Information security and data protection

Beschreibung

- at Quiz am Information security and data protection, erstellt von хомяк убийца am 12/05/2018.
хомяк убийца
Quiz von хомяк убийца, aktualisiert more than 1 year ago
хомяк убийца
Erstellt von хомяк убийца vor mehr als 6 Jahre
1408
30

Zusammenfassung der Ressource

Frage 1

Frage
What is the purpose of access control list?
Antworten
  • to enforce a specified security policy
  • to prevent unauthorised access to data
  • to emphasize encryption
  • it is a key distribution center

Frage 2

Frage
Identify definition of authentication
Antworten
  • establishes the identity of a subject
  • specifies and enforces that each object is accessed correctly and only by those that are allowed to do so
  • to enforce a specified security policy
  • to emphasize encryption

Frage 3

Frage
What does Access Control Information cover?
Antworten
  • data, resources
  • AC policy
  • functions such as grant, deny
  • decisions

Frage 4

Frage
What does Access Control Enforcement cover?
Antworten
  • data, resources
  • AC policy
  • functions such as grant, deny
  • decisions

Frage 5

Frage
What does Access Control Decision Function cover?
Antworten
  • data, resources
  • AC policy
  • granting and denying access
  • decisions

Frage 6

Frage
Define a subject of Access Control List
Antworten
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Frage 7

Frage
Define an object of Access Control List
Antworten
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Frage 8

Frage
How many types of resource dependent access controls exist?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 9

Frage
How many types of access control mechanisms exist
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 10

Frage
Find an example of resource dependent access for network access
Antworten
  • append
  • execute
  • redirected
  • granted

Frage 11

Frage
Find an example of resource dependent access for file access
Antworten
  • append
  • execute
  • redirected
  • granted

Frage 12

Frage
Find incorrect access control goal
Antworten
  • invalid operations should be permitted
  • every actions should be checked
  • unnecessary access should not be allowed
  • all the above mentioned

Frage 13

Frage
What is a property of the capability ticket in access control list?
Antworten
  • Specifies a given subject can perform what operations on what objects
  • Subjects does not grant rights to other subjects
  • Users have only one ticket
  • Access rights given to a subject are valid for forever

Frage 14

Frage
What is a property of the procedure oriented objects in access control list?
Antworten
  • Objects are encapsulated, permitting only certain specified accesses via program execution
  • Specifies a given subject can perform what operations on what objects
  • Access rights given to a subject are valid for forever
  • Users have only one ticket

Frage 15

Frage
What is a property of the procedure oriented objects in access control list?
Antworten
  • Enforces accesses to an object be done through a trusted interface
  • Specifies a given subject can perform what operations on what objects
  • Access rights given to a subject are valid for forever
  • Users have only one ticket

Frage 16

Frage
What does multilevel security mean?
Antworten
  • Classification of information by the level of importance and permission of access by users with different security clearance
  • Classification of information by date and permission of access by users with different security clearance
  • Classification of information by the level of importance and permission of access by users name
  • Classification of information by date and permission of access by users name

Frage 17

Frage
How many levels are covered in multilevel security
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 18

Frage
No read up (read down) means
Antworten
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Frage 19

Frage
No write down (write up) means
Antworten
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Frage 20

Frage
Define a malware attacks
Antworten
  • Malicious software causes data compromises
  • A browser helper object that detects changes to URL and logs
  • Users are tricked by fraudulent messages into giving out information
  • The lookup of host names is altered to send users to a fraudulent server

Frage 21

Frage
How many types of authentication schemes exist?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 22

Frage
Define a change cipher spec
Antworten
  • All data sent/received by software that uses SSL
  • used to carry handshake messages
  • used to indicates a change in the encryption and authentication of records
  • used to indicate when the connection is about to close

Frage 23

Frage
Define an alert
Antworten
  • All data sent/received by software that uses SSL
  • used to carry handshake messages
  • used to indicates a change in the encryption and authentication of records
  • used to indicate when the connection is about to close

Frage 24

Frage
Which of the following is true about importance of hash functions i. High Computational Load ii. Message Overhead iii. Security Limitations
Antworten
  • i only
  • none
  • All the mentioned
  • iii only

Frage 25

Frage
What does “computationally infeasible to find data mapping to specific hash” mean
Antworten
  • One way property
  • Collision free property
  • Second way property
  • Collision property

Frage 26

Frage
Which of the following is not property of hash functions?
Antworten
  • One wayness
  • Preimage resistance
  • Strong collision resistance
  • Long, unfixed output

