oku_kerek_tagy_byr_ret

Descripción

Computer Science Test sobre oku_kerek_tagy_byr_ret, creado por Daniyar Adilkhanov el 17/05/2018.
Daniyar Adilkhanov
Test por Daniyar Adilkhanov, actualizado hace más de 1 año
Daniyar Adilkhanov
Creado por Daniyar Adilkhanov hace alrededor de 6 años
138
1

Resumen del Recurso

Pregunta 1

Pregunta
A message is authentic and digitally signed if sent with:
Respuesta
  • a message digest/hash encrypted with the receiver’s public key
  • a message digest/hash encrypted with the receiver’s private key
  • a message digest/hash encrypted with the sender’s public key
  • a message digest/hash encrypted with the sender’s private key

Pregunta 2

Pregunta
Which of the following issues is not addressed by Kerberos:
Respuesta
  • availability.
  • privacy.
  • integrity.
  • authentication.

Pregunta 3

Pregunta
In Asymmetric-Key Cryptography, two keys, e and d, have a special relationship to
Respuesta
  • Others
  • Data
  • Keys
  • Each other

Pregunta 4

Pregunta
Substitutional cipers are
Respuesta
  • Monoalphabatic
  • Semialphabetic
  • Polyalphabetic
  • None of the above
  • Both monoalphabatic and polyalphabetic

Pregunta 5

Pregunta
Heart of Data Encryption Standard (DES), is the
Respuesta
  • Cipher
  • Rounds
  • Encryption
  • DES function

Pregunta 6

Pregunta
DES stands for
Respuesta
  • Data Encryption Standard
  • Data Encryption Subscription
  • Data Encryption Solutions
  • Data Encryption Slots

Pregunta 7

Pregunta
In symmetric key cryptography, key used by sender and receiver is
Respuesta
  • Shared
  • Different
  • two keys are used
  • None

Pregunta 8

Pregunta
In symmetric-key cryptography, key(s) used for encryption and decryption is/are
Respuesta
  • Same
  • Different
  • Private
  • Public

Pregunta 9

Pregunta
Keys used in cryptography are
Respuesta
  • secret key
  • private key
  • public key
  • All of them
  • None of them

Pregunta 10

Pregunta
Cryptography can provide
Respuesta
  • entity authentication
  • nonrepudiation of messages
  • confidentiality
  • None of them
  • All of them

Pregunta 11

Pregunta
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Respuesta
  • Data Size
  • Round Size
  • Key Size
  • Encryption Size

Pregunta 12

Pregunta
Cryptography algorithms (ciphers) are divided into
Respuesta
  • two groups
  • four groups
  • one single group
  • None

Pregunta 13

Pregunta
In Cryptography, original message, before being transformed, is called
Respuesta
  • Simpletext
  • Plaintext
  • Emptytext
  • Filledtext

Pregunta 14

Pregunta
SHA-l has a message digest of
Respuesta
  • 160 bits
  • 512 bits
  • 628 bits
  • 820 bits

Pregunta 15

Pregunta
A hash function guarantees integrity of a message. It guarantees that message has not be
Respuesta
  • Replaced
  • Over view
  • Changed
  • Left

Pregunta 16

Pregunta
To check integrity of a message, or document, receiver creates the
Respuesta
  • Cipher text
  • Hash
  • Hyper Text
  • Finger Print

Pregunta 17

Pregunta
A digital signature needs a
Respuesta
  • private-key
  • shared-key
  • public-key
  • All of them
  • None of them

Pregunta 18

Pregunta
Encryption and decryption provide secrecy, or confidentiality, but not
Respuesta
  • Authentication
  • Integrity
  • Keys
  • Frames
  • Confidentiality

Pregunta 19

Pregunta
When data must arrive at receiver exactly as they were sent, it is called
Respuesta
  • Message Confidentiality
  • Message Integrity
  • Message Splashing
  • Message Sending

Pregunta 20

Pregunta
In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
Respuesta
  • 512 Bit Blocks
  • 1023 Bit Blocks
  • 1001 Bit Blocks
  • 1510 Bit Blocks
  • 2024 Bit Blocks

