Questão 1
Questão
This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Responda
-
Conditional access
-
Authentication
-
Identification
-
Anonymizer
-
Authorization
Questão 2
Questão
In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack
Questão 3
Questão
Why would reusing a ticket as a replay attack is Kerberos not be successful?
Responda
-
The tickets are encrypted
-
The tickets are digitally signed
-
The tickets are used a token
-
The tickets are time stamped
Questão 4
Questão
What is Man in the middle attack?
Responda
-
The attackers catch our employee in the middle of them and start applying physical pressure on them
-
The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras
-
The hacker jacks in a network and records all the information sent over the network
Questão 5
Questão
What is encryption strength is based on? Please select the best answer
Responda
-
The strength of the algorithm, the length of the key, and the secrecy of the key
-
The length of the key, the type of algorithm, and the strength of the key
-
The privacy of the key, the length of the algorithm, and the strength of the key
-
The strength of the key, the length of the algorithm, and the privacy of the key
Questão 6
Questão
One form of ‘something you have’ is the _____ and USB tokens
Responda
-
Fingerprint
-
Tokens
-
Identification
-
Password
-
Digital signatures
Questão 7
Questão
The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as (Please select the best answer)
Questão 8
Questão
What is a good way to make users in a network safer in the internet
Questão 9
Questão
When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a
Responda
-
It is known as the Man in the middle attack
-
It is known as the TCP/IP spoofing attack
-
It is known as the Back door attack
-
It is known as the Replay attack
Questão 10
Questão
In which of the following attack does the attacker capture a portion of the communication between two parties, modifies it, and inserts
Responda
-
Man-in-the-middle attack
-
Spoofing
-
Sniffing
-
Denial-of-service
Questão 11
Questão
A password represents
Responda
-
Something you have
-
None of the above
-
Something you are
-
Something you know
-
All of the above
Questão 12
Questão
List the main aspects of information security: I. Confidentiality II. Integrity III. Availability IV. Consistency
Responda
-
I-III-IV
-
I-III
-
I-II-III
-
I only
-
II-III-IV
Questão 13
Questão
Which of the following describes the challenge-response
Responda
-
A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
-
A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)
-
A special hardware device that is used to generate random text in a cryptography system
-
The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.
Questão 14
Questão
Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?
Questão 15
Questão
Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should
Responda
-
Encrypt the message with Alice’s public key and send Alice the message
-
Encrypt the message with Alice’s private key and send the encrypted message to Alice
-
Encrypt the message with his public key and send Alice the message
-
Encrypt the message with his private key and send the encrypted message to Alice
Questão 16
Questão
Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature
Responda
-
Bob applies a hash function to m and then encrypts the result with his private key
-
Bob applies a hash function to m and then encrypts the result with his public key
-
Bob applies a hash function to m and then encrypts the result with Alice’s public key
-
Bob encrypts m with his private key and then applies a hash function to the result
Questão 17
Questão
Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Responda
-
Applies Bob's public key to the digital signature, applies the has function to m, and compares the results of the two operations;
-
Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m;
-
Applies a de-hashing function to the digital signature and compare the result to m;
-
No correct answer;
Questão 18
Questão
Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with
Responda
-
The CA's private key
-
Bob’s public key
-
The CA's public key
-
Bob’s private key
Questão 19
Questão
A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.
Questão 20
Questão
Which security action should be finished before access is given to the network?
Responda
-
Identification and authorization
-
Identification and authentication
-
Authentication and authorization
-
Authentication and password
Questão 21
Questão
Which of the following types of encryption would BEST to use for a large amount of data?
Responda
-
Asymmetric
-
Symmetric
-
RSA
-
Hash
Questão 22
Questão
Which statement correctly describes the difference between a secure cipher and a secure hash?
Responda
-
A hash produces a variable output for any input size; a cipher does not.
-
A cipher can be reversed; a hash cannot.
-
A cipher produces the same size output for any input size; a hash does not.
Questão 23
Questão
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
Responda
-
Decryption
-
Cryptanalysis
-
Cryptography
-
Brute force cracking
Questão 24
Questão
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Responda
-
Auditability
-
Availability
-
Integrity
-
Confidentiality
Questão 25
Questão
Which of the following appears when an asset of the system become lost, unavailable or unusable?
Responda
-
Interception
-
Interruption
-
Interpretation
-
Modification
-
Fabrication
Questão 26
Questão
Show incorrect kind of threats
Responda
-
Interception
-
Interruption
-
Interpretation
-
Modification
-
Fabrication
Questão 27
Questão
Bock cipher maps each plaintext block to :
Questão 28
Questão
What is vulnerability?
Responda
-
A weakness in the security system
-
A Method which uses flaws to have more access, privileges or resources to the system
-
A method which used to eliminate or reduce threats
-
A kind of auth to system
Questão 29
Questão
A(n) _____ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through
Questão 30
Questão
What is assumed by cipher in cryptography ?
Questão 31
Questão
What is assumed by ciphertext in cryptography?
Questão 32
Questão
What is assumed by plaintext in cryptography?
Questão 33
Questão
In cryptography, what is key?
Responda
-
Info used to cipher, known only to sender and receiver
-
Algorithm for transforming plaintext to ciphertext
-
Encrypted message
-
Recovering plaintext from ciphertext
-
Converting plaintext to ciphertext
Questão 34
Questão
What is cryptoanalysis?
