Pregunta 1
Pregunta
A message is authentic and digitally signed if sent with:
Respuesta
-
a message digest/hash encrypted with the receiver’s public key
-
a message digest/hash encrypted with the receiver’s private key
-
a message digest/hash encrypted with the sender’s public key
-
a message digest/hash encrypted with the sender’s private key
Pregunta 2
Pregunta
Which of the following issues is not addressed by Kerberos:
Respuesta
-
availability.
-
privacy.
-
integrity.
-
authentication.
Pregunta 3
Pregunta
In Asymmetric-Key Cryptography, two keys, e and d, have a special relationship to
Respuesta
-
Others
-
Data
-
Keys
-
Each other
Pregunta 4
Pregunta
Substitutional cipers are
Pregunta 5
Pregunta
Heart of Data Encryption Standard (DES), is the
Respuesta
-
Cipher
-
Rounds
-
Encryption
-
DES function
Pregunta 6
Pregunta 7
Pregunta
In symmetric key cryptography, key used by sender and receiver is
Respuesta
-
Shared
-
Different
-
two keys are used
-
None
Pregunta 8
Pregunta
In symmetric-key cryptography, key(s) used for encryption and decryption is/are
Respuesta
-
Same
-
Different
-
Private
-
Public
Pregunta 9
Pregunta
Keys used in cryptography are
Respuesta
-
secret key
-
private key
-
public key
-
All of them
-
None of them
Pregunta 10
Pregunta
Cryptography can provide
Pregunta 11
Pregunta
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Respuesta
-
Data Size
-
Round Size
-
Key Size
-
Encryption Size
Pregunta 12
Pregunta
Cryptography algorithms (ciphers) are divided into
Respuesta
-
two groups
-
four groups
-
one single group
-
None
Pregunta 13
Pregunta
In Cryptography, original message, before being transformed, is called
Respuesta
-
Simpletext
-
Plaintext
-
Emptytext
-
Filledtext
Pregunta 14
Pregunta
SHA-l has a message digest of
Respuesta
-
160 bits
-
512 bits
-
628 bits
-
820 bits
Pregunta 15
Pregunta
A hash function guarantees integrity of a message. It guarantees that message has not be
Respuesta
-
Replaced
-
Over view
-
Changed
-
Left
Pregunta 16
Pregunta
To check integrity of a message, or document, receiver creates the
Respuesta
-
Cipher text
-
Hash
-
Hyper Text
-
Finger Print
Pregunta 17
Pregunta
A digital signature needs a
Respuesta
-
private-key
-
shared-key
-
public-key
-
All of them
-
None of them
Pregunta 18
Pregunta
Encryption and decryption provide secrecy, or confidentiality, but not
Respuesta
-
Authentication
-
Integrity
-
Keys
-
Frames
-
Confidentiality
Pregunta 19
Pregunta
When data must arrive at receiver exactly as they were sent, it is called
Respuesta
-
Message Confidentiality
-
Message Integrity
-
Message Splashing
-
Message Sending
Pregunta 20
Pregunta
In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
Respuesta
-
512 Bit Blocks
-
1023 Bit Blocks
-
1001 Bit Blocks
-
1510 Bit Blocks
-
2024 Bit Blocks
Pregunta 21
Pregunta
Message privacy means that sender and receiver expect
Respuesta
-
Integrity
-
Confidentiality
-
Authentication
-
Nonrepudiation
Pregunta 22
Pregunta
Message must be encrypted at sender site and decrypted at the
Respuesta
-
Sender Site
-
Site
-
Receiver site
-
Conferencing
Pregunta 23
Pregunta
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if message is
Respuesta
-
Short
-
Huge
-
Complex
-
Thin
-
None of them
Pregunta 24
Pregunta
An encryption algorithm transforms plaintext into
Respuesta
-
Cipher text
-
Simple Text
-
Plain Text
-
Empty Text
Pregunta 25
Pregunta
A transposition cipher reorders (permutes) symbols in a
Respuesta
-
block of packets
-
block of slots
-
block of signals
-
block of symbols
Pregunta 26
Pregunta
Ciphers of today are called round ciphers because they involve
Respuesta
-
Single Round
-
Double Rounds
-
Multiple Round
-
Round about
Pregunta 27
Respuesta
-
Rivest, Shamir, Adleman
-
Roger, Shamir, Adrian
-
Robert, Shamir, Anthoney
-
Rivest, Shaw, Adleman
Pregunta 28
Pregunta
_______ is the science and art of transforming messages to make them secure and immune to attacks.
Respuesta
-
Cryptography
-
Cryptoanalysis
-
Crypt
-
Encryption
-
None of them
Pregunta 29
Pregunta
The _______ is a number or a set of numbers on which the cipher operates.
