Information security and data protection

Descrição

- at Quiz sobre Information security and data protection, criado por хомяк убийца em 12-05-2018.
хомяк убийца
Quiz por хомяк убийца, atualizado more than 1 year ago
хомяк убийца
Criado por хомяк убийца aproximadamente 6 anos atrás
1390
30

Resumo de Recurso

Questão 1

Questão
What is the purpose of access control list?
Responda
  • to enforce a specified security policy
  • to prevent unauthorised access to data
  • to emphasize encryption
  • it is a key distribution center

Questão 2

Questão
Identify definition of authentication
Responda
  • establishes the identity of a subject
  • specifies and enforces that each object is accessed correctly and only by those that are allowed to do so
  • to enforce a specified security policy
  • to emphasize encryption

Questão 3

Questão
What does Access Control Information cover?
Responda
  • data, resources
  • AC policy
  • functions such as grant, deny
  • decisions

Questão 4

Questão
What does Access Control Enforcement cover?
Responda
  • data, resources
  • AC policy
  • functions such as grant, deny
  • decisions

Questão 5

Questão
What does Access Control Decision Function cover?
Responda
  • data, resources
  • AC policy
  • granting and denying access
  • decisions

Questão 6

Questão
Define a subject of Access Control List
Responda
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Questão 7

Questão
Define an object of Access Control List
Responda
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Questão 8

Questão
How many types of resource dependent access controls exist?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 9

Questão
How many types of access control mechanisms exist
Responda
  • 1
  • 2
  • 3
  • 4

Questão 10

Questão
Find an example of resource dependent access for network access
Responda
  • append
  • execute
  • redirected
  • granted

Questão 11

Questão
Find an example of resource dependent access for file access
Responda
  • append
  • execute
  • redirected
  • granted

Questão 12

Questão
Find incorrect access control goal
Responda
  • invalid operations should be permitted
  • every actions should be checked
  • unnecessary access should not be allowed
  • all the above mentioned

Questão 13

Questão
What is a property of the capability ticket in access control list?
Responda
  • Specifies a given subject can perform what operations on what objects
  • Subjects does not grant rights to other subjects
  • Users have only one ticket
  • Access rights given to a subject are valid for forever

Questão 14

Questão
What is a property of the procedure oriented objects in access control list?
Responda
  • Objects are encapsulated, permitting only certain specified accesses via program execution
  • Specifies a given subject can perform what operations on what objects
  • Access rights given to a subject are valid for forever
  • Users have only one ticket

Questão 15

Questão
What is a property of the procedure oriented objects in access control list?
Responda
  • Enforces accesses to an object be done through a trusted interface
  • Specifies a given subject can perform what operations on what objects
  • Access rights given to a subject are valid for forever
  • Users have only one ticket

Questão 16

Questão
What does multilevel security mean?
Responda
  • Classification of information by the level of importance and permission of access by users with different security clearance
  • Classification of information by date and permission of access by users with different security clearance
  • Classification of information by the level of importance and permission of access by users name
  • Classification of information by date and permission of access by users name

Questão 17

Questão
How many levels are covered in multilevel security
Responda
  • 1
  • 2
  • 3
  • 4

Questão 18

Questão
No read up (read down) means
Responda
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Questão 19

Questão
No write down (write up) means
Responda
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Questão 20

Questão
Define a malware attacks
Responda
  • Malicious software causes data compromises
  • A browser helper object that detects changes to URL and logs
  • Users are tricked by fraudulent messages into giving out information
  • The lookup of host names is altered to send users to a fraudulent server

Questão 21

Questão
How many types of authentication schemes exist?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 22

Questão
Define a change cipher spec
Responda
  • All data sent/received by software that uses SSL
  • used to carry handshake messages
  • used to indicates a change in the encryption and authentication of records
  • used to indicate when the connection is about to close

Questão 23

Questão
Define an alert
Responda
  • All data sent/received by software that uses SSL
  • used to carry handshake messages
  • used to indicates a change in the encryption and authentication of records
  • used to indicate when the connection is about to close

Questão 24

Questão
Which of the following is true about importance of hash functions i. High Computational Load ii. Message Overhead iii. Security Limitations
Responda
  • i only
  • none
  • All the mentioned
  • iii only

Questão 25

Questão
What does “computationally infeasible to find data mapping to specific hash” mean
Responda
  • One way property
  • Collision free property
  • Second way property
  • Collision property

