Information and Cyber Security mcq sppu | ICS mcq sppu

cyber security mcq questions and answers, cyber security mcq questions and answers pdf download, information and cyber security mcq questions and answers, information security mcqs, information security mcqs and answers, information security mcqs with answers pdf

Below are the most important Information and Cyber Security mcq question and answers. We are planning to provide you ics mcq pdf along with the ICS mcq with answers. These are 60+ mcqs covering cyber security in the field of computer engineering (CSE). Preparing these information and cyber security multiple choice questions will surely help you to crack cyber security exams and interviews.

Information and Cyber Security mcq sppu

Q. _____ Moinitor User activity at on Internet and transmit it to someone else at background
A : Malware
B : Spyware
C : addware
D : worm

Advertisement

Spyware

Q. Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
A : Local networking
B : Social engineering
C : Physical entry
D : Remote networking

Advertisement

Local networking

Q. _______is purpose of a Denial of Service attack
A : Exploit a weakness in the TCP/IP stack
B : To execute a Trojan on a system
C : To overload a system so it is no longer operational
D : To shutdown services by turning them off

To overload a system so it is no longer operational

Q. Sniffing is used to perform ______________ fingerprinting.
A : Passive attack
B : Active attack
C : Passive banner grabbing
D : Scanned

Advertisement

Passive attack

Q. Phishing is a form of ____________________.
A : Spamming
B : Identify Theft
C : Impersonation
D : Scanning

Impersonation

Q. hybrid attacks is ______
A : An attempt to crack passwords using words that can be found in dictionary.
B : An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols.
C : An attempt to crack passwords using a combination of characters, numbers, and symbols
D : An attempt to crack passwords by replacing characters with numbers and symbols.

Advertisement

An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols.

Q. What is the best statement for taking advantage of a weakness in the security of an IT system?
A : Threat
B : Attack
C : Exploit
D : Vulnerability

Exploit

Q. _______ means to prove access the system’s resources
A : Message authentication
B : Entity authentication
C : Message confidentiality
D : Nonrepudiation

Advertisement

Entity authentication

Q. The full form of Malware is ________
A : Malfunctioned Software
B : Multipurpose Software
C : Malicious Software
D : Malfunctioning of Security

Malicious Software

Q. When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.
A : Database crash attack
B : DoS (Denial of Service) attack
C : Data overflow Attack
D : Buffer Overflow attack

Advertisement

Buffer Overflow attack

Q. This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?
A : Confidentiality
B : Non-repudiation
C : CIA Triad
D : Authenticity

CIA Triad

Cyber Security mcq questions and answers

Q. In general how many key elements constitute the entire security structure?
A : 1
B : 2
C : 3
D : 4

Advertisement

4

Q. When you use the word _____ it means you are protecting your data from getting disclosed.
A : Confidentiality
B : Integrity
C : Availability
D : Authenticity

Confidentiality

Q. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
A : They help understanding hacking better
B : They are key elements to a security breach
C : They help understands security and its components better
D : They help to understand the cyber-crime better

Advertisement

They help understands security and its components better

Q. This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?
A : SQL injection
B : HTML Injection
C : Cross Site Scripting (XSS)
D : Cross Site Request Forgery (XSRF)

Cross Site Scripting (XSS)

Q. Which of them is not a wireless attack?
A : Eavesdropping
B : MAC Spoofing
C : Wireless Hijacking
D : Phishing

Advertisement

Phishing

Q. Which method of hacking will record all your keystrokes?
A : Keyhijacking
B : Keyjacking
C : Keylogging
D : Keyboard monitoring

Keylogging

Q. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium
A : Malware
B : Remote Access Trojans
C : Keyloggers
D : Spyware

Spyware

Q. In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?
A : Scanning
B : Maintaining control
C : Maintaining access
D : Gaining access

Maintaining access

Q. Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
A : Rootkits
B : Backdoors
C : Trojans
D : Wireshark