Respuesta
-
cipher
-
nonce
-
secret
-
key
-
none of the above
Pregunta 30
Pregunta
In a(n) ________ cipher, the same key is used by both the sender and receiver.
Respuesta
-
symmetric-key
-
asymmetric-key
-
Public-key cryptography
-
RSA algorithm
-
None of them
Pregunta 31
Pregunta
In a(n) ________, the key is called the secret key.
Respuesta
-
symmetric-key
-
asymmetric-key
-
Public-key cryptography
-
All of them
-
None of them
Pregunta 32
Pregunta
In a(n) ________ cipher, a pair of keys is used
Respuesta
-
symmetric-key
-
asymmetric-key
-
Private-key cryptography
-
DES algorithm
Pregunta 33
Pregunta
The Caesar cipher is a _______cipher that has a key of 3.
Respuesta
-
transposition
-
additive
-
asymmetric
-
substitution
-
none of the above
Pregunta 34
Pregunta
The ________ cipher reorders the plaintext characters to create a ciphertext.
Respuesta
-
transposition
-
additive
-
asymmetric
-
substitution
-
shift
Pregunta 35
Pregunta
A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream.
Respuesta
-
S-box
-
P-box
-
T-box
-
none of the above
-
SP-boxes
Pregunta 36
Pregunta
A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.
Respuesta
-
S-box
-
P-box
-
T-box
-
none of the above
-
SP-boxes
Pregunta 37
Pregunta
DES is a(n) ________ method adopted by the U.S. government.
Respuesta
-
symmetric-key
-
asymmetric-key
-
decryption
-
encryption
-
None of them
Pregunta 38
Pregunta
DES has an initial and final permutation block and _________ rounds.
Respuesta
-
14
-
15
-
12
-
16
-
none of the above
Pregunta 39
Pregunta
DES uses a key generator to generate sixteen _______ round keys.
Respuesta
-
32-bit
-
48-bit
-
56-bit
-
42-bit
-
64-bit
Pregunta 40
Pregunta
AES has _____ different configurations
Pregunta 41
Pregunta
One commonly used public-key cryptography method is the ______ algorithm.
Pregunta 42
Pregunta
The ________ method provides a one-time session key for two parties.
Respuesta
-
Diffie-Hellman
-
RSA
-
DES
-
AES
-
DSA
Pregunta 43
Pregunta
In symmetric cryptography, which of the following MUST be true:
Respuesta
-
The same key is used for encryption and decryption
-
Encryption and decryption take the same amount of time
-
Different algorithms are used for encryption and decryption
-
Cryptographic operations are one‐way, and not reversible
Pregunta 44
Pregunta
Message _____ means that the data must arrive at the receiver exactly as sent.
Respuesta
-
confidentiality
-
integrity
-
authentication
-
availability
-
none of the above
Pregunta 45
Pregunta
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
Respuesta
-
confidentiality
-
integrity
-
availability
-
authentication
-
none of the above
Pregunta 46
Pregunta
________ means to prove the identity of the entity that tries to access the system's resources.
Respuesta
-
Message authentication
-
Entity authentication
-
Message confidentiality
-
Message integrity
-
none of the above
Pregunta 47
Pregunta
Digital signature cannot provide ________ for the message.
Respuesta
-
integrity
-
confidentiality
-
nonrepudiation
-
authentication
-
availability
Pregunta 48
Pregunta
Challenge-response authentication can be done using ________.
Respuesta
-
symmetric-key ciphers
-
asymmetric-key ciphers
-
keyed hash function
-
keyless hash function
-
all of the above
Pregunta 49
Pregunta
A digital signature needs a(n)_________ system.
Pregunta 50
Pregunta
The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
Pregunta 51
Pregunta
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Respuesta
-
Auditability
-
Confidentiality
-
Integrity
-
Availability
-
Identity
Pregunta 52
Pregunta
I have a company’s documents which are proprietary and a trade secret. How do I protect them from getting stolen?