Questão 26

Questão
Which of the following is not property of hash functions?
Responda
  • One wayness
  • Preimage resistance
  • Strong collision resistance
  • Long, unfixed output

Questão 27

Questão
How many types of hash constructions exist?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 28

Questão
Output length for SHA-1
Responda
  • 128
  • 160
  • 512
  • 314

Questão 29

Questão
Input length for SHA-1
Responda
  • 512
  • 2014
  • 160
  • 314

Questão 30

Questão
Which construction method support SHA?
Responda
  • Schnorr
  • Diffie-Hellman
  • Merkle-Damgard
  • Alice & Bob

Questão 31

Questão
How many rounds in general hold SHA-1?
Responda
  • 50
  • 60
  • 70
  • 80

Questão 32

Questão
How many stages hold SHA-1?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 33

Questão
How many rounds support one stage?
Responda
  • 10
  • 20
  • 80
  • 79

Questão 34

Questão
Name of the function that SHA-1 use
Responda
  • Merkle-Damgard
  • Feistel
  • Schnorr
  • Diffie-Hellman

Questão 35

Questão
How many types of SHA exist ?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 36

Questão
How many rounds MD5 hold in general?
Responda
  • 64
  • 80
  • 512
  • 160

Questão 37

Questão
Which of the following does not refer to security requirements of Hash functions?
Responda
  • Preimage resistance
  • Second preimage resistance
  • Collision resistance
  • High Computational Load

Questão 38

Questão
The purpose of hash function is to
Responda
  • Create a message
  • Compress a message
  • Divide a message
  • Conquer a message

Questão 39

Questão
How many constant keys support SHA algorithm ?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 40

Questão
Which of the following refers requirement of digital signature?
Responda
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be computationally infeasible to forge

Questão 41

Questão
Which of the following refers requirement of digital signature?
Responda
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be practical to save digital signature in storage

Questão 42

Questão
What is the property of direct digital signature?
Responda
  • Assumed receiver has sender’s private key
  • Involves only sender
  • Can encrypt using receiver’s public key
  • Assumed sender has receiver’s private key

Questão 43

Questão
Which of the following does not refer to characteristics of digital signature?
Responda
  • Private/public is generated by receiver
  • A durable private/public key pair
  • A disposable private/public key pair
  • Signature is two numbers, depending on message hash and secret information

Questão 44

Questão
How many message authentication functions exist?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 45

Questão
If public key encryption is used
Responda
  • Encryption provides no confidence of sender
  • Encryption provides with some level of confidence of sender
  • Encryption provides fully confidence of sender
  • Encryption does not provided at all

Questão 46

Questão
In public key cryptography sender signs message using their
Responda
  • Public key
  • Shared key
  • Private key
  • Third key

Questão 47

Questão
In public key cryptography sender signs message using their private key, then encrypts with recipient’s
Responda
  • Private key
  • Public key
  • Single key
  • Key

Questão 48

Questão
What is authentication?
Responda
  • The process of verifying a claimed identity
  • Identification of user
  • Access control
  • Accounting of service

Questão 49

Questão
Define AAA.(triple A)
Responda
  • Access After Anyone
  • Authentication Authorization Accounting
  • Authentication Authorization Access
  • Authentication Access Accounting

Questão 50

Questão
Which of the term refers to authorization?
Responda
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity
  • Accounting of service

Questão 51

Questão
Which of the term refers to accounting?
Responda
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity
  • Accounting of service

Questão 52

Questão
PIN, passwords refer to
Responda
  • Something you have
  • Something you know
  • Something you are
  • Combined method

Questão 53

Questão
Keys, soft tokens refer to
Responda
  • Something you have
  • Something you know
  • Something you are
  • Combined method

Questão 54

Questão
Fingerprint, iris, palm recognition refer to
Responda
  • Something you have
  • Something you know
  • Something you are
  • Combined method

Questão 55

Questão
Combined or multiple methods of authentication are used for
Responda
  • Lower level assurance
  • Medium level assurance
  • Higher level assurance
  • Not used at all

Questão 56

Questão
How many phases are exist in biometric?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 57

Questão
When fingerprint was developed?
Responda
  • 1988
  • 1888
  • 1887
  • 1987

Questão 58

Questão
What is minutia ?
Responda
  • Time
  • comparisons of one print with another can be made
  • comparison of eyes
  • comparison of palms

Questão 59

Questão
What is TTP?
Responda
  • TTP certifies trustworthiness of binding public key with its rightful owner’s identity
  • TTP certifies trustworthiness of binding private key with its rightful owner’s
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Questão 60

