πŸ“Š Information Cyber Security
Q. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
  • (A) 216
  • (B) 232
  • (C) 214
  • (D) 212
πŸ’¬ Discuss
βœ… Correct Answer: (C) 214
πŸ“Š Information Cyber Security
Q. Which one of the following is not a higher –layer SSL protocol?
  • (A) alert protocol
  • (B) handshake protocol
  • (C) alarm protocol
  • (D) change cipher spec protocol
πŸ’¬ Discuss
βœ… Correct Answer: (C) alarm protocol
πŸ“Š Information Cyber Security
Q. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
  • (A) true
  • (B) false
  • (C) ---
  • (D) ---
πŸ’¬ Discuss
βœ… Correct Answer: (B) false
πŸ“Š Information Cyber Security
Q. In the above figure, which of the above shaded block is transparent to end users and applications?
  • (A) ip/ipsec
  • (B) ssl
  • (C) kerberos
  • (D) s/mime
πŸ’¬ Discuss
βœ… Correct Answer: (A) ip/ipsec
πŸ“Š Information Cyber Security
Q. In the above figure from left to right, the correct order of the shaded levels are
  • (A) network level, application level, transport level
  • (B) application level, network level, transport level
  • (C) transport level, application level, network level
  • (D) network level, transport level, application level
πŸ’¬ Discuss
βœ… Correct Answer: (D) network level, transport level, application level
πŸ“Š Information Cyber Security
Q. Cryptographic hash function takes an arbitrary block of data and returns _________
  • (A) fixed size bit string
  • (B) variable size bit string
  • (C) both fixed size bit string and variable size bit string
  • (D) variable sized byte string
πŸ’¬ Discuss
βœ… Correct Answer: (A) fixed size bit string
πŸ“Š Information Cyber Security
Q. ElGamal encryption system is __________
  • (A) symmetric key encryption algorithm
  • (B) asymmetric key encryption algorithm
  • (C) not an encryption algorithm
  • (D) block cipher method
πŸ’¬ Discuss
βœ… Correct Answer: (B) asymmetric key encryption algorithm
πŸ“Š Information Cyber Security
Q. Voice privacy in GSM cellular telephone protocol is provided by _______
  • (A) a5/2 cipher
  • (B) b5/4 cipher
  • (C) b5/6 cipher
  • (D) b5/8 cipher
πŸ’¬ Discuss
βœ… Correct Answer: (A) a5/2 cipher
πŸ“Š Information Cyber Security
Q. Which one of the following is a cryptographic protocol used to secure HTTP connection?
  • (A) stream control transmission protocol (sctp)
  • (B) transport layer security (tls)
  • (C) explicit congestion notification (ecn)
  • (D) resource reservation protocol
πŸ’¬ Discuss
βœ… Correct Answer: (B) transport layer security (tls)
πŸ“Š Information Cyber Security
Q. Cryptanalysis is used __________
  • (A) to find some insecurity in a cryptographic scheme
  • (B) to increase the speed
  • (C) to encrypt the data
  • (D) to make new ciphers
πŸ’¬ Discuss
βœ… Correct Answer: (A) to find some insecurity in a cryptographic scheme