Dina  Kim
Quiz von , erstellt am more than 1 year ago

Quiz am CS_InfSec, erstellt von Dina Kim am 26/03/2019.

152
5
0
Keine Merkmale angegeben
Dina  Kim
Erstellt von Dina Kim vor mehr als 5 Jahre
Schließen

CS_InfSec

Frage 1 von 96

1

Which of the following is not a fundamental security goal?

Wähle eine der folgenden:

  • assurance

  • confidentiality

  • all of the statements are correct

  • integrity

  • availability

Erklärung

Frage 2 von 96

1

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

Wähle eine der folgenden:

  • Trojan Horse

  • Virus

  • Logic Bomb

  • OPSEC

  • Worm

Erklärung

Frage 3 von 96

1

A(n) ____ is one that encrypts a digital data stream one bit or one byte at a time

Wähle eine der folgenden:

  • stream cipher

  • symmetric cipher

  • none of the statements

  • asymmetric cipher

  • block cipher

Erklärung

Frage 4 von 96

1

A pair of keys that have been selected so that if one is used for encryption the other is used for decryption in public key cryptosystem

Wähle eine der folgenden:

  • public and private keys

  • public and cipher keys

  • encryption and decryption keys

  • none of the statements

  • plain and cipher keys

Erklärung

Frage 5 von 96

1

Free from mistake or error and having the value that the end-user expects

Wähle eine der folgenden:

  • Accuracy

  • Authenticity

  • Confidentiality

  • Availability

  • Authentication

Erklärung

Frage 6 von 96

1

Which of these is possibly the worst password that user can choose

Wähle eine der folgenden:

  • Nursulatan1612

  • k@zaKh

  • a$tana8567

  • aLm4tyc?TY

  • none of the statements

Erklärung

Frage 7 von 96

1

What is plaintext?

Wähle eine der folgenden:

  • the original intelligible message or data that is fed into the algorithm as input

  • the original intelligible message or data that is produced as output

  • none of the statements

  • the scrambled message produced as output

  • the scrambled message or data that is fed into the algorithm as output

Erklärung

Frage 8 von 96

1

Which of the following statement is not true?

Wähle eine der folgenden:

  • The public key is kept secret while the private key may be widely distributed

  • Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys

  • The public key and private key are mathematically related

  • The private key cannot be practically derived from the public

  • Asymmetric cryptography is also known as public key cryptography

Erklärung

Frage 9 von 96

1

A function that is easily computed and the calculation of its inverse is infeasible unless certain privileged information is known

Wähle eine der folgenden:

  • Trapdoor one-way function

  • Virus

  • Logical Bomb

  • Trojan Horse

  • Worm

Erklärung

Frage 10 von 96

1

What is encryption algorithm

Wähle eine der folgenden:

  • performs various substitutions and transformations on the plaintext

  • it takes the ciphertext and the secret key and produces the original plaintext

  • the scrambled message produced as output

  • performs various substitutions and transformations on the ciphertext

  • random stream of data and, as it stands, is unintelligible

Erklärung

Frage 11 von 96

1

Which of the statement is property for p and q

Wähle eine der folgenden:

  • p and q are prime

  • p is greater than q

  • p and q should be of similar bit length

  • p and q are distinct

  • p - q -1

Erklärung

Frage 12 von 96

1

DMZ what is one advantage of setting up a DMZ with two firewalls

Wähle eine der folgenden:

  • you can control where traffic goes in the three networks

  • you can do stateful packet filtering

  • you can do load balancing

  • improved network performance

  • all of the statements

Erklärung

Frage 13 von 96

1

Program that can replicate itself and send copies from computer to computer across network connections. usually performs some unwanted function

Wähle eine der folgenden:

  • worm

  • trojan house

  • virus

  • logical bomb

  • opsec

Erklärung

Frage 14 von 96

1

In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of p and q?