Questão
Define X.509
Responda
  • TTP certifies trustworthiness of binding public key with its rightful owner’s identity
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Questão 61

Questão
Define a Kerberos
Responda
  • Trusted third party authentication system and makes no use of public key cryptography
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Questão 62

Questão
Which of the following does not refer for Kerberos property
Responda
  • Impeccability
  • Containment
  • Transparency
  • Viciousness
  • Подписываемся на мой инстаграм @beketoo

Questão 63

Questão
What is a security?
Responda
  • The protection of information assets through the use of technology, processes, and training
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit
  • Ensures that computer-related assets are accessed only by authorized parties

Questão 64

Questão
What is a vulnerability?
Responda
  • The protection of information assets through the use of technology, processes, and training
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attack
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit
  • Ensures that computer-related assets are accessed only by authorized parties

Questão 65

Questão
What is an attack?
Responda
  • The protection of information assets through the use of technology, processes, and training
  • Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks.
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit

Questão 66

Questão
Types of Threats
Responda
  • Interception, Interruption, Modification, Fabrication
  • Method, Opportunity, Motive
  • Confidentiality, Integrity, Availability, Authentication
  • Non-repudiation, Authorisation/Access control, Destruction

Questão 67

Questão
How to protect?
Responda
  • Encryption, Software control, Hardware control, Policies and Procedures,Physical control
  • Method, Opportunity, Motive
  • Confidentiality, Integrity, Availability, Authentication
  • Non-repudiation, Authorisation/Access control, Destruction

Questão 68

Questão
Interception is __
Responda
  • Asset lost, unusable,unavailable
  • Unauthorized access
  • Unauthorized change, tamper of data
  • Ex. Unauthorized add data to a DB

Questão 69

Questão
Security goals are:
Responda
  • CIA
  • CEA
  • CLA
  • CDD

Questão 70

Questão
Confidentiality means
Responda
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Questão 71

Questão
Deterrence is
Responda
  • Punishment makes attackers think twice –Examples include laws and organisational policy
  • Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
  • Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
  • Punishment by taking money

Questão 72

Questão
Defence is
Responda
  • Punishment makes attackers think twice –Examples include laws and organisational policy
  • Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
  • Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
  • Punishment by taking money

Questão 73

Questão
Detection is
Responda
  • Punishment makes attackers think twice –Examples include laws and organisational policy
  • Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
  • Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
  • Punishment by taking money

Questão 74

Questão
Integrity means
Responda
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Questão 75

Questão
Authentication means
Responda
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Questão 76

Questão
Non-repudiation means
Responda
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • ensures that parties cannot deny having sent messages

Questão 77

Questão
DES stands for
Responda
  • Demand Encryption Standard
  • Data Encryption Standard
  • Digital Encryption Standard
  • Database Encryption Standard

Questão 78

Questão
When DES released?
Responda
  • 1977
  • 1974
  • 1960
  • 1965

Questão 79

Questão
Who introduced idea of substitution-permutation (S-P) networks?
Responda
  • Shannon
  • Feistal
  • Lucifer
  • Rijndael

Questão 80

Questão
In how many rounds DES encryption is handled?
Responda
  • 16
  • 8
  • 32
  • 4

Questão 81

Questão
_____ process messages in blocks, each of which is then encrypted/decrypted?
Responda
  • block ciphers
  • stream ciphers
  • mode ciphers
  • code ciphers

Questão 82

Questão
What is the cryptography?
Responda
  • study about how hacker should behave
  • study of encryption principles/methods
  • study about message transformation
  • study of the computer system

Questão 83

Questão
Which cipher is described below: “Each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.”
Responda
  • Playfair Cipher
  • Vigenere Cipher
  • Caesar Cipher
  • Kerberos

Questão 84

Questão
How Cryptography is divided by the way in which plaintext is processed:
Responda
  • Substitution and Transposition
  • Single-key or Private key
  • Two- key or Public
  • Block and Stream

Questão 85

Questão
What is the Key Matrix size in Playfair
Responda
  • 3x3
  • 4x4
  • 5x5
  • 9x9

Questão 86

Questão
Using the Caesar cipher decrypt this message “Vwdb kxqjub, vwdb irrolvk” (key=2)
Responda
  • Stay hungry, stay foolish
  • Never give up
  • Dance as if no one sees
  • With the great power comes great responsibility