Pregunta 21

Pregunta
Message privacy means that sender and receiver expect
Respuesta
  • Integrity
  • Confidentiality
  • Authentication
  • Nonrepudiation

Pregunta 22

Pregunta
Message must be encrypted at sender site and decrypted at the
Respuesta
  • Sender Site
  • Site
  • Receiver site
  • Conferencing

Pregunta 23

Pregunta
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if message is
Respuesta
  • Short
  • Huge
  • Complex
  • Thin
  • None of them

Pregunta 24

Pregunta
An encryption algorithm transforms plaintext into
Respuesta
  • Cipher text
  • Simple Text
  • Plain Text
  • Empty Text

Pregunta 25

Pregunta
A transposition cipher reorders (permutes) symbols in a
Respuesta
  • block of packets
  • block of slots
  • block of signals
  • block of symbols

Pregunta 26

Pregunta
Ciphers of today are called round ciphers because they involve
Respuesta
  • Single Round
  • Double Rounds
  • Multiple Round
  • Round about

Pregunta 27

Pregunta
RSA stands for
Respuesta
  • Rivest, Shamir, Adleman
  • Roger, Shamir, Adrian
  • Robert, Shamir, Anthoney
  • Rivest, Shaw, Adleman

Pregunta 28

Pregunta
_______ is the science and art of transforming messages to make them secure and immune to attacks.
Respuesta
  • Cryptography
  • Cryptoanalysis
  • Crypt
  • Encryption
  • None of them

Pregunta 29

Pregunta
The _______ is a number or a set of numbers on which the cipher operates.
Respuesta
  • cipher
  • nonce
  • secret
  • key
  • none of the above

Pregunta 30

Pregunta
In a(n) ________ cipher, the same key is used by both the sender and receiver.
Respuesta
  • symmetric-key
  • asymmetric-key
  • Public-key cryptography
  • RSA algorithm
  • None of them

Pregunta 31

Pregunta
In a(n) ________, the key is called the secret key.
Respuesta
  • symmetric-key
  • asymmetric-key
  • Public-key cryptography
  • All of them
  • None of them

Pregunta 32

Pregunta
In a(n) ________ cipher, a pair of keys is used
Respuesta
  • symmetric-key
  • asymmetric-key
  • Private-key cryptography
  • DES algorithm

Pregunta 33

Pregunta
The Caesar cipher is a _______cipher that has a key of 3.
Respuesta
  • transposition
  • additive
  • asymmetric
  • substitution
  • none of the above

Pregunta 34

Pregunta
The ________ cipher reorders the plaintext characters to create a ciphertext.
Respuesta
  • transposition
  • additive
  • asymmetric
  • substitution
  • shift

Pregunta 35

Pregunta
A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream.
Respuesta
  • S-box
  • P-box
  • T-box
  • none of the above
  • SP-boxes

Pregunta 36

Pregunta
A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.
Respuesta
  • S-box
  • P-box
  • T-box
  • none of the above
  • SP-boxes

Pregunta 37

Pregunta
DES is a(n) ________ method adopted by the U.S. government.
Respuesta
  • symmetric-key
  • asymmetric-key
  • decryption
  • encryption
  • None of them

Pregunta 38

Pregunta
DES has an initial and final permutation block and _________ rounds.
Respuesta
  • 14
  • 15
  • 12
  • 16
  • none of the above

Pregunta 39

Pregunta
DES uses a key generator to generate sixteen _______ round keys.
Respuesta
  • 32-bit
  • 48-bit
  • 56-bit
  • 42-bit
  • 64-bit

Pregunta 40

Pregunta
AES has _____ different configurations
Respuesta
  • two
  • three
  • four
  • five
  • AES has no configurations

Pregunta 41

Pregunta
One commonly used public-key cryptography method is the ______ algorithm.
Respuesta
  • RSS
  • RAS
  • RSA
  • RAA
  • DSS

Pregunta 42

Pregunta
The ________ method provides a one-time session key for two parties.
Respuesta
  • Diffie-Hellman
  • RSA
  • DES
  • AES
  • DSA