Wähle eine der folgenden:

  • p = 5, q = 7

  • p = 1, q = 35

  • p = q = e =5

  • p = 6, q = 8

  • p = q = n = 35

Erklärung

Frage 15 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

Encrypt the message WELCOME! Using Caesar cipher with the key = 34’

Erklärung

Frage 16 von 96

1

Which of the following is form of malware

Wähle eine der folgenden:

  • all of the statements are correct

  • rootkits

  • viruses

  • worms

  • scripts

Erklärung

Frage 17 von 96

1

Which of the following is not true?

Wähle eine der folgenden:

  • A user must protect his/her public key

  • A user does not have to protect his/her public key

  • A user will have his/her own public key

  • A user will have his/her own private key

  • A user must remember his/her password that encrypts the public key

Erklärung

Frage 18 von 96

1

Which of these statements is true

Wähle eine der folgenden:

  • In symmetric key cryptography the key that is used to encrypt data is the same key that is used to decrypt it

  • The encryption algorithm performs its steps using the key to alter the ciphertext and convert it to plaintext

  • The term "key" comes from the fact that the password you can choose works in the same way that a conventional key works

  • In cryptography, to protect the contents of your files, you can install a lock on your door

  • The decryption algorithm performs its steps using the key to alter the plaintext and convert it to ciphertext

Erklärung

Frage 19 von 96

1

The _________ is a number or a set of numbers on which the cipher operates

Wähle eine der folgenden:

  • key

  • plaintext

  • cipher

  • secret

  • ciphertext

Erklärung

Frage 20 von 96

1

embedded in a computer program that checks for a certain set of conditions to be present on the system. When these conditions are met, it executes some function resulting in unauthorized actions

Wähle eine der folgenden:

  • Logic bomb

  • Worm

  • OPSEC

  • Trojan House

  • Virus

Erklärung

Frage 21 von 96

1

The quality of state of having ownership or control of some object or item

Wähle eine der folgenden:

  • possession

  • confidentiality

  • integrity

  • utility

  • authentication

Erklärung

Frage 22 von 96

1

Which one of the statement is a formula to find plain in RSA

Wähle eine der folgenden:

  • M = c^d(mod n)

  • M = c^n(mod d)

  • M = c^e(mod n)

  • M = c^e(mod d)

  • M = c^n(mod e)

Erklärung

Frage 23 von 96

1

One objective of cryptography is property of being accessible and usable upon demand by an authorized entity

Wähle eine der folgenden:

  • availability

  • denial of service

  • confidentiality

  • reliability

  • authentication

Erklärung

Frage 24 von 96

1

The vigenere cipher is which of the following types

Wähle eine der folgenden:

  • polyalphabetic

  • monoalphabetic

  • none of the statements

  • asymmetric

  • diaplhabetic

Erklärung

Frage 25 von 96

1

The word asymmetric in public key cryptography means

Wähle eine der folgenden:

  • The key to encrypt is different to the key to decrypt

  • The algorithm to encrypt is different from the algorithm to decrypt

  • None of the listed answers

  • The key to encrypt is the same with the key to decrypt

  • The algorithm to encrypt is the same with the algorithm to decrypt

Erklärung

Frage 26 von 96

1

A _________ cipher replaces one character with another character.

Wähle eine der folgenden:

  • Substitution

  • Transposition

  • Reversing

  • Cultivation

  • Multiplication

Erklärung

Frage 27 von 96

1

Which one of the statement is a formula to find cipher in RSA

Wähle eine der folgenden:

  • C =m^e(mod n)

  • C =m^n(mod d)

  • C =m^d(mod n)

  • C =m^n(mod e)

  • C =m^e(mod d)

Erklärung

Frage 28 von 96

1

In the rsa key the public key of a given user is e=31, n=3599. What is the value of p and q

Wähle eine der folgenden:

  • P= 61, Q= 59

  • P= 1, Q= 3599

  • P= Q = N= 3599

  • P= Q= E = 31

  • P= 62, Q= 60

Erklärung

Frage 29 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

Find d using rsa algorithm, if p = 5, q= 11, e = 3; M = 9

Erklärung

Frage 30 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

In a public – key system using rsa you intercept the ciphertext C = 10 sent to a user whose public key is e = 5 ; n = 35 what is the fi(n)?

