Dina  Kim
Quiz by , created more than 1 year ago

Quiz on CS_InfSec, created by Dina Kim on 26/03/2019.

158
5
0
No tags specified
Dina  Kim
Created by Dina Kim over 5 years ago
Close

CS_InfSec

Question 1 of 96

1

Which of the following is not a fundamental security goal?

Select one of the following:

  • assurance

  • confidentiality

  • all of the statements are correct

  • integrity

  • availability

Explanation

Question 2 of 96

1

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

Select one of the following:

  • Trojan Horse

  • Virus

  • Logic Bomb

  • OPSEC

  • Worm

Explanation

Question 3 of 96

1

A(n) ____ is one that encrypts a digital data stream one bit or one byte at a time

Select one of the following:

  • stream cipher

  • symmetric cipher

  • none of the statements

  • asymmetric cipher

  • block cipher

Explanation

Question 4 of 96

1

A pair of keys that have been selected so that if one is used for encryption the other is used for decryption in public key cryptosystem

Select one of the following:

  • public and private keys

  • public and cipher keys

  • encryption and decryption keys

  • none of the statements

  • plain and cipher keys

Explanation

Question 5 of 96

1

Free from mistake or error and having the value that the end-user expects

Select one of the following:

  • Accuracy

  • Authenticity

  • Confidentiality

  • Availability

  • Authentication

Explanation

Question 6 of 96

1

Which of these is possibly the worst password that user can choose

Select one of the following:

  • Nursulatan1612

  • k@zaKh

  • a$tana8567

  • aLm4tyc?TY

  • none of the statements

Explanation

Question 7 of 96

1

What is plaintext?

Select one of the following:

  • the original intelligible message or data that is fed into the algorithm as input

  • the original intelligible message or data that is produced as output

  • none of the statements

  • the scrambled message produced as output

  • the scrambled message or data that is fed into the algorithm as output

Explanation

Question 8 of 96

1

Which of the following statement is not true?

Select one of the following:

  • The public key is kept secret while the private key may be widely distributed

  • Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys

  • The public key and private key are mathematically related

  • The private key cannot be practically derived from the public

  • Asymmetric cryptography is also known as public key cryptography

Explanation

Question 9 of 96

1

A function that is easily computed and the calculation of its inverse is infeasible unless certain privileged information is known

Select one of the following:

  • Trapdoor one-way function

  • Virus

  • Logical Bomb

  • Trojan Horse

  • Worm

Explanation

Question 10 of 96

1

What is encryption algorithm

Select one of the following:

  • performs various substitutions and transformations on the plaintext

  • it takes the ciphertext and the secret key and produces the original plaintext

  • the scrambled message produced as output

  • performs various substitutions and transformations on the ciphertext

  • random stream of data and, as it stands, is unintelligible

Explanation

Question 11 of 96

1

Which of the statement is property for p and q

Select one of the following:

  • p and q are prime

  • p is greater than q

  • p and q should be of similar bit length

  • p and q are distinct

  • p - q -1

Explanation

Question 12 of 96

1

DMZ what is one advantage of setting up a DMZ with two firewalls

Select one of the following:

  • you can control where traffic goes in the three networks

  • you can do stateful packet filtering

  • you can do load balancing

  • improved network performance

  • all of the statements

Explanation

Question 13 of 96

1

Program that can replicate itself and send copies from computer to computer across network connections. usually performs some unwanted function

Select one of the following:

  • worm

  • trojan house

  • virus

  • logical bomb

  • opsec

Explanation

Question 14 of 96

1

In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of p and q?

Select one of the following:

  • p = 5, q = 7

  • p = 1, q = 35

  • p = q = e =5

  • p = 6, q = 8

  • p = q = n = 35

Explanation

Question 15 of 96

1

Fill the blank space to complete the text.

Encrypt the message WELCOME! Using Caesar cipher with the key = 34’

Explanation

Question 16 of 96

1

Which of the following is form of malware

Select one of the following:

  • all of the statements are correct

  • rootkits

  • viruses

  • worms

  • scripts

Explanation

Question 17 of 96

1

Which of the following is not true?

