Cyber Security mcq questions and answers pdf

Top 70 most asked Information and cyber security mcq are given below. These ICS mcqs are helpful for both online exams and interviews. Information security mcq questions & answers for university online exams which covers all the frequently asked multiple choice questions asked in previous exams.

cyber security mcq questions and answers pdf download, information and cyber security mcq, information and cyber security mcq questions, information and cyber security mcq questions and answers, information and cyber security multiple choice questions

Here on netflixsub.com you get mcqs for all engineering subjects. We also added mcq pdf for download for some of the subjects. Not only information and cyber security mcqs but other Computer Engineering (CSE) mcq are also covered.

Cyber Security mcq questions and answers

Q. 1 _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.
A : Network Security
B : Database Security
C : Information Security
D : Physical Security

Advertisement

Information Security

Q. 2 _______ platforms are used for safety and protection of information in the cloud.
A : Cloud workload protection platforms
B : Cloud security protocols
C : AWS
D : One Drive

Advertisement

Cloud workload protection platforms

Q. 3 Compromising confidential information comes under _________
A : Bug
B : Threat
C : Vulnerability
D : Attack

Threat

Q. 4 An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
A : Cyber-crime
B : Cyber Attack
C : System hijacking
D : Digital crime

Advertisement

Cyber Attack

Q. 5 The CIA triad is often represented by which of the following?
A : Triangle
B : Diagonal
C : Ellipse
D : Circle

Triangle

Q. 6 Related to information security, confidentiality is the opposite of which of the following?
A : Closure
B : Disclosure
C : Disaster
D : Disposal

Advertisement

Disclosure

Q. 8 _______ means the protection of data from modification by unknown users.
A : Confidentiality
B : Integrity
C : Authentication
D : Non-repudiation

Integrity

Q. 9 _______ of information means, only authorized users are capable of accessing the information.
A : Confidentiality
B : Integrity
C : Non-repudiation
D : Availability

Advertisement

Availability

Q. 10 This helps in identifying the origin of information and authentic user. This referred to here as __________
A : Confidentiality
B : Integrity
C : Authenticity
D : Availability

Authenticity

Information and Cyber Security mcq with answers

Q. 11 Data ___________ is used to ensure confidentiality.
A : Encryption
B : Locking
C : Decryption
D : Backup

Advertisement

Encryption

Q. 12 What does OSI stand for in the OSI Security Architecure?
A : Open System Interface
B : Open Systems Interconnections
C : Open Source Initiative
D : Open Standard Interconnections

Open Systems Interconnections

Q. 13 A company requires its users to change passwords every month. This improves the ________ of the network.
A : Performance
B : Reliability
C : Security
D : None of the above

Advertisement

Security

Q. 14 Release of message contents and Traffic analysis are two types of _________ attacks.
A : Active Attack
B : Modification of Attack
C : Passive attack
D : DoS Attack

Passive attack

Q. 15 The ________ is encrypted text.
A : Cipher scricpt
B : Cipher text
C : Secret text
D : Secret script

Advertisement

Cipher text

Q. 17 Which of the following Algorithms not belong to symmetric encryption
A : 3DES (TripleDES)
B : RSA
C : RC5
D : IDEA

RSA

Q. 18 Which is the largest disadvantage of the symmetric Encryption?
A : More complex and therefore more time-consuming calculations.
B : Problem of the secure transmission of the Secret Key.
C : Less secure encryption function.
D : Isn’t used any more.

Problem of the secure transmission of the Secret Key.

Q. 19 In cryptography, what is cipher?
A : algorithm for performing encryption and decryption
B : encrypted message
C : both algorithm for performing encryption and decryption and encrypted message
D : decrypted message

Advertisement

algorithm for performing encryption and decryption

Q. 21 Which one of the following algorithm is not used in asymmetric-key cryptography?
A : rsa algorithm
B : diffie-hellman algorithm
C : electronic code book algorithm
D : dsa algorithm

electronic code book algorithm

Q. 23 What is data encryption standard (DES)?
A : block cipher
B : stream cipher
C : bit cipher
D : byte cipher

block cipher

Q. 24 A asymmetric-key (or public key ) cipher uses
A : 1 key
B : 2 key
C : 3 key
D : 4 key

2 key

Q. 26 _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
A : Malware Analysis
B : Exploit writing
C : Reverse engineering
D : Cryptography

Advertisement

Cryptography

Q.27 ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
A : Malware Analysis
B : Cryptography
C : Reverse engineering
D : Exploit writing

Cryptography

Q. 28 Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
A : secret key
B : external programs
C : add-ons
D : secondary key

secret key

Q. 29 Conventional cryptography is also known as _____________ or symmetric-key encryption.
A : secret-key
B : public key
C : protected key
D : primary key

Advertisement

secret-key

Q. 30 The procedure to add bits to the last block is termed as _________________
A : decryption
B : hashing
C : tuning
D : padding

padding

ICS mcq questions and answers

Q. 32 ECC encryption system is __________
A : symmetric key encryption algorithm
B : asymmetric key encryption algorithm
C : not an encryption algorithm
D : block cipher method

Advertisement

asymmetric key encryption algorithm

Q. 33 ________function creates a message digest out of a message.
A : encryption
B : decryption
C : hash
D : none of the above

hash

Q. 34 Extensions to the X.509 certificates were added in version ____
A : 1
B : 2
C : 3
D : 4

3

Q. 35 A digital signature needs ____ system
A : symmetric-key
B : asymmetric-key
C : either (a) or (b)
D : neither (a) nor (b)

