10000+ Cyber Security MCQ Questions and Answers Pdf - 1

Question: 1

A(n) _____ can be used to preserve the integrity of a document or a message.

(A) message confidentiality

(B) message summary

(C) message digest

(D) none of these

Ans: C

message digest

Question: 2

The physical form of money is converted into

(A) binary form

(B) decimal

(C) hexadecimal

(D) octal form

Ans: A

binary form

Question: 3

Conventional encryption also referred to as

(A) secret key encryption

(B) single key encryption

(C) symmetric encryption

(D) all of these

Ans: B

single key encryption

Question: 4

Protocols refers to

(A) rules and methods

(B) methods

(C) rules

(D) none of these

Ans: A

rules and methods

Question: 5

In asymmetric key cryptography, the private key us kept by

(A) sender and receiver

(B) sender

(C) receiver

(D) all the connected devices to the network

Ans: C

receiver

Related Questions
Read More Engineering Topics