Advertisement

Wireshark

Q. DES follows
A : Hash Algorithm
B : Caesars Cipher
C : Feistel Cipher Structure
D : SP Networks

Feistel Cipher Structure

Q. The DES algorithm has a key length of
A : 128 Bits
B : 32 Bits
C : 64 Bits
D : 16 Bits

64 Bits

Q. Use Caesar’s Cipher to decipher the following “HQFUBSWHG WHAW”
A : ABANDONED LOCK
B : ENCRYPTED TEXT
C : ABANDONED TEXT
D : ENCRYPTED LOCK

ABANDONED TEXT

Q. How many keys does the Triple DES algorithm use?
A : 2
B : 3
C : 2 or 3
D : 3 or 4

Advertisement

2 or 3

Q. In asymmetric key cryptography, the private key is kept by __________
A : sender
B : receiver
C : sender and receiver
D : all the connected devices to the network

receiver

Q. In cryptography, the order of the letters in a message is rearranged by __________
A : transpositional ciphers
B : substitution ciphers
C : both transpositional ciphers and substitution ciphers
D : quadratic ciphers

transpositional ciphers

Q. _____ Data Encryption Standard (DES) operating modes can be used for large messages with the assurance that an error early in the encryption/decryption process won’t spoil results throughout the communication?
A : Cipher Block Chaining (CBC)
B : Electronic Codebook (ECB)
C : Cipher Feedback (CFB)
D : Output Feedback (OFB)

Output Feedback (OFB)

Q. Which of the following is not a type of poly alphabetic cipher?
A : Auto key cipher
B : Hill cipher
C : Playfair cipher
D : Additive cipher

Advertisement

Additive cipher

Q. Which attack is very efficient against Double-DES?
A : meet-in-the-middle
B : Linear cryptanalysis
C : Differential cryptanalysis
D : Statistical cryptanalysis

meet-in-the-middle

Q. The principle of the encryption using a key is ______
A : The key indicates which funcion is used for encryption. Thereby it is more difficult to decrypt a intercepted message as the function is unknown.
B : The key contains the secret function for encryption including parameters. Only a password can activate the key.
C : All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption.
D : The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption.

All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption.

Q. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.
A : 23
B : 46
C : 11
D : 54

11

Q. The sub key length at each round of DES is__________
A : 32
B : 56
C : 48
D : 96

Advertisement

56

Q. Differential Cryptanalysis can be mounted on
A : DES encryption algorithm
B : AES encryption algorithm
C : RSA encryption algorithm
D : Deffie-Hellman key exchange algorithm

DES encryption algorithm

Q. Which of the following is not a block cipher operating mode?
A : ECB
B : CFB
C : CBF
D : CBC

CBF

Q. For the AES-128 algorithm there are __________ similar rounds and _________ round is different.
A : 2 pair of 5 similar rounds ; every alternate
B : 9 ; the last
C : 8 ; the first and last
D : 10 ; no

9 ; the last

Q. AES uses a ____________ bit block size and a key size of __________ bits.
A : 128; 128 or 256
B : 64; 128 or 192
C : 256; 128, 192, or 256
D : 128; 128, 192, or 256

Advertisement

128; 128, 192, or 256

Q. How many rounds does the AES-192 perform?
A : 10
B : 12
C : 14
D : 16

12

Q. On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?
A : f function
B : permutation p
C : swapping of halves
D : XOR of subkey with function f

swapping of halves

Q. Which of the following modes does not implement chaining or “dependency on previous stage computations”?
A : CTR, ECB
B : CTR, CFB
C : CFB, OFB
D : ECB, OFB

CTR, ECB

Information and Cyber Security multiple choice questions

Q. What is the length of the cryptographic key used in the Data Encryption Standard (DES) cryptosystem?
A : 56 bits
B : 128 bits
C : 192 bits
D : 256 bits

