Which of the following is not a fundamental security goal?
assurance
confidentiality
all of the statements are correct
integrity
availability
A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
Trojan Horse
Virus
Logic Bomb
OPSEC
Worm
A(n) ____ is one that encrypts a digital data stream one bit or one byte at a time
stream cipher
symmetric cipher
none of the statements
asymmetric cipher
block cipher
A pair of keys that have been selected so that if one is used for encryption the other is used for decryption in public key cryptosystem
public and private keys
public and cipher keys
encryption and decryption keys
plain and cipher keys
Free from mistake or error and having the value that the end-user expects
Accuracy
Authenticity
Confidentiality
Availability
Authentication
Which of these is possibly the worst password that user can choose
Nursulatan1612
k@zaKh
a$tana8567
aLm4tyc?TY
What is plaintext?
the original intelligible message or data that is fed into the algorithm as input
the original intelligible message or data that is produced as output
the scrambled message produced as output
the scrambled message or data that is fed into the algorithm as output
Which of the following statement is not true?
The public key is kept secret while the private key may be widely distributed
Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys
The public key and private key are mathematically related
The private key cannot be practically derived from the public
Asymmetric cryptography is also known as public key cryptography
A function that is easily computed and the calculation of its inverse is infeasible unless certain privileged information is known
Trapdoor one-way function
Logical Bomb
What is encryption algorithm
performs various substitutions and transformations on the plaintext
it takes the ciphertext and the secret key and produces the original plaintext
performs various substitutions and transformations on the ciphertext
random stream of data and, as it stands, is unintelligible
Which of the statement is property for p and q
p and q are prime
p is greater than q
p and q should be of similar bit length
p and q are distinct
p - q -1
DMZ what is one advantage of setting up a DMZ with two firewalls
you can control where traffic goes in the three networks
you can do stateful packet filtering
you can do load balancing
improved network performance
all of the statements
Program that can replicate itself and send copies from computer to computer across network connections. usually performs some unwanted function
worm
trojan house
virus
logical bomb
opsec
In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of p and q?
p = 5, q = 7
p = 1, q = 35
p = q = e =5
p = 6, q = 8
p = q = n = 35
Encrypt the message WELCOME! Using Caesar cipher with the key = 34’
Which of the following is form of malware
rootkits
viruses
worms
scripts
Which of the following is not true?
A user must protect his/her public key
A user does not have to protect his/her public key
A user will have his/her own public key
A user will have his/her own private key
A user must remember his/her password that encrypts the public key
Which of these statements is true
In symmetric key cryptography the key that is used to encrypt data is the same key that is used to decrypt it
The encryption algorithm performs its steps using the key to alter the ciphertext and convert it to plaintext
The term "key" comes from the fact that the password you can choose works in the same way that a conventional key works
In cryptography, to protect the contents of your files, you can install a lock on your door
The decryption algorithm performs its steps using the key to alter the plaintext and convert it to ciphertext
The _________ is a number or a set of numbers on which the cipher operates
key
plaintext
cipher
secret
ciphertext
embedded in a computer program that checks for a certain set of conditions to be present on the system. When these conditions are met, it executes some function resulting in unauthorized actions
Logic bomb
Trojan House
The quality of state of having ownership or control of some object or item
possession
utility
authentication
Which one of the statement is a formula to find plain in RSA
M = c^d(mod n)
M = c^n(mod d)
M = c^e(mod n)
M = c^e(mod d)
M = c^n(mod e)
One objective of cryptography is property of being accessible and usable upon demand by an authorized entity
denial of service
reliability
The vigenere cipher is which of the following types
polyalphabetic
monoalphabetic
asymmetric
diaplhabetic
The word asymmetric in public key cryptography means
The key to encrypt is different to the key to decrypt
The algorithm to encrypt is different from the algorithm to decrypt
None of the listed answers
The key to encrypt is the same with the key to decrypt
The algorithm to encrypt is the same with the algorithm to decrypt
A _________ cipher replaces one character with another character.