Erklärung

Frage 31 von 96

1

Which of the following statement is properties of public key encryption

Wähle eine der folgenden:

  • the sender and receiver must each have one of the matched pair of keys(not the same one)

  • one algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption

  • one of the two keys must be kept secret

  • the sender and receiver must share the algorithm and the key

  • the same algorithm with the same key is used for encryption and decryption

Erklärung

Frage 32 von 96

1

If a wrong key is entered to decrypt a message what will happen

Wähle eine der folgenden:

  • The output will be gibberish

  • The output will not be visible

  • There is an error message

  • The cryptosystem will stop working

  • Nothing will happen

Erklärung

Frage 33 von 96

1

A ___ - level proxy inspects the entire packet and makes access decisions based on the contents of the packet

Wähle eine der folgenden:

  • Application

  • Physical

  • Server

  • Proxy

  • Circuit

Erklärung

Frage 34 von 96

1

One objective of cryptography is keeping information secret from all but those who are authorised to see it. The term referring to this is:

Wähle eine der folgenden:

  • Confidentiality

  • Secrecy

  • Witnessing

  • Authorisation

  • Anonymity

Erklärung

Frage 35 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

One of the keys used in an asymmetric encryption system. The public key is made public to be used in conjunction with a corresponding private key

Erklärung

Frage 36 von 96

1

A program that secretly takes over another internet attached computer and then uses that computer to lunch attacks that are difficult to trace to the creator

Wähle eine der folgenden:

  • Zombie

  • Virus

  • Logical Bomb

  • OPSEC

  • Worm

Erklärung

Frage 37 von 96

1

According to DAD triad, _______ attempts to defeat availability

Wähle eine der folgenden:

  • Destruction

  • Availability

  • Disclosure

  • Alteration

  • Confidentiality

Erklärung

Frage 38 von 96

1

The process of verifying and identify claimed by or for a system entity

Wähle eine der folgenden:

  • Authentication

  • Timestamping

  • Confirmation

  • Processing

  • Validation

Erklärung

Frage 39 von 96

1

______ is a form of cryptosystem in which encryption and decryption are performed using two different keys one a public key and one a private key

Wähle eine der folgenden:

  • Asymmetric encryption

  • Symmetric encryption

  • Synchronous encryption

  • None of the statements

  • Asynchronous encryption

Erklärung

Frage 40 von 96

1

One objective of cryptography is conveyance, to another entity, of official sanction to do or be something. The term referring to this is:

Wähle eine der folgenden:

  • Authorisation

  • Entity authentication

  • Validation

  • Certificate

  • Confirmation

Erklärung

Frage 41 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

If the encrypted message is XBPG and deciphered text is QUIZ using the Caesar cipher, what is the value of key

Erklärung

Frage 42 von 96

1

A pair of key that have been selected so that if one is used for encryption, the other is used for decryption in Public-key cryptosystem

Wähle eine der folgenden:

  • public and private keys

  • plain and cipher keys

  • none of the statements

  • public and cipher keys

  • encryption and decryption keys

Erklärung

Frage 43 von 96

1

Set of hacker tools after attacker has broken into a computer system and gained root-level access

Wähle eine der folgenden:

  • rootkits

  • root-level hack

  • assets

  • zombie

  • virus

Erklärung

Frage 44 von 96

1

Which of the following statement is ingredients for a public key encryption scheme

Wähle eine der folgenden:

  • all of the statements

  • encryption/decryption algorithm

  • plaintext

  • public/private keys

  • ciphertext

Erklärung

Frage 45 von 96

1

In a public-key system using RSA you intercept the ciphertext C = 10 sent to a user whose public key is e = 5; n = 35. What is the value of p and q?