Advertisement

56 bits

Q. In the 1940s, a team of cryptanalysts from the United States successfully broke a Soviet code based upon a one-time pad in a project known as VENONA. What rule did the Soviets break that caused this failure?
A : Key values must be random
B : Key values must be the same length as the message.
C : Key values must be used only once.
D : Key values must be protected from physical disclosure

Key values must be random

Q. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text.
A : 88
B : 122
C : 143
D : 111

88

Q. In which way does the Combined Encryption combine symmetric and assymmetric encryption?
A : First, the message is encrypted with symmetric encryption and afterwards it is encrypted assymmetrically together with the key.
B : The secret key is symmetrically transmitted, the message itself assymmetrically.
C : First, the message is encrypted with assymmetric encryption and aferwards it is encrypted symmetrically together with the key.
D : The secret key is assymmetrically transmitted, the message itself symmetrically.

The secret key is assymmetrically transmitted, the message itself symmetrically.

Q. In Singular elliptic curve, the equation x^3+ax+b=0 does ____ roots.
A : does not have three distinct
B : has three distinct
C : has three unique
D : has three distinct unique

Advertisement

does not have three distinct

Q. When a hash function is used to provide message authentication, the hash function value is referred to as
A : Message Field
B : Message Digest
C : Message Score
D : Message Leap

Message Digest

Q. What is a one-way password file?
A : A scheme in which the password is jumbled and stored
B : A scheme in which the password is XOR with a key and stored
C : A scheme in which the hash of the password is stored
D : A scheme in which the password is passed through a PRF, which is then stored

A scheme in which the hash of the password is stored

Q. In RSA, Ф(n) = _______ in terms of p and q.
A : (p)/(q)
B : (p)(q)
C : (p-1)(q-1)
D : (p+1)(q+1)

(p-1)(q-1)

Q. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
A : Fortezza
B : Anonymous Diffie-Hellman
C : Fixed Diffie Hellman
D : RSA

Fixed Diffie Hellman

Q. The RSA signature uses which hash algorithm?
A : MD5
B : SHA-1
C : MD5 and SHA-1
D : Does not use hash algorithm

Advertisement

MD5 and SHA-1

Q. In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user?
A : 3031
B : 2412
C : 2432
D : 1023

3031

Q. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.
A : 23
B : 64
C : 11
D : 54

11

Q. Which of the following are used to generate a message digest by the network security protocols?
A : RSA & DES
B : SHA-1 & DES
C : SHA-1 & MD5
D : MD5 & DES

SHA-1 & MD5

Q. Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
A : Anarkali’s public key
B : Salim’s public key.
C : Salim’s private key.
D : Anarkali’s private key

Anarkali’s public key

Q. The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are:
A : n(n-1) and 2n
B : 2n and ((n(n – 1))/2)
C : ((n(n – 1))/2) and 2n
D : ((n(n – 1))/2) and n

((n(n – 1))/2) and 2n

Q. MD5 is a widely used hash function for producing hash value of
A : 64 bits
B : 128 bits
C : 512 bits
D : 1024 bits

128 bits

Q. Using public key cryptography, X adds a digital signature σ to message M, encrypts <m, σ=””>, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?</m,>
A : Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key
B : Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key
C : Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key
D : Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key

Advertisement

Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key

Q. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
A : S can launch a birthday attack to replace m with a fraudulent message.
B : A third party attacker can launch a birthday attack to replace m with a fraudulent message.
C : R can launch a birthday attack to replace m with a fraudulent message.
D : R can launch a birthday attack

S can launch a birthday attack to replace m with a fraudulent message.