Frage 27

Frage
How many types of hash constructions exist?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 28

Frage
Output length for SHA-1
Antworten
  • 128
  • 160
  • 512
  • 314

Frage 29

Frage
Input length for SHA-1
Antworten
  • 512
  • 2014
  • 160
  • 314

Frage 30

Frage
Which construction method support SHA?
Antworten
  • Schnorr
  • Diffie-Hellman
  • Merkle-Damgard
  • Alice & Bob

Frage 31

Frage
How many rounds in general hold SHA-1?
Antworten
  • 50
  • 60
  • 70
  • 80

Frage 32

Frage
How many stages hold SHA-1?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 33

Frage
How many rounds support one stage?
Antworten
  • 10
  • 20
  • 80
  • 79

Frage 34

Frage
Name of the function that SHA-1 use
Antworten
  • Merkle-Damgard
  • Feistel
  • Schnorr
  • Diffie-Hellman

Frage 35

Frage
How many types of SHA exist ?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 36

Frage
How many rounds MD5 hold in general?
Antworten
  • 64
  • 80
  • 512
  • 160

Frage 37

Frage
Which of the following does not refer to security requirements of Hash functions?
Antworten
  • Preimage resistance
  • Second preimage resistance
  • Collision resistance
  • High Computational Load

Frage 38

Frage
The purpose of hash function is to
Antworten
  • Create a message
  • Compress a message
  • Divide a message
  • Conquer a message

Frage 39

Frage
How many constant keys support SHA algorithm ?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 40

Frage
Which of the following refers requirement of digital signature?
Antworten
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be computationally infeasible to forge

Frage 41

Frage
Which of the following refers requirement of digital signature?
Antworten
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be practical to save digital signature in storage

Frage 42

Frage
What is the property of direct digital signature?
Antworten
  • Assumed receiver has sender’s private key
  • Involves only sender
  • Can encrypt using receiver’s public key
  • Assumed sender has receiver’s private key

Frage 43

Frage
Which of the following does not refer to characteristics of digital signature?
Antworten
  • Private/public is generated by receiver
  • A durable private/public key pair
  • A disposable private/public key pair
  • Signature is two numbers, depending on message hash and secret information

Frage 44

Frage
How many message authentication functions exist?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 45

Frage
If public key encryption is used
Antworten
  • Encryption provides no confidence of sender
  • Encryption provides with some level of confidence of sender
  • Encryption provides fully confidence of sender
  • Encryption does not provided at all

Frage 46

Frage
In public key cryptography sender signs message using their
Antworten
  • Public key
  • Shared key
  • Private key
  • Third key

Frage 47

Frage
In public key cryptography sender signs message using their private key, then encrypts with recipient’s
Antworten
  • Private key
  • Public key
  • Single key
  • Key

Frage 48

Frage
What is authentication?
Antworten
  • The process of verifying a claimed identity
  • Identification of user
  • Access control
  • Accounting of service

Frage 49

Frage
Define AAA.(triple A)
Antworten
  • Access After Anyone
  • Authentication Authorization Accounting
  • Authentication Authorization Access
  • Authentication Access Accounting

Frage 50

Frage
Which of the term refers to authorization?
Antworten
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity
  • Accounting of service

Frage 51

Frage
Which of the term refers to accounting?
Antworten
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity
  • Accounting of service

Frage 52

Frage
PIN, passwords refer to
Antworten
  • Something you have
  • Something you know
  • Something you are
  • Combined method

Frage 53

Frage
Keys, soft tokens refer to
Antworten
  • Something you have
  • Something you know
  • Something you are
  • Combined method

Frage 54

Frage
Fingerprint, iris, palm recognition refer to
Antworten
  • Something you have
  • Something you know
  • Something you are
  • Combined method

Frage 55

Frage
Combined or multiple methods of authentication are used for
Antworten
  • Lower level assurance
  • Medium level assurance
  • Higher level assurance
  • Not used at all

Frage 56

Frage
How many phases are exist in biometric?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 57

Frage
When fingerprint was developed?
Antworten
  • 1988
  • 1888
  • 1887
  • 1987

Frage 58

Frage
What is minutia ?
Antworten
  • Time
  • comparisons of one print with another can be made
  • comparison of eyes
  • comparison of palms

Frage 59

Frage
What is TTP?
Antworten
  • TTP certifies trustworthiness of binding public key with its rightful owner’s identity
  • TTP certifies trustworthiness of binding private key with its rightful owner’s
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Frage 60

