terms of p and q.
A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)
Correct : C. (p-1)(q-1)
37. In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).
A. true
B. false
Correct : B. false
38. RSA is also a stream cipher like Merkel-Hellman.
A. true
B. false
Correct : A. true
39. USENET falls under which category of public key sharing?
A. public announcement
B. publicly available directory
C. public key authority
D. public key certificate
Correct : A. public announcement
40. PGP makes use of which cryptographic algorithm?
A. rsa
B. aes
C. des
D. robin
Correct : A. rsa
41. Public key cryptography also called as
A. asymmetric key cryptography
B. symmetric key cryptography
C. both a and b
D. none of the above
Correct : A. asymmetric key cryptography
42. ECC stands for
A. elliptic curve cryptography
B. elliptic cryptography curve
C. error correcting code
D. none of the above
Correct : A. elliptic curve cryptography
43. Diffie-Hellman algorithm is widely known as
A. key exchange algorithm
B. key agreement algorithm
C. only a
D. both a and b
Correct : D. both a and b
44. Hash function is used for
A. message authentication
B. digital signature
C. both a and b
D. only a
Correct : C. both a and b
45. RSA algorithm is best example of
A. asymmetric key cryptography
B. symmetric key cryptography
C. elliptic curve cryptography
D. all of the above
Correct : A. asymmetric key cryptography
46. IPSec is designed to provide security at the
A. transport layer
B. network layer
C. application layer
D. session layer
Correct : B. network layer
47. In tunnel mode, IPSec protects the
A. entire ip packet
B. ip header
C. ip payload
D. ip trailer
Correct : A. entire ip packet
48. HTTPS is abbreviated as
A. secured hyper hypertexts transfer text transfer protocol secured protocol
B. none of the mentioned
C. hyperlinked text transfer protocol secured
D. hyper text transfer protocol secure
Correct : D. hyper text transfer protocol secure
49. An attempt to make a computer resource unavailable to its intended users is called
A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process
Correct : A. denial-of-service attack
50. SSL primarily focuses on Pretty good privacy (PGP) is used in
A. integrity and authenticity
B. integrity and non- repudiation
C. authenticity and privacy
D. confidentiality and integrity
Correct : A. integrity and authenticity
51. is used for encrypting data at network level
A. ipsec
B. https
C. smtp
D. s/mime
Correct : A. ipsec
52. WPA2 is used for security in
A. ethernet
B. wi-fi
C. bluetooth
D. e-mail
Correct : B. wi-fi
53. Which of the following is not a strong security protocol
A. ssl
B. httpl
C. smtp
D. sftp
Correct : C. smtp
54. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
A. true
B. false
Correct : A. true
55. IPSec operates in..... different modes
A. 3
B. 2
C. 4
D. 5
Correct : B. 2
56. length of the IPv4 address is ....
A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Correct : A. 32 bits
57. Internet Key Exchange has .... phases and modes of operations
A. 4
B. 3
C. 2
D. 5
Correct : C. 2
58. PGP is abbreviated as
A. pretty good privacy
B. pretty good policy
C. policy good privacy
D. pretty good protection
Correct : A. pretty good privacy
59. SET stands for
A. set electronic transaction
B. secure electronic transaction
C. simple electronic transaction
D. none of the above
Correct : B. secure electronic transaction
60. Transport layer Protocol consists of ... main components
A. 2
B. 1
C. 3
D. 4
Correct : A. 2
61. length of the IPv6 acddress is ....
A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Correct : B. 64 bits
62. SSL provides .
A. message integrity
B. confidentiality
C. compression
D. all of the above
Correct : D. all of the above
63. IPSec provides ....protocols for network layer
A. 7
B. 3
C. 1
D. 4
Correct : A. 7
64. length of the IPv6 header is....
A. 64 bits
B. 16 bits
C. 32 bits
D. 8 bits
Correct : C. 32 bits
65. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
A. confidentiality
B. integrity
C. authenticity
D. availability
Correct : C. authenticity
66. CIA triad is also known as
A. nic (non-repudiation, integrity, confidentiality)
B. aic (availability, integrity, confidentiality)
C. ain (availability, integrity, non-repudiation)
D. aic (authenticity, integrity, confidentiality)
Correct : B. aic (availability, integrity, confidentiality)
67. of information means, only authorised users are capable of accessing the information.
A. confidentiality
B. integrity
C. non-repudiation
D. availability
Correct : A. confidentiality
68. means the protection of data from modification by unknown users.