Select one of the following:

  • A user must protect his/her public key

  • A user does not have to protect his/her public key

  • A user will have his/her own public key

  • A user will have his/her own private key

  • A user must remember his/her password that encrypts the public key

Explanation

Question 18 of 96

1

Which of these statements is true

Select one of the following:

  • In symmetric key cryptography the key that is used to encrypt data is the same key that is used to decrypt it

  • The encryption algorithm performs its steps using the key to alter the ciphertext and convert it to plaintext

  • The term "key" comes from the fact that the password you can choose works in the same way that a conventional key works

  • In cryptography, to protect the contents of your files, you can install a lock on your door

  • The decryption algorithm performs its steps using the key to alter the plaintext and convert it to ciphertext

Explanation

Question 19 of 96

1

The _________ is a number or a set of numbers on which the cipher operates

Select one of the following:

  • key

  • plaintext

  • cipher

  • secret

  • ciphertext

Explanation

Question 20 of 96

1

embedded in a computer program that checks for a certain set of conditions to be present on the system. When these conditions are met, it executes some function resulting in unauthorized actions

Select one of the following:

  • Logic bomb

  • Worm

  • OPSEC

  • Trojan House

  • Virus

Explanation

Question 21 of 96

1

The quality of state of having ownership or control of some object or item

Select one of the following:

  • possession

  • confidentiality

  • integrity

  • utility

  • authentication

Explanation

Question 22 of 96

1

Which one of the statement is a formula to find plain in RSA

Select one of the following:

  • M = c^d(mod n)

  • M = c^n(mod d)

  • M = c^e(mod n)

  • M = c^e(mod d)

  • M = c^n(mod e)

Explanation

Question 23 of 96

1

One objective of cryptography is property of being accessible and usable upon demand by an authorized entity

Select one of the following:

  • availability

  • denial of service

  • confidentiality

  • reliability

  • authentication

Explanation

Question 24 of 96

1

The vigenere cipher is which of the following types

Select one of the following:

  • polyalphabetic

  • monoalphabetic

  • none of the statements

  • asymmetric

  • diaplhabetic

Explanation

Question 25 of 96

1

The word asymmetric in public key cryptography means

Select one of the following:

  • The key to encrypt is different to the key to decrypt

  • The algorithm to encrypt is different from the algorithm to decrypt

  • None of the listed answers

  • The key to encrypt is the same with the key to decrypt

  • The algorithm to encrypt is the same with the algorithm to decrypt

Explanation

Question 26 of 96

1

A _________ cipher replaces one character with another character.

Select one of the following:

  • Substitution

  • Transposition

  • Reversing

  • Cultivation

  • Multiplication

Explanation

Question 27 of 96

1

Which one of the statement is a formula to find cipher in RSA

Select one of the following:

  • C =m^e(mod n)

  • C =m^n(mod d)

  • C =m^d(mod n)

  • C =m^n(mod e)

  • C =m^e(mod d)

Explanation

Question 28 of 96

1

In the rsa key the public key of a given user is e=31, n=3599. What is the value of p and q

Select one of the following:

  • P= 61, Q= 59

  • P= 1, Q= 3599

  • P= Q = N= 3599

  • P= Q= E = 31

  • P= 62, Q= 60

Explanation

Question 29 of 96

1

Fill the blank space to complete the text.

Find d using rsa algorithm, if p = 5, q= 11, e = 3; M = 9

Explanation

Question 30 of 96

1

Fill the blank space to complete the text.

In a public – key system using rsa you intercept the ciphertext C = 10 sent to a user whose public key is e = 5 ; n = 35 what is the fi(n)?

Explanation

Question 31 of 96

1

Which of the following statement is properties of public key encryption

Select one of the following:

  • the sender and receiver must each have one of the matched pair of keys(not the same one)

  • one algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption

  • one of the two keys must be kept secret

  • the sender and receiver must share the algorithm and the key

  • the same algorithm with the same key is used for encryption and decryption

Explanation

Question 32 of 96

1

If a wrong key is entered to decrypt a message what will happen

Select one of the following:

  • The output will be gibberish

  • The output will not be visible

  • There is an error message

  • The cryptosystem will stop working

  • Nothing will happen

Explanation

Question 33 of 96

1

A ___ - level proxy inspects the entire packet and makes access decisions based on the contents of the packet

Select one of the following:

  • Application

  • Physical

  • Server

  • Proxy

  • Circuit

Explanation

Question 34 of 96

1

One objective of cryptography is keeping information secret from all but those who are authorised to see it. The term referring to this is:

Select one of the following:

  • Confidentiality

  • Secrecy

  • Witnessing

  • Authorisation

  • Anonymity

Explanation

Question 35 of 96

1

Fill the blank space to complete the text.