Advertisement

asymmetric-key

Q. 36 Elliptic curve cryptography follows the associative property.
A : TRUE
B : FALSE

TRUE

Q. 37 ECC stands for
A : Elliptic curve cryptography
B : Enhanced curve cryptography
C : Elliptic cone cryptography
D : Eclipse curve cryptography

Elliptic curve cryptography

Q. 38 When a hash function is used to provide message authentication, the hash function value is referred to as
A : Message Field
B : Message Digest
C : Message Score
D : Message Leap

Message Leap

Q. 39 Message authentication code is also known as
A : key code
B : hash code
C : keyed hash function
D : message key hash function

Advertisement

hash code

Q. 40 The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.
A : TRUE
B : FALSE

FALSE

Q. 41 The DSS signature uses which hash algorithm?
A : MD5
B : SHA-2
C : SHA-1
D : Does not use hash algorithm

SHA-1

Q. 42 What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
A : 42 bytes
B : 32 bytes
C : 36 bytes
D : 48 bytes

36 bytes

Q. 43 In the handshake protocol which is the message type first sent between client and server ?
A : server_hello
B : client_hello
C : hello_request
D : certificate_request

client_hello

Q. 44 One commonly used public-key cryptography method is the ______ algorithm.
A : RSS
B : RAS
C : RSA
D : RAA

Advertisement

RSA

Q. 45 The ________ method provides a one-time session key for two parties.
A : Diffie-Hellman
B : RSA
C : DES
D : AES

Diffie-Hellman

Q. 46 The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
A : man-in-the-middle
B : ciphertext attack
C : plaintext attack
D : none of the above

man-in-the-middle

Q. 48 VPN is abbreviated as __________
A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Private Network
D : Virtual Protocol Networking

Virtual Private Network

Q. 49 __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.
A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Protocol Networking
D : Virtual Private Network

Advertisement

Virtual Private Network

Q. 50 Which of the statements are not true to classify VPN systems?
A : Protocols used for tunnelling the traffic
B : Whether VPNs are providing site-to-site or remote access connection
C : Securing the network from bots and malwares
D : Levels of security provided for sending and receiving data privately

Securing the network from bots and malwares

Q. 51 What types of protocols are used in VPNs?
A : Application level protocols
B : Tunnelling protocols
C : Network protocols
D : Mailing protocols

Application level protocols

Q. 52 VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
A : TRUE
B : False

TRUE

Q. 53 There are _________ types of VPNs.
A : 3
B : 2
C : 5
D : 4

2

Q. 54 _________ type of VPNs are used for home private and secure connectivity.
A : Remote access VPNs
B : Site-to-site VPNs
C : Peer-to-Peer VPNs
D : Router-to-router VPNs

Remote access VPNs

Q. 55 Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
A : Remote access VPNs
B : Site-to-site VPNs
C : Peer-to-Peer VPNs
D : Country-to-country VPNs

Site-to-site VPNs

Q. 56 Site-to-Site VPN architecture is also known as _________
A : Remote connection based VPNs
B : Peer-to-Peer VPNs
C : Extranet based VPN
D : Country-to-country VPNs

Advertisement

Extranet based VPN

Q. 57 There are ________ types of VPN protocols.
A : 3
B : 4
C : 5
D : 6

6

Q. 58 IPSec is designed to provide security at the _________
A : Transport layer
B : Network layer
C : Application layer
D : Session layer

Network layer

Q. 59 In tunnel mode, IPSec protects the ______
A : Entire IP packet
B : IP header
C : IP payload
D : IP trailer

Entire IP packet

Q. 60 Pretty good privacy (PGP) is used in ______
A : Browser security
B : Email security
C : FTP security
D : WiFi security

Advertisement

Email security

Q. 61 PGP encrypts data by using a block cipher called ______
A : International data encryption algorithm
B : Private data encryption algorithm
C : Internet data encryption algorithm
D : Local data encryption algorithm

International data encryption algorithm

Q. 62 IKE creates SAs for _____.
A : SSL
B : PGP
C : IPSec
D : VP

IPSec

Q. 63 ______ provides either authentication or encryption, or both, for packets at the IP level.
A : AH
B : ESP
C : PGP
D : SSL

Advertisement

ESP

Q. 64 A _______network is used inside an organization.
A : private
B : public
C : semi-private
D : semi-public

private

Q. 65 SSL provides _________.
A : message integrity
B : confidentiality
C : compression
D : all of the above

all of the above

Q. 66 IKE uses _______
A : Oakley
B : SKEME
C : ISAKMP
D : all of the above

Advertisement

all of the above

Q. 67 In ______, there is a single path from the fully trusted authority to any certificate.
A : X509
B : PGP
C : KDC
D : none of the above

X509

Q. 68 A ______ provides privacy for LANs that must communicate through the global Internet.
A : VPP
B : VNP
C : VNN
D : VPN

VPN

Q. 69 _______ uses the idea of certificate trust levels.
A : X509
B : PGP
C : KDC
D : none of the above

PGP

Q. 70 ________ provides privacy, integrity, and authentication in e-mail.
A : IPSec
B : SSL
C : PGP
D : none of the above

Advertisement

PGP

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top