Quiznetik
Information and Cyber Security (ICS) | Set 2
1. An attack in which the user receives unwanted amount of e- mails.
A. smurfing
B. denial of service
C. e-mail bombing
D. ping storm
Correct : C. e-mail bombing
2. In same keys are implemented for encrypting as well as decrypting the information.
A. symmetric key encryption
B. asymmetric key encryption
C. asymmetric key decryption
D. hash-based key encryption
Correct : A. symmetric key encryption
3. The procedure to add bits to the last block is termed as
A. decryption
B. hashing
C. tuning
D. padding
Correct : D. padding
4. In asymmetric key cryptography, the private key is kept by
A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Correct : B. receiver
5. Cryptanalysis is used
A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers
Correct : A. to find some insecurity in a cryptographic scheme
6. Conventional cryptography is also known as or symmetric-key encryption.
A. secret-key
B. public key
C. protected key
D. primary key
Correct : A. secret-key
7. is the art & science of cracking the cipher-text without knowing the key.
A. cracking
B. cryptanalysis
C. cryptography
D. crypto-hacking
Correct : B. cryptanalysis