One of the keys used in an asymmetric encryption system. The public key is made public to be used in conjunction with a corresponding private key

Explanation

Question 36 of 96

1

A program that secretly takes over another internet attached computer and then uses that computer to lunch attacks that are difficult to trace to the creator

Select one of the following:

  • Zombie

  • Virus

  • Logical Bomb

  • OPSEC

  • Worm

Explanation

Question 37 of 96

1

According to DAD triad, _______ attempts to defeat availability

Select one of the following:

  • Destruction

  • Availability

  • Disclosure

  • Alteration

  • Confidentiality

Explanation

Question 38 of 96

1

The process of verifying and identify claimed by or for a system entity

Select one of the following:

  • Authentication

  • Timestamping

  • Confirmation

  • Processing

  • Validation

Explanation

Question 39 of 96

1

______ is a form of cryptosystem in which encryption and decryption are performed using two different keys one a public key and one a private key

Select one of the following:

  • Asymmetric encryption

  • Symmetric encryption

  • Synchronous encryption

  • None of the statements

  • Asynchronous encryption

Explanation

Question 40 of 96

1

One objective of cryptography is conveyance, to another entity, of official sanction to do or be something. The term referring to this is:

Select one of the following:

  • Authorisation

  • Entity authentication

  • Validation

  • Certificate

  • Confirmation

Explanation

Question 41 of 96

1

Fill the blank space to complete the text.

If the encrypted message is XBPG and deciphered text is QUIZ using the Caesar cipher, what is the value of key

Explanation

Question 42 of 96

1

A pair of key that have been selected so that if one is used for encryption, the other is used for decryption in Public-key cryptosystem

Select one of the following:

  • public and private keys

  • plain and cipher keys

  • none of the statements

  • public and cipher keys

  • encryption and decryption keys

Explanation

Question 43 of 96

1

Set of hacker tools after attacker has broken into a computer system and gained root-level access

Select one of the following:

  • rootkits

  • root-level hack

  • assets

  • zombie

  • virus

Explanation

Question 44 of 96

1

Which of the following statement is ingredients for a public key encryption scheme

Select one of the following:

  • all of the statements

  • encryption/decryption algorithm

  • plaintext

  • public/private keys

  • ciphertext

Explanation

Question 45 of 96

1

In a public-key system using RSA you intercept the ciphertext C = 10 sent to a user whose public key is e = 5; n = 35. What is the value of p and q?

Select one of the following:

  • P=5; q=7

  • P=6; q=8

  • P=q=e=5

  • P=1; q=35

  • p = q= n = 35

Explanation

Question 46 of 96

1

which of the following statement is not true

Select one of the following:

  • the public key can be used to derive the private key

  • the foundation of public-key algorithm is a one way function

  • all of the listed answers are true

  • the private key operates as a trap door that allows the owner to recover the original data

  • reversing the process of encryption is virtually impossible without the private key

Explanation

Question 47 of 96

1

Consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security

Select one of the following:

  • virtual private network

  • demilitarized zone

  • anti-spoofing

  • firewalls

  • network address translation

Explanation

Question 48 of 96

1

you can use _________ to protect your computer from outsiders

Select one of the following:

  • antivirus software and personal firewall programs

  • system restore and antivirus software

  • personal firewall programs and system restore

  • antivirus software and the Recycle Bin

  • firewall programs and the Recycle Bin

Explanation

Question 49 of 96

1

One objective of cryptography is ensuring information has not been altered by unauthorised or unknown means. The term referring to this is:

Select one of the following:

  • data integrity

  • message authentication

  • confirmation

  • authorisation

  • validation

Explanation

Question 50 of 96

1

Fill the blank space to complete the text.

encrypt the message WELCOME! Using Caesar cipher with the key = 5

Explanation

Question 51 of 96

1

A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption

Select one of the following:

  • Symmetric encryption

  • One key encryption

  • Private key encryption

  • Asymmetric encryption

  • Same key encryption

Explanation

Question 52 of 96

1

Fill the blank space to complete the text.

In a public key system using RSA you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n =35. What will be the fi(n)?

Explanation

Question 53 of 96

1

A secret data value usually a character string that’s used as authentication information

Select one of the following:

  • password

  • secret key

  • key

  • OPSEC

  • DMZ

Explanation

Question 54 of 96

1

code embedded within a program that causes a copy of itself to be inserted in one of more other programs. Usually performs some unwanted function

Select one of the following:

  • virus

  • zombie

  • all of the statements

  • worm

  • firewall

Explanation

Question 55 of 96

1

Fill the blank space to complete the text.