Pregunta 53
Pregunta
Biometrics represents:
Respuesta
-
Something you know
-
Something you have
-
Something you are
-
All of the above
-
None of the above
Pregunta 54
Pregunta
In asymmetric encryption
Respuesta
-
same key is used for encryption and decryption
-
different keys are used encryption and decryption
-
no key is required for encryption and decryption
-
none of the mentioned
Pregunta 55
Pregunta
The sender “signs” a message as:
Respuesta
-
Digital Signature
-
Artificial Signature
-
Encrypted Signature
-
None of the above
Pregunta 56
Pregunta 57
Respuesta
-
Advanced Encryption Standard
-
Advanced Encryption System
-
Advanced Encryption Suggestion
-
None of the above
Pregunta 58
Pregunta
Authentication is:
Pregunta 59
Pregunta
The process to discover plaintext or key is known as
Respuesta
-
Cryptanalysis
-
Cryptography
-
Crypto design
-
Crypto processing
-
Cryptology
Pregunta 60
Pregunta
Output message in cryptography is called:
Respuesta
-
Plaintext
-
Ciphertext
-
Raw text
-
None of the above
Pregunta 61
Pregunta
Input message in cryptography is called:
Respuesta
-
Plaintext
-
Ciphertext
-
Encrypted text
-
None of the above
Pregunta 62
Pregunta 63
Pregunta
Secure hash algorithm(SHA) developed by:
Pregunta 64
Pregunta
Conventional encryption is:
Respuesta
-
Symmetric encryption
-
Secret key encryption
-
Single key encryption
-
All of the above
Pregunta 65
Pregunta
In network security:
Respuesta
-
Data is protected from hackers
-
Data is protected from cracker
-
Both answers are possible
-
None of the above
Pregunta 66
Pregunta 67
Pregunta
Cryptography ensures:
Respuesta
-
Confidentiality of data
-
Authentication of data
-
Integrity of data
-
All of the above
Pregunta 68
Pregunta
In network security:
Pregunta 69
Pregunta
Network security ensures:
Respuesta
-
Detecting attacks
-
Preventing attacks
-
Recovering attacks
-
All of the above
Pregunta 70
Pregunta
Encryption protects against:
Respuesta
-
Attacks
-
Viruses
-
Manipulation of data
-
All of the above
Pregunta 71
Pregunta
Authentication refers to:
Pregunta 72
Pregunta
The message is decrypted at ________ - side
Respuesta
-
Receiver
-
Sender
-
Broker
-
Attacker
-
All of the above
Pregunta 73
Pregunta
Cryptography relates to ______
Respuesta
-
Editing
-
Security
-
Testing
-
All of the above
Pregunta 74
Pregunta
Which of the following is not used for symmetric encryption?
Pregunta 75
Pregunta
Finding plaintext, without knowing key is know as:
Respuesta
-
Cryptography
-
Cryptanalysis
-
Cryptology
-
None of the above
Pregunta 76
Pregunta
Which of the following is a transposition cipher?
Respuesta
-
Caesar cipher
-
Vigenere cipher
-
One time pad
-
Playfair cipher
Pregunta 77
Pregunta
Which of the following is a monoalphabetic cipher?
Respuesta
-
Caesar Cipher
-
Lucifier cipher
-
Playfair cipher
-
No correct answer
Pregunta 78
Pregunta
RSA involves very large _____ numbers.
Respuesta
-
Prime
-
Even
-
Odd
-
Any random
Pregunta 79
Pregunta
Cryptology means
Respuesta
-
Cryptography + Cryptodesign
-
Cryptography + Cryptanalysis
-
Cryptography itself known as cryptology also
-
None of the above
Pregunta 80
Pregunta
Diffie-Hellman key exchange is vulnerable to:
Pregunta 81
Pregunta
None of these Which of the following is an example of a passive attack?
Respuesta
-
Modify
-
Denial of Service (DoS)
-
Masquerade
-
Traffic analysis
Pregunta 82
Pregunta
Which kind of service ensures that a message was received from the actual sender not from an attacker?
