MCQ Ics Upload 1
MCQ Ics Upload 1
Criminal
organizations,
Criminal Black hat
1 Criminal organizations, hackers,
organizations, White Black hat software
hat hackers, malware hackers, malware developers,
Who deploy Malwares to a developers, cyber- developers, cyber-
system or network? terrorists cyber-terrorists terrorists
Anything
It models the distinct from
16 normal usage of the noise is not
network as a assumed to be
What are the characteristics of It doesn’t detect novel noise intrusion
anomaly based IDS? attacks characterization activity
Bypassing a device, or
performing another action, to
21 attack or place malware on a
target network without being
detected. Stateful Inspection Anomaly Detectio Evasion
It models the
32 normal usage
It is programmed of network as
Most are based on to interpret a a noise
What are characteristics of simple pattern certain series of characterizatio
signature based IDS ? matching algorithms packets n
They have to
33 be
programmed
again for every
What are drawbacks of signature They are unable to They suffer from new pattern to
based IDS ? detect novel attacks false alarms be detected
Logs includes Logs are
34 The host operating logins,file opens analysed to
What are characteristics of Host system logs in the and program detect tails of
based IDS ? audit information executions intrusion
Unselective logging
35 of messages may Selective logging
What are drawbacks of the host increase the audit runs the rish of They are very
based IDS ? burdens missed attacks fast to detect
Communication between end
36 systems is encrypted using a key,
often known as temporary key session key line key
both algorithm
39 for performing
encryption and
decryption and
decrypted encrypted
In cryptography, what is cipher? encrypted message message message
Which one of the following
40 algorithm is not used in electronic code diffie-hellman
asymmetric-key cryptography? RSA algorithm book algorithm algorithm
both
transpositional
41 In cryptography, the order of the ciphers and
letters in a message is rearranged substitution
by __________ substitution ciphers ciphers quadratic cipher
A communication is said to be
insecure where data is
57 transmitted in a manner that
allows for interception also
called? attack sniffing ISP
58 Private key
Knapsack problem can be solved Public key cryptosyst cryptosystem Both A and B
59 Examples of hash functions are MD5 SHA-1 Both A and B
60 Which has a key length of 128 bit IDEA Triple-DES Both A and B
Private key algorithm is used for
61 _____ encryption and public key
algorithm is used for _____ Session key, Can be used
encryption. Messages, session key messages for both
Encryption &
62 In public key cryptosystem Decryption
which is kept as public? Decryption keys Encryption keys keys
The Public
Key contains a
special
function which
63 is used to
encrypt the
message and
Assymmetric Encryption: Why A so called "one which can
can a message encrypted with the way function with only be
Public Key only be decrypted Not true, the message back door" is reversed by
with the receiver's appropriate can also be decrypted applyed for the the appropriate
Private Key? with the Public Key. encryption. Private Key.
A scheme in
75 A scheme in which the
which the password is
A scheme in which password is passed through
What is a one-way password the password is XOR jumbled and a PRF, which
file? with a key and stored stored is then stored
76
MAC is a many-to-one mapping one-to-one mappinonto mapping
Which one of the following is
77 not an application hash
functions? Key wrapping One-way passwordIntrusion detect
78 IPSec is designed to provide
security at the _________ Application layer Transport layer Network layer
79 In tunnel mode, IPSec protects
the ______ Entire IP packet IP header IP payload
Encapsulating Internet key
80 Which component is included in Security Payload Exchange
IP security? Authentication Header(ESP) (IKE)
Extensible authentication
81 protocol is authentication
framework frequently used in Wired local area Wired personal
______ network area network Wireless netwo
82 Pretty good privacy (PGP) is
used in ______ WiFi security Browser security Email security
International data Internet data
83 PGP encrypts data by using a Private data encryption encryption
block cipher called ______ encryption algorithm algorithm algorithm
__________ is a set of
conventions & rules set for
90 communicating two or more
devices residing in the same
network? Security policies Protocols Wireless netwo