In public-key system using rsa, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M

Explanation

Question 56 of 96

1

Secret undocumented entry point into a program, used to grant access without normal methods of access authentication

Select one of the following:

  • Trapdoor

  • Virus

  • Trojan Horse

  • Logic Bomb

  • Worm

Explanation

Question 57 of 96

1

One objective of cryptography is identifying and acknowledging the identity of entity. The term referring to this is:

Select one of the following:

  • identification

  • message authentication

  • confirmation

  • validation

  • witnessing

Explanation

Question 58 of 96

1

Fill the blank space to complete the text.

Decipher the ciphertext QMHXIVQ using Caesar Cipher with the key = 4

Explanation

Question 59 of 96

1

Weakness of a system that could be accidentally or intentionally exploited to damage assets

Select one of the following:

  • Vulnerabilities

  • DMZ

  • Risk

  • Treats

  • Assets

Explanation

Question 60 of 96

1

Some _____ firewalls are able to examine the contents of packets as well as the headers for signs that they ate legitimate.

Select one of the following:

  • Stateful

  • Personal

  • Stateless

  • Boundary

Explanation

Question 61 of 96

1

provides a user with protection against discovery and misuse of his or her identity by other users

Select one of the following:

  • privacy

  • misuse

  • identification

  • ptotection

  • all of the statements

Explanation

Question 62 of 96

1

Fill the blank space to complete the text.

Use the playfair cipher with the keyword “PLAYFAIR” to encrypt the message “GOTO”

Explanation

Question 63 of 96

1

Fill the blank space to complete the text.

In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of d?

Explanation

Question 64 of 96

1

Base elements of information such as numbers, letters, symbols and so on which are processed or carried out by human (or by some machine)

Select one of the following:

  • Data

  • Context

  • Bytes

  • Information

  • Bits

Explanation

Question 65 of 96

1

What does firewall do

Select one of the following:

  • Protects your computer from internet intrusion

  • Restores lost data on your computer

  • Checks floppy or CDs for corrupted files

  • Scans for viruses on your system

  • Protects against power surges

Explanation

Question 66 of 96

1

Fill the blank space to complete the text.

Perform decryption using the rsa algorithm if p = 5; q = 11, e = 3; c =14

Explanation

Question 67 of 96

1

Which of the statement is true

Select one of the following:

  • The larger the key size the greater the range of possible values a key can be

  • The larger the key size the smaller the range of possible values a key can be

  • The larger the key size the range of possible values a key can be remains the same

  • The smaller the key size the greater the range of possible values a key can be

  • The smaller the key size the range of possible values a key can be remains the same

Explanation

Question 68 of 96

1

What of the following statements is true

Select one of the following:

  • Public key algorithms are slow compared to symmetric cryptography

  • None of the listed answers

  • Public key algorithms are used to hash the password

  • Public key algorithms are used to encrypt the message

  • Public key algorithms are used to encrypt the key encryption key

Explanation

Question 69 of 96

1

what is decryption algorithm

Select one of the following:

  • takes the ciphertext and the secret key and produces the original plaintext

  • none of the statements are true

  • the original intelligible message or data that is fed into the algorithm as input

  • the scrambled message produced as output

  • performs various substitutions and transformations on the plaintext

Explanation

Question 70 of 96

1

A stateful firewall maintains a ______ , which is a list of active connections

Select one of the following:

  • State table

  • Connection table

  • Hub table

  • Routing table

  • Bridging table

Explanation

Question 71 of 96

1

Possibility of an incident or attack to cause damage to your enterprise

Select one of the following:

  • Risk

  • Virus

  • Security

  • Assets

  • Malware

Explanation

Question 72 of 96

1

According to dad triad, _______ attempts to defeat confidentiality

Select one of the following:

  • disclosure

  • alteration

  • confidentiality

  • availability

  • destruction

Explanation

Question 73 of 96

1

Fill the blank space to complete the text.

Find d using rsa algorithm, if p = 3, q= 11, e = 7; M = 5

Explanation

Question 74 of 96

1

According to dad triad, _______ attempts to defeat integrity

Select one of the following:

  • Alteration

  • Confidentiality

  • Availability

  • Destruction

  • Disclosure

Explanation

Question 75 of 96

1

One objective of cryptography is prevention of authorized access to resources or the delaying of time-critical operations

Select one of the following:

  • Denial of service

  • Confidentiality

  • Availability

  • Authentication

  • Reliability

Explanation

Question 76 of 96

1

A public key encryption algorithm based on exponentiation in modular arithmetic. It is the only algorithm generally accepted as practical and secure for public key encryption

Select one of the following:

  • RSA

  • Caesar cipher

  • Playfair Cipher

  • Vigenere Cipher

  • Hill Cipher

Explanation

Question 77 of 96

1

Which of the following statements are types of firewalls?