Frage
Define X.509
Antworten
  • TTP certifies trustworthiness of binding public key with its rightful owner’s identity
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Frage 61

Frage
Define a Kerberos
Antworten
  • Trusted third party authentication system and makes no use of public key cryptography
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Frage 62

Frage
Which of the following does not refer for Kerberos property
Antworten
  • Impeccability
  • Containment
  • Transparency
  • Viciousness
  • Подписываемся на мой инстаграм @beketoo

Frage 63

Frage
What is a security?
Antworten
  • The protection of information assets through the use of technology, processes, and training
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit
  • Ensures that computer-related assets are accessed only by authorized parties

Frage 64

Frage
What is a vulnerability?
Antworten
  • The protection of information assets through the use of technology, processes, and training
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attack
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit
  • Ensures that computer-related assets are accessed only by authorized parties

Frage 65

Frage
What is an attack?
Antworten
  • The protection of information assets through the use of technology, processes, and training
  • Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks.
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit

Frage 66

Frage
Types of Threats
Antworten
  • Interception, Interruption, Modification, Fabrication
  • Method, Opportunity, Motive
  • Confidentiality, Integrity, Availability, Authentication
  • Non-repudiation, Authorisation/Access control, Destruction

Frage 67

Frage
How to protect?
Antworten
  • Encryption, Software control, Hardware control, Policies and Procedures,Physical control
  • Method, Opportunity, Motive
  • Confidentiality, Integrity, Availability, Authentication
  • Non-repudiation, Authorisation/Access control, Destruction

Frage 68

Frage
Interception is __
Antworten
  • Asset lost, unusable,unavailable
  • Unauthorized access
  • Unauthorized change, tamper of data
  • Ex. Unauthorized add data to a DB

Frage 69

Frage
Security goals are:
Antworten
  • CIA
  • CEA
  • CLA
  • CDD

Frage 70

Frage
Confidentiality means
Antworten
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Frage 71

Frage
Deterrence is
Antworten
  • Punishment makes attackers think twice –Examples include laws and organisational policy
  • Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
  • Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
  • Punishment by taking money

Frage 72

Frage
Defence is
Antworten
  • Punishment makes attackers think twice –Examples include laws and organisational policy
  • Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
  • Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
  • Punishment by taking money

Frage 73

Frage
Detection is
Antworten
  • Punishment makes attackers think twice –Examples include laws and organisational policy
  • Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
  • Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
  • Punishment by taking money

Frage 74

Frage
Integrity means
Antworten
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Frage 75

Frage
Authentication means
Antworten
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Frage 76

Frage
Non-repudiation means
Antworten
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • ensures that parties cannot deny having sent messages

Frage 77

Frage
DES stands for
Antworten
  • Demand Encryption Standard
  • Data Encryption Standard
  • Digital Encryption Standard
  • Database Encryption Standard

Frage 78

Frage
When DES released?
Antworten
  • 1977
  • 1974
  • 1960
  • 1965

Frage 79

Frage
Who introduced idea of substitution-permutation (S-P) networks?
Antworten
  • Shannon
  • Feistal
  • Lucifer
  • Rijndael

Frage 80

Frage
In how many rounds DES encryption is handled?
Antworten
  • 16
  • 8
  • 32
  • 4

Frage 81

Frage
_____ process messages in blocks, each of which is then encrypted/decrypted?
Antworten
  • block ciphers
  • stream ciphers
  • mode ciphers
  • code ciphers

Frage 82

Frage
What is the cryptography?
Antworten
  • study about how hacker should behave
  • study of encryption principles/methods
  • study about message transformation
  • study of the computer system

Frage 83

Frage
Which cipher is described below: “Each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.”
Antworten
  • Playfair Cipher
  • Vigenere Cipher
  • Caesar Cipher
  • Kerberos

Frage 84

Frage
How Cryptography is divided by the way in which plaintext is processed:
Antworten
  • Substitution and Transposition
  • Single-key or Private key
  • Two- key or Public
  • Block and Stream

Frage 85

Frage
What is the Key Matrix size in Playfair
Antworten
  • 3x3
  • 4x4
  • 5x5
  • 9x9

Frage 86

Frage
Using the Caesar cipher decrypt this message “Vwdb kxqjub, vwdb irrolvk” (key=2)
Antworten
  • Stay hungry, stay foolish
  • Never give up
  • Dance as if no one sees
  • With the great power comes great responsibility