Wähle eine der folgenden:

  • P=5; q=7

  • P=6; q=8

  • P=q=e=5

  • P=1; q=35

  • p = q= n = 35

Erklärung

Frage 46 von 96

1

which of the following statement is not true

Wähle eine der folgenden:

  • the public key can be used to derive the private key

  • the foundation of public-key algorithm is a one way function

  • all of the listed answers are true

  • the private key operates as a trap door that allows the owner to recover the original data

  • reversing the process of encryption is virtually impossible without the private key

Erklärung

Frage 47 von 96

1

Consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security

Wähle eine der folgenden:

  • virtual private network

  • demilitarized zone

  • anti-spoofing

  • firewalls

  • network address translation

Erklärung

Frage 48 von 96

1

you can use _________ to protect your computer from outsiders

Wähle eine der folgenden:

  • antivirus software and personal firewall programs

  • system restore and antivirus software

  • personal firewall programs and system restore

  • antivirus software and the Recycle Bin

  • firewall programs and the Recycle Bin

Erklärung

Frage 49 von 96

1

One objective of cryptography is ensuring information has not been altered by unauthorised or unknown means. The term referring to this is:

Wähle eine der folgenden:

  • data integrity

  • message authentication

  • confirmation

  • authorisation

  • validation

Erklärung

Frage 50 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

encrypt the message WELCOME! Using Caesar cipher with the key = 5

Erklärung

Frage 51 von 96

1

A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption

Wähle eine der folgenden:

  • Symmetric encryption

  • One key encryption

  • Private key encryption

  • Asymmetric encryption

  • Same key encryption

Erklärung

Frage 52 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

In a public key system using RSA you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n =35. What will be the fi(n)?

Erklärung

Frage 53 von 96

1

A secret data value usually a character string that’s used as authentication information

Wähle eine der folgenden:

  • password

  • secret key

  • key

  • OPSEC

  • DMZ

Erklärung

Frage 54 von 96

1

code embedded within a program that causes a copy of itself to be inserted in one of more other programs. Usually performs some unwanted function

Wähle eine der folgenden:

  • virus

  • zombie

  • all of the statements

  • worm

  • firewall

Erklärung

Frage 55 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

In public-key system using rsa, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M

Erklärung

Frage 56 von 96

1

Secret undocumented entry point into a program, used to grant access without normal methods of access authentication

Wähle eine der folgenden:

  • Trapdoor

  • Virus

  • Trojan Horse

  • Logic Bomb

  • Worm

Erklärung

Frage 57 von 96

1

One objective of cryptography is identifying and acknowledging the identity of entity. The term referring to this is:

Wähle eine der folgenden:

  • identification

  • message authentication

  • confirmation

  • validation

  • witnessing

Erklärung

Frage 58 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

Decipher the ciphertext QMHXIVQ using Caesar Cipher with the key = 4

Erklärung

Frage 59 von 96

1

Weakness of a system that could be accidentally or intentionally exploited to damage assets

Wähle eine der folgenden:

  • Vulnerabilities

  • DMZ

  • Risk

  • Treats

  • Assets

Erklärung

Frage 60 von 96

1

Some _____ firewalls are able to examine the contents of packets as well as the headers for signs that they ate legitimate.

Wähle eine der folgenden:

  • Stateful

  • Personal

  • Stateless

  • Boundary

Erklärung

Frage 61 von 96

1

provides a user with protection against discovery and misuse of his or her identity by other users

Wähle eine der folgenden:

  • privacy

  • misuse

  • identification

  • ptotection

  • all of the statements

Erklärung

Frage 62 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

Use the playfair cipher with the keyword “PLAYFAIR” to encrypt the message “GOTO”

Erklärung

Frage 63 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of d?