Pregunta 43

Pregunta
In symmetric cryptography, which of the following MUST be true:
Respuesta
  • The same key is used for encryption and decryption
  • Encryption and decryption take the same amount of time
  • Different algorithms are used for encryption and decryption
  • Cryptographic operations are one‐way, and not reversible

Pregunta 44

Pregunta
Message _____ means that the data must arrive at the receiver exactly as sent.
Respuesta
  • confidentiality
  • integrity
  • authentication
  • availability
  • none of the above

Pregunta 45

Pregunta
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
Respuesta
  • confidentiality
  • integrity
  • availability
  • authentication
  • none of the above

Pregunta 46

Pregunta
________ means to prove the identity of the entity that tries to access the system's resources.
Respuesta
  • Message authentication
  • Entity authentication
  • Message confidentiality
  • Message integrity
  • none of the above

Pregunta 47

Pregunta
Digital signature cannot provide ________ for the message.
Respuesta
  • integrity
  • confidentiality
  • nonrepudiation
  • authentication
  • availability

Pregunta 48

Pregunta
Challenge-response authentication can be done using ________.
Respuesta
  • symmetric-key ciphers
  • asymmetric-key ciphers
  • keyed hash function
  • keyless hash function
  • all of the above

Pregunta 49

Pregunta
A digital signature needs a(n)_________ system.
Respuesta
  • symmetric-key
  • asymmetric-key
  • both symmetric- and asymmetric-key cryptography
  • None of the above

Pregunta 50

Pregunta
The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
Respuesta
  • one-way property
  • collision-free property
  • both one-way and collision-free properties
  • none of the above

Pregunta 51

Pregunta
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Respuesta
  • Auditability
  • Confidentiality
  • Integrity
  • Availability
  • Identity

Pregunta 52

Pregunta
I have a company’s documents which are proprietary and a trade secret. How do I protect them from getting stolen?
Respuesta
  • Digitally sign the documents
  • Encrypt them using RSA or AES
  • Hash the data
  • Use decryption
  • None of them

Pregunta 53

Pregunta
Biometrics represents:
Respuesta
  • Something you know
  • Something you have
  • Something you are
  • All of the above
  • None of the above

Pregunta 54

Pregunta
In asymmetric encryption
Respuesta
  • same key is used for encryption and decryption
  • different keys are used encryption and decryption
  • no key is required for encryption and decryption
  • none of the mentioned

Pregunta 55

Pregunta
The sender “signs” a message as:
Respuesta
  • Digital Signature
  • Artificial Signature
  • Encrypted Signature
  • None of the above

Pregunta 56

Pregunta
In encryption:
Respuesta
  • Public key is used
  • Private key is used
  • Both public and private keys are used
  • None of the above

Pregunta 57

Pregunta
AES stands for:
Respuesta
  • Advanced Encryption Standard
  • Advanced Encryption System
  • Advanced Encryption Suggestion
  • None of the above

Pregunta 58

Pregunta
Authentication is:
Respuesta
  • Verification of user’s identification
  • Verification of the data
  • All answers are correct
  • No correct answer

Pregunta 59

Pregunta
The process to discover plaintext or key is known as
Respuesta
  • Cryptanalysis
  • Cryptography
  • Crypto design
  • Crypto processing
  • Cryptology

Pregunta 60

Pregunta
Output message in cryptography is called:
Respuesta
  • Plaintext
  • Ciphertext
  • Raw text
  • None of the above

Pregunta 61

Pregunta
Input message in cryptography is called:
Respuesta
  • Plaintext
  • Ciphertext
  • Encrypted text
  • None of the above

Pregunta 62

Pregunta
In cryptography
Respuesta
  • Information is transmitted from sender to receiver
  • No information is transmitted
  • Information is damaged
  • No correct answer

Pregunta 63

Pregunta
Secure hash algorithm(SHA) developed by:
Respuesta
  • National Institute of Standards and Technology (NIST) or NSA
  • IEEE
  • ANSI
  • None of the above

Pregunta 64

Pregunta
Conventional encryption is:
Respuesta
  • Symmetric encryption
  • Secret key encryption
  • Single key encryption
  • All of the above

Pregunta 65

Pregunta
In network security:
Respuesta
  • Data is protected from hackers
  • Data is protected from cracker
  • Both answers are possible
  • None of the above

Pregunta 66

Pregunta
DSS stands for:
Respuesta
  • Digital signature standard
  • Digital sound system
  • Digital simulation schemes
  • None of these

Pregunta 67

Pregunta
Cryptography ensures:
Respuesta
  • Confidentiality of data
  • Authentication of data
  • Integrity of data
  • All of the above

Pregunta 68

Pregunta
In network security:
Respuesta
  • Data is protected during transmission
  • Data is not protected during transmission
  • Data is changed
  • None of the above

Pregunta 69

Pregunta
Network security ensures:
Respuesta
  • Detecting attacks
  • Preventing attacks
  • Recovering attacks
  • All of the above

Pregunta 70

Pregunta
Encryption protects against:
Respuesta
  • Attacks
  • Viruses
  • Manipulation of data
  • All of the above

Pregunta 71

Pregunta
Authentication refers to:
Respuesta
  • Verification of user’s identity
  • Checking user’s privileges
  • Auditing user’s process
  • None of the above

Pregunta 72

Pregunta
The message is decrypted at ________ - side
Respuesta
  • Receiver
  • Sender
  • Broker
  • Attacker
  • All of the above

Pregunta 73

Pregunta
Cryptography relates to ______
Respuesta
  • Editing
  • Security
  • Testing
  • All of the above

Pregunta 74

Pregunta
Which of the following is not used for symmetric encryption?
Respuesta
  • RSA
  • DES
  • SHAI
  • RC4
  • MD5

Pregunta 75

Pregunta
Finding plaintext, without knowing key is know as:
Respuesta
  • Cryptography
  • Cryptanalysis
  • Cryptology
  • None of the above

Pregunta 76

Pregunta
Which of the following is a transposition cipher?
Respuesta
  • Caesar cipher
  • Vigenere cipher
  • One time pad
  • Playfair cipher

Pregunta 77

Pregunta
Which of the following is a monoalphabetic cipher?
Respuesta
  • Caesar Cipher
  • Lucifier cipher
  • Playfair cipher
  • No correct answer

Pregunta 78

Pregunta
RSA involves very large _____ numbers.
Respuesta
  • Prime
  • Even
  • Odd
  • Any random

Pregunta 79

Pregunta
Cryptology means
Respuesta
  • Cryptography + Cryptodesign
  • Cryptography + Cryptanalysis
  • Cryptography itself known as cryptology also
  • None of the above

Pregunta 80

Pregunta
Diffie-Hellman key exchange is vulnerable to:
Respuesta
  • Discrete logarithmic problem
  • Elliptic curve cryptography
  • Man-in-the-middle attack

Pregunta 81

Pregunta
None of these Which of the following is an example of a passive attack?
Respuesta
  • Modify
  • Denial of Service (DoS)
  • Masquerade
  • Traffic analysis

Pregunta 82

Pregunta
Which kind of service ensures that a message was received from the actual sender not from an attacker?
Respuesta
  • Confidentiality
  • Access Control
  • Integrity
  • Non-repudiation
  • Authentication

Pregunta 83

Pregunta
Which of the following is an active attack? I. Release of message contents; II. Traffic analysis; III. Modify; IV. Denial of Service
Respuesta
  • I and II
  • I and III
  • III and IV
  • II and IV
  • I, III and IV

Pregunta 84

Pregunta
The method of hiding the secret is called
Respuesta
  • Cryptography
  • Watermarking
  • Cryptanalysis
  • Steganography

Pregunta 85

Pregunta
It is the art of breaking the cipher
Respuesta
  • Cryptanalysis
  • Watermarking
  • Cryptography
  • Steganography

Pregunta 86

Pregunta
The field which deals with _____ called cryptography
Respuesta
  • Keys
  • Encryption techniques and secure systems
  • Firewalls, Kerberos and Intrusion detection systems
  • Operating systems

Pregunta 87

Pregunta
What would be the number of rounds in AES, if the key size is 24 bytes?
Respuesta
  • 10
  • 12
  • 14
  • 26