Frage 87

Frage
3 Ds of Security: (DDD)
Antworten
  • Defence, Deterrence, Detection
  • Data, Development, Device
  • Database, Data, Deadline
  • Demand, Design, Decision

Frage 88

Frage
MOM stands for ____
Antworten
  • Method, Opportunity, Motive
  • Modification, Operation, Motto
  • Malfunction, Opinion, Management
  • Messages, Opportunity, Monitoring

Frage 89

Frage
DES is a symmetric cipher
Antworten
  • True
  • False

Frage 90

Frage
Block size of DES
Antworten
  • 256-bits
  • 128-bits
  • 64-bits
  • 32-bits

Frage 91

Frage
AES stands for
Antworten
  • Advanced Encryption Standard
  • Advanced Encryption System
  • American Encryption Standard
  • Alias Encryption Standard

Frage 92

Frage
Advanced Encryption Standard(AES) also known like
Antworten
  • Rassul
  • Rijndael
  • Feistel

Frage 93

Frage
Who introduce idea of substitution-permutation?
Antworten
  • David Shannon
  • Andre Shannon
  • Petre Shannon
  • Claude Shannon

Frage 94

Frage
In which year was introduced idea of substitution-permutation?
Antworten
  • 1949
  • 1948
  • 1950
  • 1951

Frage 95

Frage
What is the plaintext?
Antworten
  • Original Message
  • Coded Message
  • Algorithm for transforming text
  • Secret key

Frage 96

Frage
What is not the model of the symmetric cipher?
Antworten
  • conventional / private-key / single-key
  • sender and recipient share a common key
  • all classical encryption algorithms are private-key
  • was only type prior to invention of public- key in 1982’s

Frage 97

Frage
What is the Cipher ?
Antworten
  • algorithm for transforming plaintext to ciphertext
  • coded message
  • original message
  • study of encryption principles/methods

Frage 98

Frage
What is the cryptanalysis (codebreaking ) ?
Antworten
  • algorithm for transforming plaintext to cipher text
  • study of principles/methods of deciphering cipher text without knowing key
  • original message
  • study of encryption principles/methods

Frage 99

Frage
What is the cryptology?
Antworten
  • field of both cryptography & cryptanalysis
  • original message
  • study of encryption principles/methods
  • algorithm for transforming plaintext to cipher text

Frage 100

Frage
What are the general approaches for Cryptanalysis?
Antworten
  • cryptanalytic attack/brute force attack
  • substitution/transposition
  • permutation/transposition
  • substitution/permutation

Frage 101

Frage
What is Ciphertext only?
Antworten
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext

Frage 102

Frage
How many types of threats exist?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 103

Frage
Authorisation means
Antworten
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • defining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Frage 104

Frage
CIA means
Antworten
  • Confidentiality, invalid, availability
  • Confidentiality, interact, access
  • Certain, integrity,availability
  • Confidentiality, integrity, availability

Frage 105

Frage
What is Threat?
Antworten
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks. A weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage
  • Typical threats include unauthorised access, destruction, system overrun and takeover, propagation of malicious code, data thieving and fabrication;
  • Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit

Frage 106

Frage
What is ciphertext?
Antworten
  • coded message
  • original message
  • algorithm for transforming plaintext to ciphertext
  • info used in cipher known only to sender/receiver

Frage 107

Frage
What is a key?
Antworten
  • converting plaintext to ciphertext
  • recovering ciphertext from
  • info used in cipher known only to sender/receiver
  • algorithm for transforming plaintext to ciphertext

Frage 108

Frage
What is encipher (encrypt)?
Antworten
  • study of encryption principles/methods
  • study of principles/ methods of deciphering ciphertext without knowing key
  • original message
  • converting plaintext to ciphertext

Frage 109

Frage
What is decipher (decrypt)?
Antworten
  • converting plaintext to ciphertext
  • recovering ciphertext from plaintext
  • coded message
  • original message
  • recovering plaintext from ciphertext

Frage 110

Frage
Mostly used symmetric cipher
Antworten
  • AES
  • DES
  • RSA
  • SHA-1

Frage 111

Frage
Possible length of AES key
Antworten
  • 128 156 198
  • 128 192 256
  • 128 184 228
  • 128 164 256

Frage 112

Frage
How many stages has final round of AES?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 113

Frage
RSA uses
Antworten
  • two keys - private & publiс
  • one key - only private
  • one key - only public
  • no correct answer