Erklärung

Frage 64 von 96

1

Base elements of information such as numbers, letters, symbols and so on which are processed or carried out by human (or by some machine)

Wähle eine der folgenden:

  • Data

  • Context

  • Bytes

  • Information

  • Bits

Erklärung

Frage 65 von 96

1

What does firewall do

Wähle eine der folgenden:

  • Protects your computer from internet intrusion

  • Restores lost data on your computer

  • Checks floppy or CDs for corrupted files

  • Scans for viruses on your system

  • Protects against power surges

Erklärung

Frage 66 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

Perform decryption using the rsa algorithm if p = 5; q = 11, e = 3; c =14

Erklärung

Frage 67 von 96

1

Which of the statement is true

Wähle eine der folgenden:

  • The larger the key size the greater the range of possible values a key can be

  • The larger the key size the smaller the range of possible values a key can be

  • The larger the key size the range of possible values a key can be remains the same

  • The smaller the key size the greater the range of possible values a key can be

  • The smaller the key size the range of possible values a key can be remains the same

Erklärung

Frage 68 von 96

1

What of the following statements is true

Wähle eine der folgenden:

  • Public key algorithms are slow compared to symmetric cryptography

  • None of the listed answers

  • Public key algorithms are used to hash the password

  • Public key algorithms are used to encrypt the message

  • Public key algorithms are used to encrypt the key encryption key

Erklärung

Frage 69 von 96

1

what is decryption algorithm

Wähle eine der folgenden:

  • takes the ciphertext and the secret key and produces the original plaintext

  • none of the statements are true

  • the original intelligible message or data that is fed into the algorithm as input

  • the scrambled message produced as output

  • performs various substitutions and transformations on the plaintext

Erklärung

Frage 70 von 96

1

A stateful firewall maintains a ______ , which is a list of active connections

Wähle eine der folgenden:

  • State table

  • Connection table

  • Hub table

  • Routing table

  • Bridging table

Erklärung

Frage 71 von 96

1

Possibility of an incident or attack to cause damage to your enterprise

Wähle eine der folgenden:

  • Risk

  • Virus

  • Security

  • Assets

  • Malware

Erklärung

Frage 72 von 96

1

According to dad triad, _______ attempts to defeat confidentiality

Wähle eine der folgenden:

  • disclosure

  • alteration

  • confidentiality

  • availability

  • destruction

Erklärung

Frage 73 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

Find d using rsa algorithm, if p = 3, q= 11, e = 7; M = 5

Erklärung

Frage 74 von 96

1

According to dad triad, _______ attempts to defeat integrity

Wähle eine der folgenden:

  • Alteration

  • Confidentiality

  • Availability

  • Destruction

  • Disclosure

Erklärung

Frage 75 von 96

1

One objective of cryptography is prevention of authorized access to resources or the delaying of time-critical operations

Wähle eine der folgenden:

  • Denial of service

  • Confidentiality

  • Availability

  • Authentication

  • Reliability

Erklärung

Frage 76 von 96

1

A public key encryption algorithm based on exponentiation in modular arithmetic. It is the only algorithm generally accepted as practical and secure for public key encryption

Wähle eine der folgenden:

  • RSA

  • Caesar cipher

  • Playfair Cipher

  • Vigenere Cipher

  • Hill Cipher

Erklärung

Frage 77 von 96

1

Which of the following statements are types of firewalls?

Wähle eine oder mehr der folgenden:

  • Application level gateways

  • Packet – filtering

  • Circuit-level gateways

  • Session-level gateways

  • Internet-level gateways

Erklärung

Frage 78 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

What will be the value of key in Caesar Cipher if initially key = 65

Erklärung

Frage 79 von 96

1

The key used in a symmetric encryption system. Both participants must share the same key and this key must remain secret to protect communication

Wähle eine der folgenden:

  • Secret key

  • Symmetric key

  • Public key

  • Private key

  • Asymmetric key

Erklärung

Frage 80 von 96

1

if you encrypt a ciphertext using right key, you will get

Wähle eine der folgenden:

  • gibberish

  • ciphertext

  • plaintext

  • error message

  • key

Erklärung

Frage 81 von 96

1

Which one of the statement is equation for fi(n)?