Pregunta 88

Pregunta
What would be the number of rounds in AES, if the key size is 32 bytes?
Respuesta
  • 10
  • 12
  • 14
  • 16

Pregunta 89

Pregunta
Which of the following step is absent in the last round of AES?
Respuesta
  • Shift row
  • Mix columns
  • Byte substitution
  • Add subkey

Pregunta 90

Pregunta
DES algorithm uses total ______ subkeys
Respuesta
  • 10
  • 12
  • 14
  • 16
  • 24

Pregunta 91

Pregunta
The total number of rounds in DES algorithm.
Respuesta
  • 10
  • 12
  • 14
  • 16
  • 24

Pregunta 92

Pregunta
Which of the following method provides a one-time session key for two parties?
Respuesta
  • Diffie-Hellman
  • RSA
  • DES
  • AES

Pregunta 93

Pregunta
What is the size of round key for DES algorithm?
Respuesta
  • 32-bit
  • 48-bit
  • 64-bit
  • 128-bit

Pregunta 94

Pregunta
What is the purpose of access control list?
Respuesta
  • to enforce a specified security policy
  • to prevent unauthorised access to data
  • to emphasize encryption
  • it is a key distribution center

Pregunta 95

Pregunta
Define a subject of Access Control List
Respuesta
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Pregunta 96

Pregunta
Define an object of Access Control List
Respuesta
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Pregunta 97

Pregunta
What does multilevel security mean?
Respuesta
  • Classification of information by the level of importance and permission of access by users with different security clearance
  • Classification of information by date and permission of access by users with different security clearance
  • Classification of information by the level of importance and permission of access by users name
  • Classification of information by date and permission of access by users name

Pregunta 98

Pregunta
How many levels are covered in multilevel security
Respuesta
  • 1
  • 2
  • 3
  • 4

Pregunta 99

Pregunta
No read up (read down) means
Respuesta
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Pregunta 100

Pregunta
No write down (write up) means
Respuesta
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Pregunta 101

Pregunta
What does “computationally infeasible to find data mapping to specific hash” mean?
Respuesta
  • One way property
  • Collision free property
  • Second way property
  • Collision property

Pregunta 102

Pregunta
Which of the following is not property of hash functions?
Respuesta
  • One wayness
  • Preimage resistance
  • Strong collision resistance
  • Long, unfixed output

Pregunta 103

Pregunta
The purpose of hash function is to
Respuesta
  • Create a message
  • Compress a message
  • Divide a message
  • Conquer a message

Pregunta 104

Pregunta
Which of the following refers requirement of digital signature?
Respuesta
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be computationally infeasible to forge

Pregunta 105

Pregunta
Which of the following refers requirement of digital signature?
Respuesta
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be practical to save digital signature in storage

Pregunta 106

Pregunta
What is the property of direct digital signature?
Respuesta
  • Assumed receiver has sender’s private key
  • Involves only sender
  • Can encrypt using receiver’s public key
  • Assumed sender has receiver’s private key

Pregunta 107

Pregunta
Define AAA.
Respuesta
  • Access After Anyone
  • Authentication Authorization Accounting
  • Authentication Authorization Access
  • Authentication Access Accounting

Pregunta 108

Pregunta
Which of the term refers to authorization?
Respuesta
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity
  • Accounting of service

Pregunta 109

Pregunta
Which of the term refers to accounting?
Respuesta
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity

Pregunta 110

Pregunta
Define X.509
Respuesta
  • TTP certifies trustworthiness of binding public key with its rightful owner’s identity
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Pregunta 111

Pregunta
Define a Kerberos
Respuesta
  • Trusted third party authentication system and makes no use of public key cryptography
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Pregunta 112

Pregunta
Which of the following does not refer for Kerberos property
Respuesta
  • Impeccability
  • Containment
  • Transparency
  • Viciousness

Pregunta 113

Pregunta
How BruteForce works
Respuesta
  • аttаckеr triеs еvеry possiblе combinаtion of chаrаctеrs
  • Install viruses
  • Attacker sends more data to an application than is expected
  • Attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability
Mostrar resumen completo Ocultar resumen completo

Similar

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr