Information Security MCQs
Information Security MCQs
a) Sender
b) Both
c) Receiver
d) None
cipher
b) Both
c) Transposition cipher
d) None
d) None
b) 3
c) 2 or 3
d) 3 or 4
d) Both and c
25) Which of the following uses the confusion and diffusion concept?
a) Block Cipher
c). None
d). Both.
a) 12
b) 14
c) 16
d) 18
27) _______ is the practice and precautions taken to protect valuable information from
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
28) From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
a) 6 b) 7 c) 8 d) 10
a) Hacked
b) steal
c) alter
d) Show
36) Release of MSG content is type of ----- attack
a) Active
b) Passive
c)security attack
d) Virus attack
a) Moderate security
b) Less security
c) More security
a) NIST
b) IBM
c)SiNT
d) FIPS
a) Shift rows
c) Decryption process
d)Mix column
a) 192 bits
b) 128 bits
c) 186 bits
d) 256 bits
41) Which is not part of social engineering attack?
a) Investing
b) Hooking
c) Attacking
d) Snapping
a) Physical access
b) Virtual access
c) N/w access
d)none
b)Stateful Inspection
c) H/w forewall
d) Packet filtering
b) Encrypted message
c)Corrupted message
d)Plain message
a)Complex
b)Easy
c)Simple
d)Tough
a)Encryption algo
c)Encryption standard
d)All of above
a)Confidentiality
b)Integrity
c)Authentication
d)Non repudiation
c) Steganography
d) None
a) En(x)=(x-n) mod 2b
b) En(x)=(x*n) mod 2b
c) En(x)=(x÷n) mod 2b
d) En(x)=(x+n) mod 2b
50) Play fair cipher scheme was invented in
a) 1858
b) 1854
c) 1856
d) 1852