Frage 114

Frage
What is TRUE about RSA? Each user generates a public/private key pair by:
Antworten
  • selecting two large primes at random: p, q
  • selecting two small primes at random: p, q
  • selecting three large primes at random: p, q, r
  • selecting only one number at random: p

Frage 115

Frage
In RSA security relies on a ___ difference in difficulty between ___ (en/decrypt) and ___ (cryptanalyse) problems
Antworten
  • large enough, easy, hard
  • small enough, hard, easy
  • small enough, easy, hard
  • large enough, hard, easy

Frage 116

Frage
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Antworten
  • Data Size
  • Round Size
  • Key Size
  • Encryption Size

Frage 117

Frage
_______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
Antworten
  • RSA
  • Karberos
  • Caesar
  • AES

Frage 118

Frage
In asymmetric key cryptography, the private key is kept by
Antworten
  • sender
  • receiver
  • sender and receiver
  • all the connected devices to the network
  • none of these

Frage 119

Frage
RSA was developed by:
Antworten
  • Dr.Tahir El-Gamal
  • Diffie-Hellman
  • Shannon
  • Rivest, Shamir, Adleman

Frage 120

Frage
Encryption by receiver with sender’s public key:
Antworten
  • C = Me mod N
  • M=Cd mod N
  • Ya=Xa mod Q
  • C=Km mod Q

Frage 121

Frage
RSA was founded in:
Antworten
  • 1975
  • 1976
  • 1977
  • 1974

Frage 122

Frage
Decryption by sender with sender’s public key:
Antworten
  • C=Me mod N
  • M=Cd mod N
  • Ya=Xa mod Q
  • C=Km mod Q

Frage 123

Frage
Calculate n and φ, if p = 3, and q = 11 (RSA)
Antworten
  • n = 33, φ = 20
  • n = 20, φ = 33
  • n = 33, φ = 33
  • n = 33, φ = 22

Frage 124

Frage
Calculate n and φ, if p = 17, and q = 11 (RSA)
Antworten
  • n = 187, φ = 160
  • n = 160, φ = 187
  • n = 187, φ = 187
  • n = 187, φ = 170

Frage 125

Frage
Calculate C (ciphertext), if p = 3, q = 11, e = 7, M = 2 (RSA)
Antworten
  • C = 29
  • C = 3
  • C = 22
  • C = 2

Frage 126

Frage
Calculate M (plaintext), if p = 3, q = 11, d = 3, C = 29 (RSA)
Antworten
  • M = 2
  • M = 29
  • M = 30
  • M = 1

Frage 127

Frage
Block size of AES plaintext:
Antworten
  • 192
  • 164
  • 128
  • 256

Frage 128

Frage
Maximum AES number of rounds:
Antworten
  • 10
  • 12
  • 14
  • 16

Frage 129

Frage
AES size of output(output parameter):
Antworten
  • 192
  • 128
  • 164
  • 256

Frage 130

Frage
First public-key type scheme proposed by Diffie & Hellman in
Antworten
  • 1971
  • 1976
  • 1981
  • 1986

Frage 131

Frage
Value of key depends on the: (Diffie & Hellman)
Antworten
  • Participants
  • Keys
  • Message
  • Algorithm

Frage 132

Frage
If Alice and Bob subsequently communicate, they will have the____ key
Antworten
  • Same
  • Different
  • Private
  • Public

Frage 133

Frage
Which of these are true about “a public-key distribution scheme ”?
Antworten
  • cannot be used to exchange an arbitrary message
  • rather it can establish a common key
  • known only to the two participants
  • all of above

Frage 134

Frage
When by Diffie & Hellman along with the exposition of public key concepts?
Antworten
  • 1977
  • 1978
  • 1979
  • none of them

Frage 135

Frage
Which of them uses two keys( public and private):
Antworten
  • RSA
  • Caesar
  • Vigenere
  • Playfair

Frage 136

Frage
A related private-key, known
Antworten
  • only to the recipient
  • only to the sender
  • none of them
  • to everyone

Frage 137

Frage
The key must be kept secret for
Antworten
  • needed security
  • encryption and decryption
  • encryption
  • decryption

Frage 138

Frage
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
Antworten
  • man-in-the-middle
  • ciphertext attack
  • plaintext attack
  • none of the above

Frage 139

Frage
“Using only a subset of letters/words in a longer message marked in some way ” is__
Antworten
  • Caesar Cipher
  • RSA
  • DES
  • Steganography

Frage 140

Frage
For which cipher an example is given: “Say hi to IITU” After encrypt “Yas ih ot UTII”
Antworten
  • Playfair Cipher
  • Transposition Cipher
  • Route Cipher
  • Steganography