Responda
-
Study of principles/methods deciphering ciphertext without knowing key
-
Info used to cipher, known only to sender and receiver
-
Algorithm for transforming plaintext to ciphertext
-
Recovering plaintext from ciphertext
-
Converting plaintext to ciphertext
Questão 35
Questão
In asymmetric key cryptography, the public key for decryption is kept by:
Questão 36
Questão
Which of these are threats against to modern computer?
Responda
-
Network attacks, firewall and worms
-
Viruses, worms and encryption
-
Network attacks, viruses and worms
-
Viruses, network encryptions and worms
Questão 37
Questão
How the industry solves the threats ?
Responda
-
Firewall, IDS, Kerberos, blogs
-
IDS, firewall, authentication, policies
-
Virus, worms, attacks, web-sites
-
Network attacks, IDS, worms, virus
Questão 38
Questão
Which one of the following algorithm is not used in asymmetric key cryptography?
Responda
-
RSA algorithm
-
Diffle-Hellman algorithm
-
DES algorithm
-
DSA algorithm
Questão 39
Questão
In cryptography, the order of the order of the letters in a message in rearranged by
Questão 40
Questão
What is data encryption standard (DES)?
Responda
-
Block cipher
-
stream cipher
-
bit cipher
-
none of the mentioned
Questão 41
Questão
Cryptanalysis is used:
Questão 42
Questão
Cryptographic hash function takes an arbitrary block of data and returns
Responda
-
Fixed site bit string
-
variable size bit string
-
none of the mentioned
-
both of the mentioned
Questão 43
Questão
A substitution cipher substitutions one symbol with
Responda
-
Keys
-
Others
-
Multi Parties
-
Single Party
Questão 44
Questão
An asymmetric-key(or public key ) cipher uses
Questão 45
Questão
In the computer industry the “What you have” method is use of?
Responda
-
Passwords
-
Smart cards
-
Digital certificates’
Questão 46
Questão
A smartcard represents
Responda
-
None of the above
-
Something you are
-
All of the above
-
Something you have
-
Something you know
Questão 47
Questão
Convert one symbol of plaintext immediately into a symbol of cipher text (example:Caesar cipher)
Responda
-
Encryption
-
Plaintext
-
Block cipher
-
stream ciphers
Questão 48
Responda
-
Asset lost, unusable, unavailable
-
Unauthorized access
-
Unauthorized change, tamper of data
-
Ex. Unauthorized add data to a DB
Questão 49
Responda
-
Unauthorized change, tamper of data
-
Asset lost, unusable, unavailable
-
Unauthorized access
-
Ex. Unauthorized add data to a DB
Questão 50
Questão
Which are the examples of DEFENCE?
Responda
-
Firewalls, router access control list, spam filters, virus scanners
-
Employee communication, policy on company Intranet
-
Audit logs, intrusion detection system, network traffic monitoring
-
Network attacks, IDS, worms, virus
Questão 51
Questão
Which are the examples of DETERRENCE?
Responda
-
Employee communication, policy on company Intranet
-
Firewalls, router access control list, spam filters, virus scanners
-
Audit logs, intrusion detection system, network traffic monitoring
-
Network attacks, IDS, worms, virus
Questão 52
Questão
Which are the examples of DETECTION?
Responda
-
Audit logs, intrusion detection system, network traffic monitoring
-
Employee communication, policy on company Intranet
-
Firewalls, router access control list, spam filters, virus scanners
-
Network attacks, IDS, worms, virus
Questão 53
Questão
What is encryption?
Responda
-
Is the process of encoding a message so that its meaning is not obvious
-
Is the reverse process, transforming an encrypted message back into its normal, original form
-
Is the process of preventing any attacks from the hackers
Questão 54
Questão
In password protection, this is a random string of data or number used to modify a password hash
Responda
-
Nonce
-
Ssl
-
One time password
-
Secret key
-
Public key
Questão 55
Questão
Using public key cryptography suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should:
Responda
-
Encrypt the message with his private key, encrypt the result with Ailce’s public key and then send Alice the message
-
• Encrypt the message with his private key , encrypt yhe result with alices’ private key, and then send Alicce the message
-
• Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message
Questão 56
Questão
Which statement correctly describes the difference between a secure cipher and a secure hash?
Responda
-
Cipher can be reversed, hash cannot
-
A hash can be reversed, a cipher cannot
-
A hash production a variable output fot any input size, a cipher does not
-
A cipher produces the same size output for any input size, a hash does not
Questão 57
Questão
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies
Responda
-
• Brute force cracking
-
• Decryption
-
• Cryptoanalysis
-
• Cryptography
Questão 58
Questão
A well designed and configured _____ is like having single point of entry into your building with a security guard at the door allowing only authorized personnel into the building
Questão 59
Questão
Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with
Responda
-
The CA’s private key
-
Bobs public key
-
The CAs public key
-
Bobs private key
Questão 60
Questão
Suppose Alice receives from Bob a message m with digital signature for one message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Responda
-
Applies Bob’s public key to the digital signature applies to the hash function to m, and compares the results of the two operations.
-
Applies bobs public key to the digital signature, then a de-hashing function to the result. She then compares the result of this operation with the message m
-
Applies a de-hashing function to the digital signature and compares the result m
-
No correct answer