Hyperlinked
91 Secured Hyper Text Transfer
Hypertexts Transfer Text Transfer Protocol
HTTPS is abbreviated as _______Protocol Secured Protocol Secured
Secure/ Secure/
95 Secure/Multimedia Multipurpose Multimedia
S/MIME is abbreviated as Internet Mailing Internet Mailing Internet Mail
__________________ Extensions Extensions Extensions
Users are able to see a pad-lock
96 icon in the address bar of the
browser when there is _______
connection. HTTP HTTPS SMTP
97 For encrypted
For making data sent over
information move HTTP
Why did SSL certificate require For making security w faster protocol
Secure Folder
98 Secured File Transfer
SFTP is abbreviated as ________ Secure File Transfer P Transfer Protocol Protocol
99 Personal Private
Private Connecting Communication Communicatio
PCT is abbreviated as ________ Technology Technology n Technique
_________ operates in the
100 transport mode or the tunnel
mode. IPSec SSL PGP
101
IKE creates SAs for _____. SSL PGP IPSec
102
______ provides either
authentication or encryption, or
both, for packets at the IP level. AH ESP PGP
103 One security protocol for the e-
mail system is _________. IPSec SSL PGP
Typically, ______ can receive
104 application data from any
application layer protocol, but
the protocol is normally HTTP. SSL TLS either (a) or (b)
Criminal
organization
s, gray hat
hackers, B 1 MARK 1
Malware
developers,
Penetration
testers
A 1 MARK 1
HTML
Injection
D 1 MARK 1
SQL
Injection
Malfunction A 1 MARK 1
ed
B 1 MARK 1
Data overflo
C 1 MARK 1
MAC Spoofi
A 1 MARK 1
System hijac
B 1 MARK 1
Keyloggers
D 1 MARK 1
Keylogger
A 1 MARK 1
Cyber-warfar
Non- A 1 MARK 1
repudiation
D 1 MARK 1
Confidentiali
D 1 MARK 1
All of the me
C 1 MARK 1
Level based
B 1 MARK 1
It detects
based on
signature
Anything
distinct
from the C 1 MARK 1
noise is
assumed to
be intrusion
activity
Packet B 1 MARK 1
Filter
B 1 MARK 1
Pattern
Matching
C 1 MARK 1
Pattern
Matching
A 1 MARK 1
Pattern
Matching
C 1 MARK 1
Session
Splicing
A 1 MARK 1
State
Table
Pattern Matc C 1 MARK 1
B 1 MARK 1
State
Table
State D 1 MARK 1
Table
A 1 MARK 1
State
Table
Intrusion
Detection
B 1 MARK 1
System
(IDS)
B 1 MARK 1
None of the
Anything
distinct
from the A 1 MARK 1
noise is
assumed to
be intrusion
activity
D 1 MARK 1
All of the me
D 1 MARK 1
All of the me
They have
to be
programme A 1 MARK 1
d for new
patterns
B 1 MARK 2
section key
all the
connected B 1 MARK 2
devices to
the network
B 1 MARK 2
N/2
algorithm
for D 1 MARK 2
performing
encryption
and
decryption
B 1 MARK 2
DES algorit
D 1 MARK 2
transposition
A 1 MARK 2
N/2
A 1 MARK 2
byte cipher
resource B 1 MARK 2
reservation
protocol
B 1 MARK 2
to make new
variable A 1 MARK 2
sized byte
string
A 1 MARK 2
12
B 1 MARK 2
SP Networks
Protocol data D 1 MARK 2
A 1 MARK 2
None of the
C 1 MARK 2
unique key
4 B 1 MARK 2
A 1 MARK 2
private key i
B 1 MARK 2
citation
Unique key
cryptosyste A 1 MARK 2
m
None of the C 1 MARK 2
RSA C 1 MARK 2
A 1 MARK 2
None of the
B 1 MARK 2
None of the
The
encrypted
message B 1 MARK 2
contains the
function for
decryption
which
identifies
the Private
Key.
The secret
key is
assymmetri D 1 MARK 2
cally
transmitted,
the message
itself
symmetrical
ly.
B 1 MARK 2
Isn't used
any more.
The key
prevents the
user of
having to
reinstall the
software at C 1 MARK 2
each change
in
technology
or in the
functions
for
encryption.
A 1 MARK 2
Can't say
A 1 MARK 2
C= (148, 132
54 C 1 MARK 2
111 A 1 MARK 2
B
Message
1 MARK 3
Leap
B
1 MARK 3
hash code
A
cryptograph 1 MARK 3
ic codesum
none of the D
1 MARK 3
mentioned
D
A scheme 1 MARK 3
in which the
hash of the
password is
stored
none of the A
1 MARK 3
mentioned
B
Virus 1 MARK 3
Detection
Session C
1 MARK 3
layer
A
1 MARK 3
IP trailer
D
1 MARK 3
All of the me
C
Wired
metropolita 1 MARK 3
n area
network
C
1 MARK 3
FTP security
Local data B
encryption 1 MARK 3
algorithm
A
None of the 1 MARK 3
mentioned
D
1 MARK 3
DNS spoofin
A
1 MARK 3
Botnet proce
Network-
security D 1 MARK 3
protocols
C 1 MARK 3
SFTP
A 1 MARK 3
S/MIME
B 1 MARK 3
Network algorithms
Hyper Text
Transfer D 1 MARK 3
Protocol
Secure
confidential
ity and A 1 MARK 3
integrity
MAC
(Machine B 1 MARK 3
Access
Code)
A 1 MARK 3
S/MIME
Secure/
Multipurpos
e Internet D 1 MARK 3
Mail
Extensions
B 1 MARK 3
SFTP
For sending
and C 1 MARK 3
receiving
emails
unencrypted
Secure File
Transferrin A 1 MARK 3
g Protocol
Private
Communica D 1 MARK 3
tion
Technology
B 1 MARK 3
SSL
none of the C 1 MARK 3
above
D 1 MARK 3
both (a) and
5 C 1 MARK 3