Wähle eine der folgenden:

  • Fi(n) = (p-1)(q-1)

  • Fi(n) = (p-1)(q)

  • Fi(n) = (p-q)(q-1)

  • Fi(n) = pq

  • Fi(n) = (p)(q-1)

Erklärung

Frage 82 von 96

1

Which of the following statement(s) is(are) the Security Principles

Wähle eine der folgenden:

  • All of the statements

  • Separation of privileges

  • Least privilege

  • Defense in depth

  • Security through obscurity (the inadvisability thereof)

Erklärung

Frage 83 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

In a public key system using RSA you intercept the plaintext M=25 sent to user whose public key is e = 5; n =35. What will be the ciphertext C?

Erklärung

Frage 84 von 96

1

The Caesar cipher is a _______ cipher that has a key of 3

Wähle eine der folgenden:

  • Shift

  • Transposition

  • Additive

  • Subtractive

  • Multiplicative

Erklärung

Frage 85 von 96

1

Secret undocumented entry point into a program, used to grant access without normal methods of access authentication

Wähle eine der folgenden:

  • Trapdoor

  • Virus

  • Worm

  • Trojan Horse

  • Logic Bomb

Erklärung

Frage 86 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

One of the two keys used on an asymmetric encryption system. For secure communication, the private key should only be known to its creator

Erklärung

Frage 87 von 96

1

Which of these is not considered as a symmetric key algorithm

Wähle eine der folgenden:

  • rsa

  • playfair cipher

  • hill cipher

  • caesar cipher

  • vigenere cipher

Erklärung

Frage 88 von 96

1

The quality of state of being genuine or original rather than a reproduction or fabrication

Wähle eine der folgenden:

  • Authenticity

  • Availability

  • Authentication

  • Confidentiality

  • Accuracy

Erklärung

Frage 89 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

Perform encryption using the rsa algorithm if p = 3 q= 11 e = 7 M = 5

Erklärung

Frage 90 von 96

1

A process of identifying, analysing and controlling critical information

Wähle eine der folgenden:

  • OPSEC

  • Firewall

  • Scanning

  • DMZ

  • Anti-virus

Erklärung

Frage 91 von 96

1

____ is another term for a packet of digital information

Wähle eine der folgenden:

  • datagram

  • data

  • bits

  • header

  • footer

Erklärung

Frage 92 von 96

1

________ is the science and art of transforming messages to make them secure and immune to attacks

Wähle eine der folgenden:

  • Cryptography

  • Cryptosystem

  • None of the statements

  • Cryptoanalysis

  • Confidentiality

Erklärung

Frage 93 von 96

1

Which of the statement(s) is(are) properties for p an q

Wähle eine der folgenden:

  • p an q are prime

  • p an q are distinct

  • p = q -1

  • p is greater than q

  • p and q should be of similar bit length

Erklärung

Frage 94 von 96

1

Fülle die Lücke, um den Text zu vervollständigen

The translation of encrypted text or data (called ciphertext) into original text or data (called plaintext). Also called deciphering

Erklärung

Frage 95 von 96

1

Which of these is not considered as a symmetric key algorithm

Wähle eine der folgenden:

  • RSA

  • Hill Cipher

  • Playfair Cipher

  • Caesar cipher

  • Vigenere Cipher

Erklärung

Frage 96 von 96

1

A combination of an encryption algorithm and decryption is called a _____

Wähle eine der folgenden:

  • Cipher

  • Key

  • Polyalphabetic cipher

  • Secret

  • Substitution

Erklärung