Select one or more of the following:

  • Application level gateways

  • Packet – filtering

  • Circuit-level gateways

  • Session-level gateways

  • Internet-level gateways

Explanation

Question 78 of 96

1

Fill the blank space to complete the text.

What will be the value of key in Caesar Cipher if initially key = 65

Explanation

Question 79 of 96

1

The key used in a symmetric encryption system. Both participants must share the same key and this key must remain secret to protect communication

Select one of the following:

  • Secret key

  • Symmetric key

  • Public key

  • Private key

  • Asymmetric key

Explanation

Question 80 of 96

1

if you encrypt a ciphertext using right key, you will get

Select one of the following:

  • gibberish

  • ciphertext

  • plaintext

  • error message

  • key

Explanation

Question 81 of 96

1

Which one of the statement is equation for fi(n)?

Select one of the following:

  • Fi(n) = (p-1)(q-1)

  • Fi(n) = (p-1)(q)

  • Fi(n) = (p-q)(q-1)

  • Fi(n) = pq

  • Fi(n) = (p)(q-1)

Explanation

Question 82 of 96

1

Which of the following statement(s) is(are) the Security Principles

Select one of the following:

  • All of the statements

  • Separation of privileges

  • Least privilege

  • Defense in depth

  • Security through obscurity (the inadvisability thereof)

Explanation

Question 83 of 96

1

Fill the blank space to complete the text.

In a public key system using RSA you intercept the plaintext M=25 sent to user whose public key is e = 5; n =35. What will be the ciphertext C?

Explanation

Question 84 of 96

1

The Caesar cipher is a _______ cipher that has a key of 3

Select one of the following:

  • Shift

  • Transposition

  • Additive

  • Subtractive

  • Multiplicative

Explanation

Question 85 of 96

1

Secret undocumented entry point into a program, used to grant access without normal methods of access authentication

Select one of the following:

  • Trapdoor

  • Virus

  • Worm

  • Trojan Horse

  • Logic Bomb

Explanation

Question 86 of 96

1

Fill the blank space to complete the text.

One of the two keys used on an asymmetric encryption system. For secure communication, the private key should only be known to its creator

Explanation

Question 87 of 96

1

Which of these is not considered as a symmetric key algorithm

Select one of the following:

  • rsa

  • playfair cipher

  • hill cipher

  • caesar cipher

  • vigenere cipher

Explanation

Question 88 of 96

1

The quality of state of being genuine or original rather than a reproduction or fabrication

Select one of the following:

  • Authenticity

  • Availability

  • Authentication

  • Confidentiality

  • Accuracy

Explanation

Question 89 of 96

1

Fill the blank space to complete the text.

Perform encryption using the rsa algorithm if p = 3 q= 11 e = 7 M = 5

Explanation

Question 90 of 96

1

A process of identifying, analysing and controlling critical information

Select one of the following:

  • OPSEC

  • Firewall

  • Scanning

  • DMZ

  • Anti-virus

Explanation

Question 91 of 96

1

____ is another term for a packet of digital information

Select one of the following:

  • datagram

  • data

  • bits

  • header

  • footer

Explanation

Question 92 of 96

1

________ is the science and art of transforming messages to make them secure and immune to attacks

Select one of the following:

  • Cryptography

  • Cryptosystem

  • None of the statements

  • Cryptoanalysis

  • Confidentiality

Explanation

Question 93 of 96

1

Which of the statement(s) is(are) properties for p an q

Select one of the following:

  • p an q are prime

  • p an q are distinct

  • p = q -1

  • p is greater than q

  • p and q should be of similar bit length

Explanation

Question 94 of 96

1

Fill the blank space to complete the text.

The translation of encrypted text or data (called ciphertext) into original text or data (called plaintext). Also called deciphering

Explanation

Question 95 of 96

1

Which of these is not considered as a symmetric key algorithm

Select one of the following:

  • RSA

  • Hill Cipher

  • Playfair Cipher

  • Caesar cipher

  • Vigenere Cipher

Explanation

Question 96 of 96

1

A combination of an encryption algorithm and decryption is called a _____

Select one of the following:

  • Cipher

  • Key

  • Polyalphabetic cipher

  • Secret

  • Substitution

Explanation