Frage 1
Frage
This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Antworten
-
Conditional access
-
Authentication
-
Identification
-
Anonymizer
-
Authorization
Frage 2
Frage
In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack
Frage 3
Frage
Why would reusing a ticket as a replay attack is Kerberos not be successful?
Antworten
-
The tickets are encrypted
-
The tickets are digitally signed
-
The tickets are used a token
-
The tickets are time stamped
Frage 4
Frage
What is Man in the middle attack?
Antworten
-
The attackers catch our employee in the middle of them and start applying physical pressure on them
-
The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras
-
The hacker jacks in a network and records all the information sent over the network
Frage 5
Frage
What is encryption strength is based on? Please select the best answer
Antworten
-
The strength of the algorithm, the length of the key, and the secrecy of the key
-
The length of the key, the type of algorithm, and the strength of the key
-
The privacy of the key, the length of the algorithm, and the strength of the key
-
The strength of the key, the length of the algorithm, and the privacy of the key
Frage 6
Frage
One form of ‘something you have’ is the _____ and USB tokens
Antworten
-
Fingerprint
-
Tokens
-
Identification
-
Password
-
Digital signatures
Frage 7
Frage
The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as (Please select the best answer)
Frage 8
Frage
What is a good way to make users in a network safer in the internet
Frage 9
Frage
When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a
Antworten
-
It is known as the Man in the middle attack
-
It is known as the TCP/IP spoofing attack
-
It is known as the Back door attack
-
It is known as the Replay attack
Frage 10
Frage
In which of the following attack does the attacker capture a portion of the communication between two parties, modifies it, and inserts
Antworten
-
Man-in-the-middle attack
-
Spoofing
-
Sniffing
-
Denial-of-service
Frage 11
Frage
A password represents
Antworten
-
Something you have
-
None of the above
-
Something you are
-
Something you know
-
All of the above
Frage 12
Frage
List the main aspects of information security: I. Confidentiality II. Integrity III. Availability IV. Consistency
Antworten
-
I-III-IV
-
I-III
-
I-II-III
-
I only
-
II-III-IV
Frage 13
Frage
Which of the following describes the challenge-response
Antworten
-
A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
-
A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)
-
A special hardware device that is used to generate random text in a cryptography system
-
The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.
Frage 14
Frage
Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?
Frage 15
Frage
Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should
Antworten
-
Encrypt the message with Alice’s public key and send Alice the message
-
Encrypt the message with Alice’s private key and send the encrypted message to Alice
-
Encrypt the message with his public key and send Alice the message
-
Encrypt the message with his private key and send the encrypted message to Alice
Frage 16
Frage
Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature
Antworten
-
Bob applies a hash function to m and then encrypts the result with his private key
-
Bob applies a hash function to m and then encrypts the result with his public key
-
Bob applies a hash function to m and then encrypts the result with Alice’s public key
-
Bob encrypts m with his private key and then applies a hash function to the result
Frage 17
Frage
Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Antworten
-
Applies Bob's public key to the digital signature, applies the has function to m, and compares the results of the two operations;
-
Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m;
-
Applies a de-hashing function to the digital signature and compare the result to m;
-
No correct answer;
Frage 18
Frage
Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with
Antworten
-
The CA's private key
-
Bob’s public key
-
The CA's public key
-
Bob’s private key
Frage 19
Frage
A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.
Frage 20
Frage
Which security action should be finished before access is given to the network?
Antworten
-
Identification and authorization
-
Identification and authentication
-
Authentication and authorization
-
Authentication and password
Frage 21
Frage
Which of the following types of encryption would BEST to use for a large amount of data?
Antworten
-
Asymmetric
-
Symmetric
-
RSA
-
Hash
Frage 22
Frage
Which statement correctly describes the difference between a secure cipher and a secure hash?
Antworten
-
A hash produces a variable output for any input size; a cipher does not.
-
A cipher can be reversed; a hash cannot.
-
A cipher produces the same size output for any input size; a hash does not.
Frage 23
Frage
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
Antworten
-
Decryption
-
Cryptanalysis
-
Cryptography
-
Brute force cracking
Frage 24
Frage
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Antworten
-
Auditability
-
Availability
-
Integrity
-
Confidentiality
Frage 25
Frage
Which of the following appears when an asset of the system become lost, unavailable or unusable?
Antworten
-
Interception
-
Interruption
-
Interpretation
-
Modification
-
Fabrication
Frage 26
Frage
Show incorrect kind of threats
Antworten
-
Interception
-
Interruption
-
Interpretation
-
Modification
-
Fabrication
Frage 27
Frage
Bock cipher maps each plaintext block to :
Frage 28
Frage
What is vulnerability?
Antworten
-
A weakness in the security system
-
A Method which uses flaws to have more access, privileges or resources to the system
-
A method which used to eliminate or reduce threats
-
A kind of auth to system
Frage 29
Frage
A(n) _____ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through
Frage 30
Frage
What is assumed by cipher in cryptography ?
Frage 31
Frage
What is assumed by ciphertext in cryptography?
Frage 32
Frage
What is assumed by plaintext in cryptography?
Frage 33
Frage
In cryptography, what is key?
Antworten
-
Info used to cipher, known only to sender and receiver
-
Algorithm for transforming plaintext to ciphertext
-
Encrypted message
-
Recovering plaintext from ciphertext
-
Converting plaintext to ciphertext
Frage 34
Frage
What is cryptoanalysis?