Frage 141

Frage
Polyalphabetic substitution ciphers improve security using multiple cipher alphabets
Antworten
  • True
  • False

Frage 142

Frage
For RSA to work, value of P must be less than value of:
Antworten
  • P
  • Q
  • n
  • r

Frage 143

Frage
In symmetric key cryptography, key used by sender and receiver is:
Antworten
  • shаrеd
  • Different
  • Two keys are used
  • None

Frage 144

Frage
In symmetric-key cryptography, same key is used by:
Antworten
  • One Party
  • Multi Party
  • Third Party
  • Both Party

Frage 145

Frage
RSA stands for
Antworten
  • Rivеst, Shаmir,, Аdlеmаn
  • Roger, Shamir, Adrian
  • Robert, Shamir, Anthoney
  • Rivest, Shaw, Adleman

Frage 146

Frage
Which of them is first public-key type scheme?
Antworten
  • Diffiе & Hеllmаn
  • Elgamal
  • RSA
  • AES

Frage 147

Frage
When Diffie & Hellman protocol was invented?
Antworten
  • 1976
  • 1975
  • 1980
  • 1990

Frage 148

Frage
In Diffie & Hellman key exchange a public key is known only to the two participants
Antworten
  • True
  • False

Frage 149

Frage
In Diffie & Hellman key exchange a public key is cannot be used to exchange an arbitrary message
Antworten
  • True
  • False

Frage 150

Frage
Diffie & Hellman key exchange based on exponentiation in a finite (Galois) fields
Antworten
  • True
  • False

Frage 151

Frage
In Diffie & Hellman protocol when the user A generates their key a secret key should be
Antworten
  • XА < q
  • generated randomly
  • given by user B
  • none

Frage 152

Frage
Choose the correct formula for computing public key YA in Diffie & Hellman protocol
Antworten
  • YА= а mod q
  • BA = a + b
  • CA = a – b
  • DA = a * b

Frage 153

Frage
Choose the correct formula for computing secret key K by user A in Diffie & Hellman protocol
Antworten
  • K = (YА)^X А mod q
  • S = a + b
  • D = a * b
  • L = a * b + 2

Frage 154

Frage
Elgamal cryptography uses exponentiation in a finite (Galois) fields
Antworten
  • True
  • False

Frage 155

Frage
In the Elgamal cryptography when the user A generates their key a secret key should be
Antworten
  • 1 < XА < q-1
  • generated randomly
  • given by user
  • none

Frage 156

Frage
Choose the correct formula for computing public key YA in Elgamal cryptography
Antworten
  • YА = аXА mod q
  • K = YАk mod q
  • K = (YА)^X А mod q
  • YА= а mod q

Frage 157

Frage
Choose the correct formula for computing one-time key K in Elgamal cryptography
Antworten
  • K = YАk mod q
  • S = a + b + 1
  • D = a * b + 2
  • L = a * b + 3

Frage 158

Frage
Choose the correct formula for computing C1 in Elgamal cryptography
Antworten
  • C1 = аk mod q
  • C3 = a mod b
  • C = z + 2 + 5
  • C5 = a * b +2

Frage 159

Frage
Choose the correct formula for computing C2 in Elgamal cryptography
Antworten
  • C2 = KM mod q
  • C = MK
  • C3 = AK
  • C4 = AA

Frage 160

Frage
In Elgamal cryptography public key cryptosystem related to D-H
Antworten
  • True
  • False

Frage 161

Frage
Known plaintext is...
Antworten
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • Attacker selects plaintext or ciphertext to en/decrypt

Frage 162

Frage
Chosen plaintext is...
Antworten
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • Attacker selects plaintext or ciphertext to en/decrypt

Frage 163

Frage
Chosen ciphertext is...
Antworten
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • Attacker selects plaintext or ciphertext to en/decrypt

Frage 164

Frage
Chosen text is ...
Antworten
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • attacker selects plaintext or ciphertext to en/decrypt
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Tricky words: Set one
barrie edmonds
Present continuos tense
anama_gordillo
DELIVERING AT PACE
Natalie West
UNIT 1
missbotch
Untitled
atanuroy505
ANTT
Gaffer Ji
Phrasel Verb (Prepositions IN, ON, UP and AT)
Dmitriy Lagutin
Phrasel Verb (Prepositions IN, ON, UP and AT)
Петр Казаков
ANTT
Gaffer Ji
Preposition
jizaco0508