0% found this document useful (0 votes)
14 views9 pages

Information Security MCQs

The document consists of a series of multiple-choice questions related to cybersecurity, cryptography, and hacking concepts. It covers topics such as the use of proxy servers, types of cyber threats, cryptographic techniques, and security measures. Each question presents four options, testing knowledge on various aspects of information security.

Uploaded by

hotshoot771
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views9 pages

Information Security MCQs

The document consists of a series of multiple-choice questions related to cybersecurity, cryptography, and hacking concepts. It covers topics such as the use of proxy servers, types of cyber threats, cryptographic techniques, and security measures. Each question presents four options, testing knowledge on various aspects of information security.

Uploaded by

hotshoot771
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

1) Why would a hacker use a proxy server?

a) To create a stronger connection with target


b) To create a ghost server on n/w
c) To hide malicious activity on the n/w
d) To obtain remote access connection
2) To hide information inside a picture , what technology is used?
a) Root-kits
b) Bitmapping
c) Steganography
d) Image Rendering
3) What is sequence of a TCP connection?
a) SYN-ACK-FIN
b) SYN-SYNACK-ACK
c) SYN-ACK
d) SYN-SYN-ACK
4) The phase of hacking is ----
a) Availability
b) Confidentiality
c) Integrity
d) Authentication
5) Phising is a form of ----
a) Impersonation
b) Spamming
c) Identity theft
d) Scanning
6) Which malicious program do not replicate automatically
a) Trojan horse
b) Virus
c) Worm
d) Zombie
7) Key loggers are a form of ----
a) Spyware
b) Shoulder surfing
c) Trojan
d) Social engineering
8) Which of the following class of computer threat.
a) Phising
b) Stalking
c) DOS attacks
d) Soliciting
9) Compromising confidential info comes under
a) Bug
b) Threat
c) Attack
d) Vulnerability
10) Lack of access control policy is a ----
a) Bug
b) Threat
c) Attack
d) Vulnerability
11) Possible threat to any info can not be ---------
a) Reduced
b) Transferred
c) protected
d) Ignored
12) Who is the father of computer security?
a) Charles
b) Robert
c) BoB Thomas
d) August Kerckhoffs
13) Which of the following is a type of cyber security?
a) Cloud security
b) N/W security
c) Application security
d) All of the above
14) Which of the following is not an objective of N/W security?
a) Confidentiality
b) Integrity
c) Availability
d) All of the above
15) Which of the following is not a cyber crime?
a) Denial of service
b) Man in the middle
c) AES
d) Malware
16) Which of the following is a component of Cyber security?
a) Internet of things
b) AI
c) Database
d) Attacks
17) In which years has hacking become a practical crime?
a) 1991 b)1993 c)1970 d)1964
18) 18:- Where did the term “Hacker” originate?
a) MIT b)New York University

c) Harvard University d) Bell’s Lab

19) In asymmetric key cryptography, private key is kept by?

a) Sender

b) Both

c) Receiver

d) None

20) In cryptography, the order of letters in a message is rearranged by ?a) Substitution

cipher

b) Both

c) Transposition cipher

d) None

21) Caesar cipher is an example of?a) Mono alphabetic cipher

b) Poly alphabetic cipher

c) Bi- alphabetic Cipher

d) None

22) Triple DES uses how many keys?a) 2

b) 3

c) 2 or 3

d) 3 or 4

23) Symmetric key cryptography is also called?


a) Private key cryptography

b) Public key cryptography

c) Secret key cryptography

d) Both and c

24) Denial of service is a _______ attack?

a) Active b). Passive

c). Both d). None

25) Which of the following uses the confusion and diffusion concept?

a) Block Cipher

b). Stream Cipher

c). None

d). Both.

26) In DES, we have how many rounds.

a) 12

b) 14

c) 16

d) 18

27) _______ is the practice and precautions taken to protect valuable information from

unauthorized access, recording, disclosure or destruction:

a) Network Security

b) Database Security
c) Information Security

d) Physical Security

28) From the options below, which of them is not a threat to information security?

a) Disaster

b) Eavesdropping

c) Information leakage

d) Unchanged default password

29:- ___________ is not an example of a Block Cipher ?

a) DES b) IDEA c) Cease Cipher d) Two Fish

30:- AES is how much time faster than 3DES?

a) 6 b) 7 c) 8 d) 10

31:- Data masking is also known as _____________?

a) Data obfuscation b) Data copying c) Data breaching d) Data duplicating

32:- Backdoors are known as _____________?

a) Trap doors b) Front doors c) Cover doors d) Back entry

33:- A Cryptosystems is also termed as ___________?

a) Secure systems b) Cipher systems c) Cipher-text d) Secure algo

34:- Firewalls are to perfect against ____________?

a) Virus attacks b) Fire attacks c) Data driven attacks d) Unauthorized attacks

35) Digital signature guarantees that data will not ----

a) Hacked

b) steal

c) alter

d) Show
36) Release of MSG content is type of ----- attack

a) Active

b) Passive

c)security attack

d) Virus attack

37) In fiestel cipher maximum number of rounds will provide

a) Moderate security

b) Less security

c) More security

d) Does not provide security

38) DES is published by -------

a) NIST

b) IBM

c)SiNT

d) FIPS

39) Which AES operation is not considered in last round

a) Shift rows

b) Add round key

c) Decryption process

d)Mix column

40) 12 rounded AES use how much bits?

a) 192 bits

b) 128 bits

c) 186 bits

d) 256 bits
41) Which is not part of social engineering attack?

a) Investing

b) Hooking

c) Attacking

d) Snapping

42) Tailgating is a social engineering attack used to gain ----

a) Physical access

b) Virtual access

c) N/w access

d)none

43) Oldest type of firewall architecture?

a) Circuit level gateways

b)Stateful Inspection

c) H/w forewall

d) Packet filtering

44) Null cipher is used to hide

a) unencrypted secret message

b) Encrypted message

c)Corrupted message

d)Plain message

45)Digital signature is ...... Mathematical process

a)Complex

b)Easy

c)Simple
d)Tough

46) DiffieHelman is ---

a)Encryption algo

b)Key exchange Algo

c)Encryption standard

d)All of above

47) Digital signature don't provide

a)Confidentiality

b)Integrity

c)Authentication

d)Non repudiation

48) Same key is used for encryption and description in

a) Symmetric key cryptography

b) Asymmetric key cryptography

c) Steganography

d) None

49) Caesar cipher works on

a) En(x)=(x-n) mod 2b

b) En(x)=(x*n) mod 2b

c) En(x)=(x÷n) mod 2b

d) En(x)=(x+n) mod 2b
50) Play fair cipher scheme was invented in

a) 1858
b) 1854
c) 1856
d) 1852

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy