Internet Connection Sharing (ICS) MCQ Answers - Set 01 - ObjectiveBooks

Internet Connection Sharing (ICS) MCQ Answers - Set 01

Practice Test: Question Set - 01


1. _________ means knowledge obtained from investigation, study, intelligence, new facts.
    (A) Security 
    (B) Data
    (C) Information 
    (D) None of these

2. Conversion of Ciphertext to plain text?
    (A) Encryption
    (B) Decryption
    (C) Simple text
    (D) None of these

3. A digital signature needs ________ system
    (A) Symmetric-key
    (B) Asymmetric-key
    (C) Either (a) or (b)
    (D) Neither (a) nor (b)

4. In the handshake protocol which is the message type first sent between client and server?
    (A) Server_hello
    (B) Client_hello
    (C) Hello_request
    (D) Certificate_request

5. ________is used to create the organization’s overall security program.
    (A) Program policy
    (B) Purpose
    (C) Security
    (D) None of these

6. What types of protocols are used in VPNs?
    (A) Application level protocols 
    (B) Tunneling protocols
    (C) Network protocols 
    (D) Mailing protocols

7. In Symmetric schemes requires both parties to share how many secret key?
    (A) One 
    (B) Two
    (C) Three
    (D) Four

8. IPSec is designed to provide security at the _________
    (A) Transport layer
    (B) Network layer
    (C) Application layer
    (D) Session layer

9. What is the key size allowed in PGP?
    (A) 1024-1056
    (B) 1024-4056
    (C) 1024-4096
    (D) 1024-2048

10. A ________network is used inside an organization.
    (A) Private
    (B) Public
    (C) Semi-private
    (D) Semi-public

11. Protection against Denial by one of these parties in a communication refers to?
    (A) Non-Repudiation
    (B) Data integrity
    (C) Authentication
    (D) None of these

12. _______ uses the idea of certificate trust levels.
    (A) X509
    (B) PGP
    (C) KDC
    (D) None of the above

13. An act of protecting information from unauthorized disclosure to an entity.
    (A) Integrity 
    (B) Arability
    (C) Confidentiality
    (D) None of these

14. Blum Blum Shub Generator is based on which Algorithm?
    (A) Private key
    (B) Public key
    (C) Both (a) & (b)
    (D) None of these

15. ECC encryption system is _________
    (A) Symmetric key encryption algorithm
    (B) Asymmetric key encryption algorithm
    (C) Not an encryption algorithm
    (D) Block cipher method

Show and hide multiple DIV using JavaScript View All Answers

 Next Tests: