Information Cyber Security MCQs
R
Q 1. In asymmetric key cryptography, the private key is kept by
P
Q 2. ATM pin while withdrawing money is an example of using:
G
Q 3. Assurance that authentic user is taking part in communication is:
R
Q 4. A process of making the encrypted text readable again.
V
Q 5. Modification of Data is done in:
R
Q 6. Which is the type of attack when Network is made unavailable for user
P
Q 7. When original data is changed to make it non-meaningful by attacker it is known as
S
Q 8. attack is when original data is modified and malicious data is inserted
V
Q 9. means when an attacker pretends to be authentic user
V