Substitution
Transposition
Reversing
Cultivation
Multiplication
Which one of the statement is a formula to find cipher in RSA
C =m^e(mod n)
C =m^n(mod d)
C =m^d(mod n)
C =m^n(mod e)
C =m^e(mod d)
In the rsa key the public key of a given user is e=31, n=3599. What is the value of p and q
P= 61, Q= 59
P= 1, Q= 3599
P= Q = N= 3599
P= Q= E = 31
P= 62, Q= 60
Find d using rsa algorithm, if p = 5, q= 11, e = 3; M = 9
In a public – key system using rsa you intercept the ciphertext C = 10 sent to a user whose public key is e = 5 ; n = 35 what is the fi(n)?
Which of the following statement is properties of public key encryption
the sender and receiver must each have one of the matched pair of keys(not the same one)
one algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption
one of the two keys must be kept secret
the sender and receiver must share the algorithm and the key
the same algorithm with the same key is used for encryption and decryption
If a wrong key is entered to decrypt a message what will happen
The output will be gibberish
The output will not be visible
There is an error message
The cryptosystem will stop working
Nothing will happen
A ___ - level proxy inspects the entire packet and makes access decisions based on the contents of the packet
Application
Physical
Server
Proxy
Circuit
One objective of cryptography is keeping information secret from all but those who are authorised to see it. The term referring to this is:
Secrecy
Witnessing
Authorisation
Anonymity
One of the keys used in an asymmetric encryption system. The public key is made public to be used in conjunction with a corresponding private key
A program that secretly takes over another internet attached computer and then uses that computer to lunch attacks that are difficult to trace to the creator
Zombie
According to DAD triad, _______ attempts to defeat availability
Destruction
Disclosure
Alteration
The process of verifying and identify claimed by or for a system entity
Timestamping
Confirmation
Processing
Validation
______ is a form of cryptosystem in which encryption and decryption are performed using two different keys one a public key and one a private key
Asymmetric encryption
Symmetric encryption
Synchronous encryption
None of the statements
Asynchronous encryption
One objective of cryptography is conveyance, to another entity, of official sanction to do or be something. The term referring to this is:
Entity authentication
Certificate
If the encrypted message is XBPG and deciphered text is QUIZ using the Caesar cipher, what is the value of key
A pair of key that have been selected so that if one is used for encryption, the other is used for decryption in Public-key cryptosystem
Set of hacker tools after attacker has broken into a computer system and gained root-level access
root-level hack
assets
zombie
Which of the following statement is ingredients for a public key encryption scheme
encryption/decryption algorithm
public/private keys
In a public-key system using RSA you intercept the ciphertext C = 10 sent to a user whose public key is e = 5; n = 35. What is the value of p and q?
P=5; q=7
P=6; q=8
P=q=e=5
P=1; q=35
p = q= n = 35
which of the following statement is not true
the public key can be used to derive the private key
the foundation of public-key algorithm is a one way function
all of the listed answers are true
the private key operates as a trap door that allows the owner to recover the original data
reversing the process of encryption is virtually impossible without the private key
Consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security
virtual private network
demilitarized zone
anti-spoofing
firewalls
network address translation
you can use _________ to protect your computer from outsiders
antivirus software and personal firewall programs
system restore and antivirus software
personal firewall programs and system restore
antivirus software and the Recycle Bin
firewall programs and the Recycle Bin
One objective of cryptography is ensuring information has not been altered by unauthorised or unknown means. The term referring to this is:
data integrity
message authentication
confirmation
authorisation
validation
encrypt the message WELCOME! Using Caesar cipher with the key = 5
A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption
One key encryption
Private key encryption
Same key encryption
In a public key system using RSA you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n =35. What will be the fi(n)?
A secret data value usually a character string that’s used as authentication information
password
secret key
DMZ
code embedded within a program that causes a copy of itself to be inserted in one of more other programs. Usually performs some unwanted function
firewall
In public-key system using rsa, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M
Secret undocumented entry point into a program, used to grant access without normal methods of access authentication
Trapdoor
One objective of cryptography is identifying and acknowledging the identity of entity. The term referring to this is:
identification
witnessing
Decipher the ciphertext QMHXIVQ using Caesar Cipher with the key = 4
Weakness of a system that could be accidentally or intentionally exploited to damage assets
Vulnerabilities
Risk
Treats
Assets
Some _____ firewalls are able to examine the contents of packets as well as the headers for signs that they ate legitimate.