Questão 87

Questão
3 Ds of Security: (DDD)
Responda
  • Defence, Deterrence, Detection
  • Data, Development, Device
  • Database, Data, Deadline
  • Demand, Design, Decision

Questão 88

Questão
MOM stands for ____
Responda
  • Method, Opportunity, Motive
  • Modification, Operation, Motto
  • Malfunction, Opinion, Management
  • Messages, Opportunity, Monitoring

Questão 89

Questão
DES is a symmetric cipher
Responda
  • True
  • False

Questão 90

Questão
Block size of DES
Responda
  • 256-bits
  • 128-bits
  • 64-bits
  • 32-bits

Questão 91

Questão
AES stands for
Responda
  • Advanced Encryption Standard
  • Advanced Encryption System
  • American Encryption Standard
  • Alias Encryption Standard

Questão 92

Questão
Advanced Encryption Standard(AES) also known like
Responda
  • Rassul
  • Rijndael
  • Feistel

Questão 93

Questão
Who introduce idea of substitution-permutation?
Responda
  • David Shannon
  • Andre Shannon
  • Petre Shannon
  • Claude Shannon

Questão 94

Questão
In which year was introduced idea of substitution-permutation?
Responda
  • 1949
  • 1948
  • 1950
  • 1951

Questão 95

Questão
What is the plaintext?
Responda
  • Original Message
  • Coded Message
  • Algorithm for transforming text
  • Secret key

Questão 96

Questão
What is not the model of the symmetric cipher?
Responda
  • conventional / private-key / single-key
  • sender and recipient share a common key
  • all classical encryption algorithms are private-key
  • was only type prior to invention of public- key in 1982’s

Questão 97

Questão
What is the Cipher ?
Responda
  • algorithm for transforming plaintext to ciphertext
  • coded message
  • original message
  • study of encryption principles/methods

Questão 98

Questão
What is the cryptanalysis (codebreaking ) ?
Responda
  • algorithm for transforming plaintext to cipher text
  • study of principles/methods of deciphering cipher text without knowing key
  • original message
  • study of encryption principles/methods

Questão 99

Questão
What is the cryptology?
Responda
  • field of both cryptography & cryptanalysis
  • original message
  • study of encryption principles/methods
  • algorithm for transforming plaintext to cipher text

Questão 100

Questão
What are the general approaches for Cryptanalysis?
Responda
  • cryptanalytic attack/brute force attack
  • substitution/transposition
  • permutation/transposition
  • substitution/permutation

Questão 101

Questão
What is Ciphertext only?
Responda
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext

Questão 102

Questão
How many types of threats exist?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 103

Questão
Authorisation means
Responda
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • defining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Questão 104

Questão
CIA means
Responda
  • Confidentiality, invalid, availability
  • Confidentiality, interact, access
  • Certain, integrity,availability
  • Confidentiality, integrity, availability

Questão 105

Questão
What is Threat?
Responda
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks. A weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage
  • Typical threats include unauthorised access, destruction, system overrun and takeover, propagation of malicious code, data thieving and fabrication;
  • Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit

Questão 106

Questão
What is ciphertext?
Responda
  • coded message
  • original message
  • algorithm for transforming plaintext to ciphertext
  • info used in cipher known only to sender/receiver

Questão 107

Questão
What is a key?
Responda
  • converting plaintext to ciphertext
  • recovering ciphertext from
  • info used in cipher known only to sender/receiver
  • algorithm for transforming plaintext to ciphertext

Questão 108

Questão
What is encipher (encrypt)?
Responda
  • study of encryption principles/methods
  • study of principles/ methods of deciphering ciphertext without knowing key
  • original message
  • converting plaintext to ciphertext

Questão 109

Questão
What is decipher (decrypt)?
Responda
  • converting plaintext to ciphertext
  • recovering ciphertext from plaintext
  • coded message
  • original message
  • recovering plaintext from ciphertext

Questão 110

Questão
Mostly used symmetric cipher
Responda
  • AES
  • DES
  • RSA
  • SHA-1

Questão 111

Questão
Possible length of AES key
Responda
  • 128 156 198
  • 128 192 256
  • 128 184 228
  • 128 164 256

Questão 112

Questão
How many stages has final round of AES?
Responda
  • 1
  • 2
  • 3
  • 4

Questão 113

Questão
RSA uses
Responda
  • two keys - private & publiс
  • one key - only private
  • one key - only public
  • no correct answer

