Home / Engineering / Information Cyber Security (ICS) MCQs / Page 1

Information Cyber Security (ICS) MCQs | Page - 1

Dear candidates you will find MCQ questions of Information Cyber Security (ICS) here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.17K Points
Coach

Q. 1) In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

(A) transport
(B) tunnel
(C) either (a) or (b)
(D) neither (a) nor (b)
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 2) An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL

(A) 40; 80
(B) 60; 620
(C) 80; 443
(D) 620; 80
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 3) What port does Telnet use?

(A) 22
(B) 80
(C) 20
(D) 23
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 4) A digital Signature is

(A) a bit string giving identity of a correspondent
(B) a unique identification of a sender
(C) an authentication of an electronic record by trying it uniquely to a key only a sender knows
(D) an encrypted signature of sender
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 5) A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.

(A) vnp
(B) vpn
(C) vsn
(D) vspn
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 6) ______uses the idea of certificate trust levels

(A) x509
(B) pgp
(C) kdc
(D) none of them
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 7) A digital signature needs a

(A) private-key system
(B) shared-key system
(C) public-key system
(D) all of them
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 8) Pretty good privacy (PGP) is used in ______

(A) browser security
(B) email security
(C) ftp security
(D) wifi security
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 9) What is necessary for a cross-site script attack with cookies to be thwarted

(A) captchas
(B) virtual machines
(C) proxies
(D) firewalls
View Answer Discuss Share

M

Mr. Dubey • 51.17K Points
Coach

Q. 10) The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

(A) transport
(B) tunnel
(C) either (a) or (b)
(D) neither (a) nor (b)
View Answer Discuss Share