Q. What is the effectiveness of an n-bit hash value?
A : 22n
B : 2n
C : 2-n
D : 2-2n

2-n

Q. Certificate extensions fall into 3 categories. Which one of the following is not a Certificate extensions category?
A : Subject and Issuer attributes
B : Key and Policy information
C : Certification path constraints
D : All of the above are Certificate extensions categories

All of the above are Certificate extensions categories

Q. Which of the following is not an element/field of the X.509 certificates?
A : Issuer Name
B : Serial Modifier
C : Issuer unique
D : Identifier Signature

Serial Modifier

Q. 2 What is the PGP stand for?
A : Permuted Gap Permission
B : Permuted Great Privacy
C : Pretty Good Privacy
D : Permuted Great Permission

Pretty Good Privacy

Q. PGP makes use of which cryptographic algorithm?
A : DES
B : AES
C : RSA
D : Rabin

RSA

Q. Which Authentication Encryption approach is taken by the IPSec protocol?
A : Authentication followed by encryption (A→E)
B : Hashing followed by encryption (H→E)
C : Encryption followed by authentication (E→A)
D : Independently encrypt and authenticate (E + A)

Advertisement

Encryption followed by authentication (E→A)

Q. IPSec is designed to provide security at the _________
A : transport layer
B : network layer
C : application layer
D : presentation layer

network layer

Q. PGP encrypts data by using a block cipher called ____
A : international data encryption algorithm
B : private data encryption algorithm
C : internet data encryption algorithm
D : local data encryption algorithm

international data encryption algorithm

Q. Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.
A : SSL
B : TLS
C : either (a) or (b)
D : none of above

either (a) or (b)

Q. In tunnel mode, IPSec protects the ______
A : Entire IP packet
B : IP header
C : IP payload
D : IP trailer

Entire IP packet

Q. Which of the following field in IPv4 datagram is not related to fragmentation?
A : Flags
B : Offset
C : TOS
D : Identifier

TOS

Q. Which one of the following is not a higher –layer SSL protocol?
A : Alert Protocol
B : Handshake Protoco
C : Alarm Protocol
D : Change Cipher Spec Protocol

Alarm Protocol

Q. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
A : 2^16
B : 2^32
C : 2^14
D : 2^12

Advertisement

2^14

Q. IPsec services are available in ______ Layer.
A : Application
B : Data Link
C : Network
D : Transport

Network

Q. Encapsulating Security Payload (ESP) belongs to which Internet Security Protocol?
A : Secure Socket Layer Protocol
B : Secure IP Protocol
C : Secure Http Protocol
D : Transport Layer Security Protocol

Secure IP Protocol

Q. Suppose that everyone in a group of N people wants to communicate secretly with the N–1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
A : 2N
B : N(N-1)
C : N(N-1)/2
D : (N – 1)2

N(N-1)/2

Q. Which protocol is used to convey SSL related alerts to the peer entity?
A : Alert Protocol
B : Handshake Protocol
C : Upper-Layer Protocol
D : Change Cipher Spec Protocol

Alert Protocol

Q. Which of the statements are not true to classify VPN systems?
A : Protocols used for tunnelling the traffic
B : Whether VPNs are providing site-to-site or remote access connection
C : Securing the network from bots and malwares
D : Levels of security provided for sending and receiving data privately

Securing the network from bots and malwares

Q. The DSS signature uses which hash algorithm?
A : MD5
B : SHA-2
C : SHA-1
D : Does not use hash algorithm

SHA-1

Q. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
A : 42 bytes
B : 32 bytes
C : 36 bytes
D : 48 bytes

36 bytes

Q. Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
A : Remote access VPNs
B : Site-to-site VPNs
C : Peer-to-Peer VPNs
D : Router-to-router VPNs

Remote access VPNs

Q. Why did SSL certificate require in HTTP?
A : For making security weak
B : For making information move faster
C : For encrypted data sent over HTTP protocol
D : For sending and receiving emails unencrypted

Advertisement

For encrypted data sent over HTTP protocol

Q. In SSL, what is used for authenticating a message?
A : MAC (Message Access Code)
B : MAC (Message Authentication Code)
C : MAC (Machine Authentication Code)
D : MAC (Machine Access Code)

MAC (Message Authentication Code)

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top