Pregunta 1
Pregunta
This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Respuesta
-
Conditional access
-
Authentication
-
Identification
-
Anonymizer
-
Authorization
Pregunta 2
Pregunta
In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack
Pregunta 3
Pregunta
Why would reusing a ticket as a replay attack is Kerberos not be successful?
Respuesta
-
The tickets are encrypted
-
The tickets are digitally signed
-
The tickets are used a token
-
The tickets are time stamped
Pregunta 4
Pregunta
What is Man in the middle attack?
Respuesta
-
The attackers catch our employee in the middle of them and start applying physical pressure on them
-
The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras
-
The hacker jacks in a network and records all the information sent over the network
Pregunta 5
Pregunta
What is encryption strength is based on? Please select the best answer
Respuesta
-
The strength of the algorithm, the length of the key, and the secrecy of the key
-
The length of the key, the type of algorithm, and the strength of the key
-
The privacy of the key, the length of the algorithm, and the strength of the key
-
The strength of the key, the length of the algorithm, and the privacy of the key
Pregunta 6
Pregunta
One form of ‘something you have’ is the _____ and USB tokens
Respuesta
-
Fingerprint
-
Tokens
-
Identification
-
Password
-
Digital signatures
Pregunta 7
Pregunta
The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as (Please select the best answer)
Pregunta 8
Pregunta
What is a good way to make users in a network safer in the internet
Pregunta 9
Pregunta
When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a
Respuesta
-
It is known as the Man in the middle attack
-
It is known as the TCP/IP spoofing attack
-
It is known as the Back door attack
-
It is known as the Replay attack
Pregunta 10
Pregunta
In which of the following attack does the attacker capture a portion of the communication between two parties, modifies it, and inserts
Respuesta
-
Man-in-the-middle attack
-
Spoofing
-
Sniffing
-
Denial-of-service
Pregunta 11
Pregunta
A password represents
Respuesta
-
Something you have
-
None of the above
-
Something you are
-
Something you know
-
All of the above
Pregunta 12
Pregunta
List the main aspects of information security: I. Confidentiality II. Integrity III. Availability IV. Consistency
Respuesta
-
I-III-IV
-
I-III
-
I-II-III
-
I only
-
II-III-IV
Pregunta 13
Pregunta
Which of the following describes the challenge-response
Respuesta
-
A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
-
A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)
-
A special hardware device that is used to generate random text in a cryptography system
-
The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.
Pregunta 14
Pregunta
Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?
Pregunta 15
Pregunta
Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should
Respuesta
-
Encrypt the message with Alice’s public key and send Alice the message
-
Encrypt the message with Alice’s private key and send the encrypted message to Alice
-
Encrypt the message with his public key and send Alice the message
-
Encrypt the message with his private key and send the encrypted message to Alice
Pregunta 16
Pregunta
Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature
Respuesta
-
Bob applies a hash function to m and then encrypts the result with his private key
-
Bob applies a hash function to m and then encrypts the result with his public key
-
Bob applies a hash function to m and then encrypts the result with Alice’s public key
-
Bob encrypts m with his private key and then applies a hash function to the result
Pregunta 17
Pregunta
Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Respuesta
-
Applies Bob's public key to the digital signature, applies the has function to m, and compares the results of the two operations;
-
Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m;
-
Applies a de-hashing function to the digital signature and compare the result to m;
-
No correct answer;
Pregunta 18
Pregunta
Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with
Respuesta
-
The CA's private key
-
Bob’s public key
-
The CA's public key
-
Bob’s private key
Pregunta 19
Pregunta
A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.
Pregunta 20
Pregunta
Which security action should be finished before access is given to the network?
Respuesta
-
Identification and authorization
-
Identification and authentication
-
Authentication and authorization
-
Authentication and password
Pregunta 21
Pregunta
Which of the following types of encryption would BEST to use for a large amount of data?
Respuesta
-
Asymmetric
-
Symmetric
-
RSA
-
Hash
Pregunta 22
Pregunta
Which statement correctly describes the difference between a secure cipher and a secure hash?
Respuesta
-
A hash produces a variable output for any input size; a cipher does not.
-
A cipher can be reversed; a hash cannot.
-
A cipher produces the same size output for any input size; a hash does not.
Pregunta 23
Pregunta
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
Respuesta
-
Decryption
-
Cryptanalysis
-
Cryptography
-
Brute force cracking
Pregunta 24
Pregunta
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Respuesta
-
Auditability
-
Availability
-
Integrity
-
Confidentiality
Pregunta 25
Pregunta
Which of the following appears when an asset of the system become lost, unavailable or unusable?
Respuesta
-
Interception
-
Interruption
-
Interpretation
-
Modification
-
Fabrication
Pregunta 26
Pregunta
Show incorrect kind of threats
Respuesta
-
Interception
-
Interruption
-
Interpretation
-
Modification
-
Fabrication
Pregunta 27
Pregunta
Bock cipher maps each plaintext block to :
Pregunta 28
Pregunta
What is vulnerability?
Respuesta
-
A weakness in the security system
-
A Method which uses flaws to have more access, privileges or resources to the system
-
A method which used to eliminate or reduce threats
-
A kind of auth to system
Pregunta 29
Pregunta
A(n) _____ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through
Pregunta 30
Pregunta
What is assumed by cipher in cryptography ?
Pregunta 31
Pregunta
What is assumed by ciphertext in cryptography?
Pregunta 32
Pregunta
What is assumed by plaintext in cryptography?
Pregunta 33
Pregunta
In cryptography, what is key?
Respuesta
-
Info used to cipher, known only to sender and receiver
-
Algorithm for transforming plaintext to ciphertext
-
Encrypted message
-
Recovering plaintext from ciphertext
-
Converting plaintext to ciphertext
Pregunta 34
Pregunta
What is cryptoanalysis?
Respuesta
-
Study of principles/methods deciphering ciphertext without knowing key
-
Info used to cipher, known only to sender and receiver
-
Algorithm for transforming plaintext to ciphertext
-
Recovering plaintext from ciphertext
-
Converting plaintext to ciphertext
Pregunta 35
Pregunta
In asymmetric key cryptography, the public key for decryption is kept by:
Pregunta 36
Pregunta
Which of these are threats against to modern computer?
Respuesta
-
Network attacks, firewall and worms
-
Viruses, worms and encryption
-
Network attacks, viruses and worms
-
Viruses, network encryptions and worms
Pregunta 37
Pregunta
How the industry solves the threats ?
Respuesta
-
Firewall, IDS, Kerberos, blogs
-
IDS, firewall, authentication, policies
-
Virus, worms, attacks, web-sites
-
Network attacks, IDS, worms, virus
Pregunta 38
Pregunta
Which one of the following algorithm is not used in asymmetric key cryptography?
Respuesta
-
RSA algorithm
-
Diffle-Hellman algorithm
-
DES algorithm
-
DSA algorithm
Pregunta 39
Pregunta
In cryptography, the order of the order of the letters in a message in rearranged by
Pregunta 40
Pregunta
What is data encryption standard (DES)?
Respuesta
-
Block cipher
-
stream cipher
-
bit cipher
-
none of the mentioned
Pregunta 41
Pregunta
Cryptanalysis is used:
Pregunta 42
Pregunta
Cryptographic hash function takes an arbitrary block of data and returns
Respuesta
-
Fixed site bit string
-
variable size bit string
-
none of the mentioned
-
both of the mentioned
Pregunta 43
Pregunta
A substitution cipher substitutions one symbol with
Respuesta
-
Keys
-
Others
-
Multi Parties
-
Single Party
Pregunta 44
Pregunta
An asymmetric-key(or public key ) cipher uses
Pregunta 45
Pregunta
In the computer industry the “What you have” method is use of?
Respuesta
-
Passwords
-
Smart cards
-
Digital certificates’
Pregunta 46
Pregunta
A smartcard represents
Respuesta
-
None of the above
-
Something you are
-
All of the above
-
Something you have
-
Something you know
Pregunta 47
Pregunta
Convert one symbol of plaintext immediately into a symbol of cipher text (example:Caesar cipher)
Respuesta
-
Encryption
-
Plaintext
-
Block cipher
-
stream ciphers
Pregunta 48
Respuesta
-
Asset lost, unusable, unavailable
-
Unauthorized access
-
Unauthorized change, tamper of data
-
Ex. Unauthorized add data to a DB
Pregunta 49
Respuesta
-
Unauthorized change, tamper of data
-
Asset lost, unusable, unavailable
-
Unauthorized access
-
Ex. Unauthorized add data to a DB
Pregunta 50
Pregunta
Which are the examples of DEFENCE?
Respuesta
-
Firewalls, router access control list, spam filters, virus scanners
-
Employee communication, policy on company Intranet
-
Audit logs, intrusion detection system, network traffic monitoring
-
Network attacks, IDS, worms, virus
Pregunta 51
Pregunta
Which are the examples of DETERRENCE?
Respuesta
-
Employee communication, policy on company Intranet
-
Firewalls, router access control list, spam filters, virus scanners
-
Audit logs, intrusion detection system, network traffic monitoring
-
Network attacks, IDS, worms, virus
Pregunta 52
Pregunta
Which are the examples of DETECTION?
Respuesta
-
Audit logs, intrusion detection system, network traffic monitoring
-
Employee communication, policy on company Intranet
-
Firewalls, router access control list, spam filters, virus scanners
-
Network attacks, IDS, worms, virus
Pregunta 53
Pregunta
What is encryption?
Respuesta
-
Is the process of encoding a message so that its meaning is not obvious
-
Is the reverse process, transforming an encrypted message back into its normal, original form
-
Is the process of preventing any attacks from the hackers
Pregunta 54
Pregunta
In password protection, this is a random string of data or number used to modify a password hash
Respuesta
-
Nonce
-
Ssl
-
One time password
-
Secret key
-
Public key
Pregunta 55
Pregunta
Using public key cryptography suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should:
Respuesta
-
Encrypt the message with his private key, encrypt the result with Ailce’s public key and then send Alice the message
-
• Encrypt the message with his private key , encrypt yhe result with alices’ private key, and then send Alicce the message
-
• Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message
Pregunta 56
Pregunta
Which statement correctly describes the difference between a secure cipher and a secure hash?
Respuesta
-
Cipher can be reversed, hash cannot
-
A hash can be reversed, a cipher cannot
-
A hash production a variable output fot any input size, a cipher does not
-
A cipher produces the same size output for any input size, a hash does not
Pregunta 57
Pregunta
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies
Respuesta
-
• Brute force cracking
-
• Decryption
-
• Cryptoanalysis
-
• Cryptography
Pregunta 58
Pregunta
A well designed and configured _____ is like having single point of entry into your building with a security guard at the door allowing only authorized personnel into the building
Pregunta 59
Pregunta
Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with
Respuesta
-
The CA’s private key
-
Bobs public key
-
The CAs public key
-
Bobs private key
Pregunta 60
Pregunta
Suppose Alice receives from Bob a message m with digital signature for one message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Respuesta
-
Applies Bob’s public key to the digital signature applies to the hash function to m, and compares the results of the two operations.
-
Applies bobs public key to the digital signature, then a de-hashing function to the result. She then compares the result of this operation with the message m
-
Applies a de-hashing function to the digital signature and compares the result m
-
No correct answer