Respuesta
-
Confidentiality
-
Access Control
-
Integrity
-
Non-repudiation
-
Authentication
Pregunta 83
Pregunta
Which of the following is an active attack? I. Release of message contents; II. Traffic analysis; III. Modify; IV. Denial of Service
Respuesta
-
I and II
-
I and III
-
III and IV
-
II and IV
-
I, III and IV
Pregunta 84
Pregunta
The method of hiding the secret is called
Respuesta
-
Cryptography
-
Watermarking
-
Cryptanalysis
-
Steganography
Pregunta 85
Pregunta
It is the art of breaking the cipher
Respuesta
-
Cryptanalysis
-
Watermarking
-
Cryptography
-
Steganography
Pregunta 86
Pregunta
The field which deals with _____ called cryptography
Pregunta 87
Pregunta
What would be the number of rounds in AES, if the key size is 24 bytes?
Pregunta 88
Pregunta
What would be the number of rounds in AES, if the key size is 32 bytes?
Pregunta 89
Pregunta
Which of the following step is absent in the last round of AES?
Respuesta
-
Shift row
-
Mix columns
-
Byte substitution
-
Add subkey
Pregunta 90
Pregunta
DES algorithm uses total ______ subkeys
Pregunta 91
Pregunta
The total number of rounds in DES algorithm.
Pregunta 92
Pregunta
Which of the following method provides a one-time session key for two parties?
Respuesta
-
Diffie-Hellman
-
RSA
-
DES
-
AES
Pregunta 93
Pregunta
What is the size of round key for DES algorithm?
Respuesta
-
32-bit
-
48-bit
-
64-bit
-
128-bit
Pregunta 94
Pregunta
What is the purpose of access control list?
Respuesta
-
to enforce a specified security policy
-
to prevent unauthorised access to data
-
to emphasize encryption
-
it is a key distribution center
Pregunta 95
Pregunta
Define a subject of Access Control List
Respuesta
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Pregunta 96
Pregunta
Define an object of Access Control List
Respuesta
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Pregunta 97
Pregunta
What does multilevel security mean?
Respuesta
-
Classification of information by the level of importance and permission of access by users with different security clearance
-
Classification of information by date and permission of access by users with different security clearance
-
Classification of information by the level of importance and permission of access by users name
-
Classification of information by date and permission of access by users name
Pregunta 98
Pregunta
How many levels are covered in multilevel security
Pregunta 99
Pregunta
No read up (read down) means
Respuesta
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Pregunta 100
Pregunta
No write down (write up) means
Respuesta
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Pregunta 101
Pregunta
What does “computationally infeasible to find data mapping to specific hash” mean?
Respuesta
-
One way property
-
Collision free property
-
Second way property
-
Collision property
Pregunta 102
Pregunta
Which of the following is not property of hash functions?
Pregunta 103
Pregunta
The purpose of hash function is to
Respuesta
-
Create a message
-
Compress a message
-
Divide a message
-
Conquer a message
Pregunta 104
Pregunta
Which of the following refers requirement of digital signature?
Respuesta
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be computationally infeasible to forge
Pregunta 105
Pregunta
Which of the following refers requirement of digital signature?
Respuesta
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be practical to save digital signature in storage
Pregunta 106
Pregunta
What is the property of direct digital signature?
Respuesta
-
Assumed receiver has sender’s private key
-
Involves only sender
-
Can encrypt using receiver’s public key
-
Assumed sender has receiver’s private key
Pregunta 107
Respuesta
-
Access After Anyone
-
Authentication Authorization Accounting
-
Authentication Authorization Access
-
Authentication Access Accounting
Pregunta 108
Pregunta
Which of the term refers to authorization?
Respuesta
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
-
Accounting of service
Pregunta 109
Pregunta
Which of the term refers to accounting?
Respuesta
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
Pregunta 110
Respuesta
-
TTP certifies trustworthiness of binding public key with its rightful owner’s identity
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Pregunta 111
Pregunta
Define a Kerberos
Respuesta
-
Trusted third party authentication system and makes no use of public key cryptography
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Pregunta 112
Pregunta
Which of the following does not refer for Kerberos property
Respuesta
-
Impeccability
-
Containment
-
Transparency
-
Viciousness
Pregunta 113
Pregunta
How BruteForce works
Respuesta
-
аttаckеr triеs еvеry possiblе combinаtion of chаrаctеrs
-
Install viruses
-
Attacker sends more data to an application than is expected
-
Attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability