πŸ“Š Information Cyber Security
Q. In asymmetric key cryptography, the private key is kept by
  • (A) sender
  • (B) receiver
  • (C) sender and receiver
  • (D) all the connected devices to the network
πŸ’¬ Discuss
βœ… Correct Answer: (B) receiver
πŸ“Š Information Cyber Security
Q. ATM pin while withdrawing money is an example of using:
  • (A) authentication
  • (B) authorization
  • (C) access control
  • (D) auditing
πŸ’¬ Discuss
βœ… Correct Answer: (A) authentication
πŸ“Š Information Cyber Security
Q. Assurance that authentic user is taking part in communication is:
  • (A) authentication
  • (B) authorization
  • (C) access control
  • (D) auditing
πŸ’¬ Discuss
βœ… Correct Answer: (A) authentication
πŸ“Š Information Cyber Security
Q. A process of making the encrypted text readable again.
  • (A) decryption
  • (B) encryption
  • (C) network security
  • (D) information hiding
πŸ’¬ Discuss
βœ… Correct Answer: (A) decryption
πŸ“Š Information Cyber Security
Q. Modification of Data is done in:
  • (A) both active and passive attacks
  • (B) neither active and passive attacks
  • (C) active attacks
  • (D) passive attacks
πŸ’¬ Discuss
βœ… Correct Answer: (A) both active and passive attacks
πŸ“Š Information Cyber Security
Q. Which is the type of attack when Network is made unavailable for user
  • (A) masquerade
  • (B) replay
  • (C) modification
  • (D) denial of service
πŸ’¬ Discuss
βœ… Correct Answer: (D) denial of service
πŸ“Š Information Cyber Security
Q. When original data is changed to make it non-meaningful by attacker it is known as
  • (A) masquerade
  • (B) replay
  • (C) modification of messages
  • (D) traffic analysis
πŸ’¬ Discuss
βœ… Correct Answer: (C) modification of messages
πŸ“Š Information Cyber Security
Q. attack is when original data is modified and malicious data is inserted
  • (A) masquerade
  • (B) replay(rewrite)
  • (C) modification
  • (D) traffic analysis
πŸ’¬ Discuss
βœ… Correct Answer: (B) replay(rewrite)
πŸ“Š Information Cyber Security
Q. Release of Message Content and Traffic analysis are type of :
  • (A) both active and passive attacks
  • (B) neither active and passive attacks
  • (C) active attacks
  • (D) passive attacks
πŸ’¬ Discuss
βœ… Correct Answer: (D) passive attacks