Questão 114

Questão
What is TRUE about RSA? Each user generates a public/private key pair by:
Responda
  • selecting two large primes at random: p, q
  • selecting two small primes at random: p, q
  • selecting three large primes at random: p, q, r
  • selecting only one number at random: p

Questão 115

Questão
In RSA security relies on a ___ difference in difficulty between ___ (en/decrypt) and ___ (cryptanalyse) problems
Responda
  • large enough, easy, hard
  • small enough, hard, easy
  • small enough, easy, hard
  • large enough, hard, easy

Questão 116

Questão
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Responda
  • Data Size
  • Round Size
  • Key Size
  • Encryption Size

Questão 117

Questão
_______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
Responda
  • RSA
  • Karberos
  • Caesar
  • AES

Questão 118

Questão
In asymmetric key cryptography, the private key is kept by
Responda
  • sender
  • receiver
  • sender and receiver
  • all the connected devices to the network
  • none of these

Questão 119

Questão
RSA was developed by:
Responda
  • Dr.Tahir El-Gamal
  • Diffie-Hellman
  • Shannon
  • Rivest, Shamir, Adleman

Questão 120

Questão
Encryption by receiver with sender’s public key:
Responda
  • C = Me mod N
  • M=Cd mod N
  • Ya=Xa mod Q
  • C=Km mod Q

Questão 121

Questão
RSA was founded in:
Responda
  • 1975
  • 1976
  • 1977
  • 1974

Questão 122

Questão
Decryption by sender with sender’s public key:
Responda
  • C=Me mod N
  • M=Cd mod N
  • Ya=Xa mod Q
  • C=Km mod Q

Questão 123

Questão
Calculate n and φ, if p = 3, and q = 11 (RSA)
Responda
  • n = 33, φ = 20
  • n = 20, φ = 33
  • n = 33, φ = 33
  • n = 33, φ = 22

Questão 124

Questão
Calculate n and φ, if p = 17, and q = 11 (RSA)
Responda
  • n = 187, φ = 160
  • n = 160, φ = 187
  • n = 187, φ = 187
  • n = 187, φ = 170

Questão 125

Questão
Calculate C (ciphertext), if p = 3, q = 11, e = 7, M = 2 (RSA)
Responda
  • C = 29
  • C = 3
  • C = 22
  • C = 2

Questão 126

Questão
Calculate M (plaintext), if p = 3, q = 11, d = 3, C = 29 (RSA)
Responda
  • M = 2
  • M = 29
  • M = 30
  • M = 1

Questão 127

Questão
Block size of AES plaintext:
Responda
  • 192
  • 164
  • 128
  • 256

Questão 128

Questão
Maximum AES number of rounds:
Responda
  • 10
  • 12
  • 14
  • 16

Questão 129

Questão
AES size of output(output parameter):
Responda
  • 192
  • 128
  • 164
  • 256

Questão 130

Questão
First public-key type scheme proposed by Diffie & Hellman in
Responda
  • 1971
  • 1976
  • 1981
  • 1986

Questão 131

Questão
Value of key depends on the: (Diffie & Hellman)
Responda
  • Participants
  • Keys
  • Message
  • Algorithm

Questão 132

Questão
If Alice and Bob subsequently communicate, they will have the____ key
Responda
  • Same
  • Different
  • Private
  • Public

Questão 133

Questão
Which of these are true about “a public-key distribution scheme ”?
Responda
  • cannot be used to exchange an arbitrary message
  • rather it can establish a common key
  • known only to the two participants
  • all of above

Questão 134

Questão
When by Diffie & Hellman along with the exposition of public key concepts?
Responda
  • 1977
  • 1978
  • 1979
  • none of them

Questão 135

Questão
Which of them uses two keys( public and private):
Responda
  • RSA
  • Caesar
  • Vigenere
  • Playfair

Questão 136

Questão
A related private-key, known
Responda
  • only to the recipient
  • only to the sender
  • none of them
  • to everyone

Questão 137

Questão
The key must be kept secret for
Responda
  • needed security
  • encryption and decryption
  • encryption
  • decryption

Questão 138

Questão
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
Responda
  • man-in-the-middle
  • ciphertext attack
  • plaintext attack
  • none of the above

Questão 139

Questão
“Using only a subset of letters/words in a longer message marked in some way ” is__
Responda
  • Caesar Cipher
  • RSA
  • DES
  • Steganography

Questão 140

Questão
For which cipher an example is given: “Say hi to IITU” After encrypt “Yas ih ot UTII”
Responda
  • Playfair Cipher
  • Transposition Cipher
  • Route Cipher
  • Steganography