Stateful
Personal
Stateless
Boundary
provides a user with protection against discovery and misuse of his or her identity by other users
privacy
misuse
ptotection
Use the playfair cipher with the keyword “PLAYFAIR” to encrypt the message “GOTO”
In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of d?
Base elements of information such as numbers, letters, symbols and so on which are processed or carried out by human (or by some machine)
Data
Context
Bytes
Information
Bits
What does firewall do
Protects your computer from internet intrusion
Restores lost data on your computer
Checks floppy or CDs for corrupted files
Scans for viruses on your system
Protects against power surges
Perform decryption using the rsa algorithm if p = 5; q = 11, e = 3; c =14
Which of the statement is true
The larger the key size the greater the range of possible values a key can be
The larger the key size the smaller the range of possible values a key can be
The larger the key size the range of possible values a key can be remains the same
The smaller the key size the greater the range of possible values a key can be
The smaller the key size the range of possible values a key can be remains the same
What of the following statements is true
Public key algorithms are slow compared to symmetric cryptography
Public key algorithms are used to hash the password
Public key algorithms are used to encrypt the message
Public key algorithms are used to encrypt the key encryption key
what is decryption algorithm
takes the ciphertext and the secret key and produces the original plaintext
none of the statements are true
A stateful firewall maintains a ______ , which is a list of active connections
State table
Connection table
Hub table
Routing table
Bridging table
Possibility of an incident or attack to cause damage to your enterprise
Security
Malware
According to dad triad, _______ attempts to defeat confidentiality
disclosure
alteration
destruction
Find d using rsa algorithm, if p = 3, q= 11, e = 7; M = 5
According to dad triad, _______ attempts to defeat integrity
One objective of cryptography is prevention of authorized access to resources or the delaying of time-critical operations
Denial of service
Reliability
A public key encryption algorithm based on exponentiation in modular arithmetic. It is the only algorithm generally accepted as practical and secure for public key encryption
RSA
Caesar cipher
Playfair Cipher
Vigenere Cipher
Hill Cipher
Which of the following statements are types of firewalls?
Application level gateways
Packet – filtering
Circuit-level gateways
Session-level gateways
Internet-level gateways
What will be the value of key in Caesar Cipher if initially key = 65
The key used in a symmetric encryption system. Both participants must share the same key and this key must remain secret to protect communication
Secret key
Symmetric key
Public key
Private key
Asymmetric key
if you encrypt a ciphertext using right key, you will get
gibberish
error message
Which one of the statement is equation for fi(n)?
Fi(n) = (p-1)(q-1)
Fi(n) = (p-1)(q)
Fi(n) = (p-q)(q-1)
Fi(n) = pq
Fi(n) = (p)(q-1)
Which of the following statement(s) is(are) the Security Principles
All of the statements
Separation of privileges
Least privilege
Defense in depth
Security through obscurity (the inadvisability thereof)
In a public key system using RSA you intercept the plaintext M=25 sent to user whose public key is e = 5; n =35. What will be the ciphertext C?
The Caesar cipher is a _______ cipher that has a key of 3
Shift
Additive
Subtractive
Multiplicative
One of the two keys used on an asymmetric encryption system. For secure communication, the private key should only be known to its creator
Which of these is not considered as a symmetric key algorithm
rsa
playfair cipher
hill cipher
caesar cipher
vigenere cipher
The quality of state of being genuine or original rather than a reproduction or fabrication
Perform encryption using the rsa algorithm if p = 3 q= 11 e = 7 M = 5
A process of identifying, analysing and controlling critical information
Firewall
Scanning
Anti-virus
____ is another term for a packet of digital information
datagram
data
bits
header
footer
________ is the science and art of transforming messages to make them secure and immune to attacks
Cryptography
Cryptosystem
Cryptoanalysis
Which of the statement(s) is(are) properties for p an q
p an q are prime
p an q are distinct
p = q -1
The translation of encrypted text or data (called ciphertext) into original text or data (called plaintext). Also called deciphering
A combination of an encryption algorithm and decryption is called a _____
Cipher
Key
Polyalphabetic cipher
Secret