Quiznetik

Information and Cyber Security (ICS) | Set 2

1. An attack in which the user receives unwanted amount of e- mails.

Correct : C. e-mail bombing

2. In same keys are implemented for encrypting as well as decrypting the information.

Correct : A. symmetric key encryption

3. The procedure to add bits to the last block is termed as

Correct : D. padding

4. In asymmetric key cryptography, the private key is kept by

Correct : B. receiver

5. Cryptanalysis is used

Correct : A. to find some insecurity in a cryptographic scheme

6. Conventional cryptography is also known as or symmetric-key encryption.

Correct : A. secret-key

7. is the art & science of cracking the cipher-text without knowing the key.

Correct : B. cryptanalysis