A. confidentiality
B. integrity
C. authentication
D. non-repudiation
Correct : B. integrity
69. When you use the word it means you are protecting your data from getting disclosed.
A. confidentiality
B. integrity
C. authentication
D. availability
Correct : A. confidentiality
70. When integrity is lacking in a security system, occurs.
A. database hacking
B. data deletion
C. data tampering
D. data leakage
Correct : C. data tampering
71. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
A. they help understanding hacking better
B. they are key elements to a security breach
C. they help understands security and its components better
D. they help to understand the cyber-crime better
Correct : C. they help understands security and its components better
72. This helps in identifying the origin of information and authentic user. This referred to here as
A. confidentiality
B. integrity
C. authenticity
D. availability
Correct : C. authenticity
73. Data is used to ensure confidentiality.
A. encryption
B. locking
C. deleting
D. backup
Correct : A. encryption
74. Data integrity gets compromised when and are taken control off.
A. access control, file deletion
B. network, file permission
C. access control, file permission
D. network, system
Correct : C. access control, file permission
75. is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
A. network security
B. database security
C. information security
D. physical security
Correct : C. information security
76. From the options below, which of them is not a threat to information security?
A. disaster
B. eavesdropping
C. information leakage
D. unchanged default password
Correct : D. unchanged default password
77. Compromising confidential information comes under
A. bug
B. threat
C. vulnerability
D. attack
Correct : B. threat
78. Which of the following are not security policies?
A. regulatory
B. advisory
C. availability
D. user policies
Correct : C. availability
79. Examples of User Policies is/are:
A. password policies
B. internet usage
C. system use
D. all of the above
Correct : D. all of the above
80. Policy ensures that the organization is maintaining standards set by specific industry regulation.
A. regulatory
B. advisory
C. availability
D. user policies
Correct : A. regulatory
81. Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior
A. regulatory
B. advisory
C. availability
D. user policies
Correct : B. advisory
82. What defines the restrictions on employees such as usage?
A. regulatory
B. advisory
C. availability
D. user policies
Correct : D. user policies
83. The full form of OSI is OSI model is
A. open systems interconnection
B. open software interconnection
C. open systems internet
D. open software internet
Correct : A. open systems interconnection
84. In layer, vulnerabilities are directly associated with physical access to networks and hardware.
A. physical
B. data-link
C. network
D. application
Correct : A. physical
85. Which of the following attack can actively modify communications or data?
A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Correct : C. active attacks
86. Categories of Security Service
A. 1
B. 1 &3
C. 2& 3
D. 1,2,3
Correct : D. 1,2,3
87. Release of Message Content and Traffic analysis are type of :
A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Correct : D. passive attacks
88. If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
A. release of message content-passive attack
B. traffic analysis -passive attacks
C. release of message content- active attacks
D. traffic analysis -active attacks
Correct : A. release of message content-passive attack
89. If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
A. release of message content-passive attack
B. traffic analysis -passive attacks
C. release of message content- active attacks
D. traffic analysis -active attacks
Correct : D. traffic analysis -active attacks
90. means when an attacker pretends to be authentic user
A. masquerade
B. replay
C. modification
D. traffic analysis
Correct : A. masquerade
91. attack is when original data is modified and malicious data is inserted
A. masquerade
B. replay(rewrite)
C. modification
D. traffic analysis
Correct : B. replay(rewrite)
92. When original data is changed to make it non-meaningful by attacker it is known as
A. masquerade
B. replay
C. modification of messages
D. traffic analysis
Correct : C. modification of messages
93. Which is the type of attack when Network is made unavailable for user
A. masquerade
B. replay
C. modification
D. denial of service
Correct : D. denial of service
94. Modification of Data is done in:
A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Correct : A. both active and passive attacks
95. The information that gets transformed in encryption is
A. plain text
B. parallel text
C. encrypted text
D. decrypted text
Correct : A. plain text
96. A process of making the encrypted text readable again.
A. decryption
B. encryption
C. network security
D. information hiding
Correct : A. decryption
97. A unique piece of information that is used in encryption.
A. cipher
B. plain text
C. key
D. cipher
Correct : C. key
98. Assurance that authentic user is taking part in communication is:
A. authentication
B. authorization
C. access control
D. auditing
Correct : A. authentication
99. ATM pin while withdrawing money is an example of using:
A. authentication
B. authorization
C. access control
D. auditing
Correct : A. authentication
100. Study of creating a d using encryption and decryption techniques.
A. cipher
B. cryptography
C. encryption
D. decryption
Correct : B. cryptography