Questão 141

Questão
Polyalphabetic substitution ciphers improve security using multiple cipher alphabets
Responda
  • True
  • False

Questão 142

Questão
For RSA to work, value of P must be less than value of:
Responda
  • P
  • Q
  • n
  • r

Questão 143

Questão
In symmetric key cryptography, key used by sender and receiver is:
Responda
  • shаrеd
  • Different
  • Two keys are used
  • None

Questão 144

Questão
In symmetric-key cryptography, same key is used by:
Responda
  • One Party
  • Multi Party
  • Third Party
  • Both Party

Questão 145

Questão
RSA stands for
Responda
  • Rivеst, Shаmir,, Аdlеmаn
  • Roger, Shamir, Adrian
  • Robert, Shamir, Anthoney
  • Rivest, Shaw, Adleman

Questão 146

Questão
Which of them is first public-key type scheme?
Responda
  • Diffiе & Hеllmаn
  • Elgamal
  • RSA
  • AES

Questão 147

Questão
When Diffie & Hellman protocol was invented?
Responda
  • 1976
  • 1975
  • 1980
  • 1990

Questão 148

Questão
In Diffie & Hellman key exchange a public key is known only to the two participants
Responda
  • True
  • False

Questão 149

Questão
In Diffie & Hellman key exchange a public key is cannot be used to exchange an arbitrary message
Responda
  • True
  • False

Questão 150

Questão
Diffie & Hellman key exchange based on exponentiation in a finite (Galois) fields
Responda
  • True
  • False

Questão 151

Questão
In Diffie & Hellman protocol when the user A generates their key a secret key should be
Responda
  • XА < q
  • generated randomly
  • given by user B
  • none

Questão 152

Questão
Choose the correct formula for computing public key YA in Diffie & Hellman protocol
Responda
  • YА= а mod q
  • BA = a + b
  • CA = a – b
  • DA = a * b

Questão 153

Questão
Choose the correct formula for computing secret key K by user A in Diffie & Hellman protocol
Responda
  • K = (YА)^X А mod q
  • S = a + b
  • D = a * b
  • L = a * b + 2

Questão 154

Questão
Elgamal cryptography uses exponentiation in a finite (Galois) fields
Responda
  • True
  • False

Questão 155

Questão
In the Elgamal cryptography when the user A generates their key a secret key should be
Responda
  • 1 < XА < q-1
  • generated randomly
  • given by user
  • none

Questão 156

Questão
Choose the correct formula for computing public key YA in Elgamal cryptography
Responda
  • YА = аXА mod q
  • K = YАk mod q
  • K = (YА)^X А mod q
  • YА= а mod q

Questão 157

Questão
Choose the correct formula for computing one-time key K in Elgamal cryptography
Responda
  • K = YАk mod q
  • S = a + b + 1
  • D = a * b + 2
  • L = a * b + 3

Questão 158

Questão
Choose the correct formula for computing C1 in Elgamal cryptography
Responda
  • C1 = аk mod q
  • C3 = a mod b
  • C = z + 2 + 5
  • C5 = a * b +2

Questão 159

Questão
Choose the correct formula for computing C2 in Elgamal cryptography
Responda
  • C2 = KM mod q
  • C = MK
  • C3 = AK
  • C4 = AA

Questão 160

Questão
In Elgamal cryptography public key cryptosystem related to D-H
Responda
  • True
  • False

Questão 161

Questão
Known plaintext is...
Responda
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • Attacker selects plaintext or ciphertext to en/decrypt

Questão 162

Questão
Chosen plaintext is...
Responda
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • Attacker selects plaintext or ciphertext to en/decrypt

Questão 163

Questão
Chosen ciphertext is...
Responda
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • Attacker selects plaintext or ciphertext to en/decrypt

Questão 164

Questão
Chosen text is ...
Responda
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • attacker selects plaintext or ciphertext to en/decrypt

Semelhante

Tricky words: Set one
barrie edmonds
Present continuos tense
anama_gordillo
DELIVERING AT PACE
Natalie West
UNIT 1
missbotch
Untitled
atanuroy505
ANTT
Gaffer Ji
Phrasel Verb (Prepositions IN, ON, UP and AT)
Dmitriy Lagutin
Phrasel Verb (Prepositions IN, ON, UP and AT)
Петр Казаков
ANTT
Gaffer Ji
Preposition
jizaco0508