Antworten
-
Study of principles/methods deciphering ciphertext without knowing key
-
Info used to cipher, known only to sender and receiver
-
Algorithm for transforming plaintext to ciphertext
-
Recovering plaintext from ciphertext
-
Converting plaintext to ciphertext
Frage 35
Frage
In asymmetric key cryptography, the public key for decryption is kept by:
Frage 36
Frage
Which of these are threats against to modern computer?
Antworten
-
Network attacks, firewall and worms
-
Viruses, worms and encryption
-
Network attacks, viruses and worms
-
Viruses, network encryptions and worms
Frage 37
Frage
How the industry solves the threats ?
Antworten
-
Firewall, IDS, Kerberos, blogs
-
IDS, firewall, authentication, policies
-
Virus, worms, attacks, web-sites
-
Network attacks, IDS, worms, virus
Frage 38
Frage
Which one of the following algorithm is not used in asymmetric key cryptography?
Antworten
-
RSA algorithm
-
Diffle-Hellman algorithm
-
DES algorithm
-
DSA algorithm
Frage 39
Frage
In cryptography, the order of the order of the letters in a message in rearranged by
Frage 40
Frage
What is data encryption standard (DES)?
Antworten
-
Block cipher
-
stream cipher
-
bit cipher
-
none of the mentioned
Frage 41
Frage
Cryptanalysis is used:
Frage 42
Frage
Cryptographic hash function takes an arbitrary block of data and returns
Antworten
-
Fixed site bit string
-
variable size bit string
-
none of the mentioned
-
both of the mentioned
Frage 43
Frage
A substitution cipher substitutions one symbol with
Antworten
-
Keys
-
Others
-
Multi Parties
-
Single Party
Frage 44
Frage
An asymmetric-key(or public key ) cipher uses
Frage 45
Frage
In the computer industry the “What you have” method is use of?
Antworten
-
Passwords
-
Smart cards
-
Digital certificates’
Frage 46
Frage
A smartcard represents
Antworten
-
None of the above
-
Something you are
-
All of the above
-
Something you have
-
Something you know
Frage 47
Frage
Convert one symbol of plaintext immediately into a symbol of cipher text (example:Caesar cipher)
Antworten
-
Encryption
-
Plaintext
-
Block cipher
-
stream ciphers
Frage 48
Antworten
-
Asset lost, unusable, unavailable
-
Unauthorized access
-
Unauthorized change, tamper of data
-
Ex. Unauthorized add data to a DB
Frage 49
Antworten
-
Unauthorized change, tamper of data
-
Asset lost, unusable, unavailable
-
Unauthorized access
-
Ex. Unauthorized add data to a DB
Frage 50
Frage
Which are the examples of DEFENCE?
Antworten
-
Firewalls, router access control list, spam filters, virus scanners
-
Employee communication, policy on company Intranet
-
Audit logs, intrusion detection system, network traffic monitoring
-
Network attacks, IDS, worms, virus
Frage 51
Frage
Which are the examples of DETERRENCE?
Antworten
-
Employee communication, policy on company Intranet
-
Firewalls, router access control list, spam filters, virus scanners
-
Audit logs, intrusion detection system, network traffic monitoring
-
Network attacks, IDS, worms, virus
Frage 52
Frage
Which are the examples of DETECTION?
Antworten
-
Audit logs, intrusion detection system, network traffic monitoring
-
Employee communication, policy on company Intranet
-
Firewalls, router access control list, spam filters, virus scanners
-
Network attacks, IDS, worms, virus
Frage 53
Frage
What is encryption?
Antworten
-
Is the process of encoding a message so that its meaning is not obvious
-
Is the reverse process, transforming an encrypted message back into its normal, original form
-
Is the process of preventing any attacks from the hackers
Frage 54
Frage
In password protection, this is a random string of data or number used to modify a password hash
Antworten
-
Nonce
-
Ssl
-
One time password
-
Secret key
-
Public key
Frage 55
Frage
Using public key cryptography suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should:
Antworten
-
Encrypt the message with his private key, encrypt the result with Ailce’s public key and then send Alice the message
-
• Encrypt the message with his private key , encrypt yhe result with alices’ private key, and then send Alicce the message
-
• Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message
Frage 56
Frage
Which statement correctly describes the difference between a secure cipher and a secure hash?
Antworten
-
Cipher can be reversed, hash cannot
-
A hash can be reversed, a cipher cannot
-
A hash production a variable output fot any input size, a cipher does not
-
A cipher produces the same size output for any input size, a hash does not
Frage 57
Frage
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies
Antworten
-
• Brute force cracking
-
• Decryption
-
• Cryptoanalysis
-
• Cryptography
Frage 58
Frage
A well designed and configured _____ is like having single point of entry into your building with a security guard at the door allowing only authorized personnel into the building
Frage 59
Frage
Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with
Antworten
-
The CA’s private key
-
Bobs public key
-
The CAs public key
-
Bobs private key
Frage 60
Frage
Suppose Alice receives from Bob a message m with digital signature for one message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Antworten
-
Applies Bob’s public key to the digital signature applies to the hash function to m, and compares the results of the two operations.
-
Applies bobs public key to the digital signature, then a de-hashing function to the result. She then compares the result of this operation with the message m
-
Applies a de-hashing function to the digital signature and compares the result m
-
No correct answer