#2 Information security and data protection

Descrição

- at Quiz sobre #2 Information security and data protection, criado por хомяк убийца em 13-05-2018.
хомяк убийца
Quiz por хомяк убийца, atualizado more than 1 year ago
хомяк убийца
Criado por хомяк убийца mais de 6 anos atrás
956
21

Resumo de Recurso

Questão 1

Questão
This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Responda
  • Conditional access
  • Authentication
  • Identification
  • Anonymizer
  • Authorization

Questão 2

Questão
In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack
Responda
  • Password
  • Two factor authentication
  • Security token
  • Authentication

Questão 3

Questão
Why would reusing a ticket as a replay attack is Kerberos not be successful?
Responda
  • The tickets are encrypted
  • The tickets are digitally signed
  • The tickets are used a token
  • The tickets are time stamped

Questão 4

Questão
What is Man in the middle attack?
Responda
  • The attackers catch our employee in the middle of them and start applying physical pressure on them
  • The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras
  • The hacker jacks in a network and records all the information sent over the network

Questão 5

Questão
What is encryption strength is based on? Please select the best answer
Responda
  • The strength of the algorithm, the length of the key, and the secrecy of the key
  • The length of the key, the type of algorithm, and the strength of the key
  • The privacy of the key, the length of the algorithm, and the strength of the key
  • The strength of the key, the length of the algorithm, and the privacy of the key

Questão 6

Questão
One form of ‘something you have’ is the _____ and USB tokens
Responda
  • Fingerprint
  • Tokens
  • Identification
  • Password
  • Digital signatures

Questão 7

Questão
The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as (Please select the best answer)
Responda
  • Password authentication
  • Physical authentication
  • Fingerprint authentication
  • Biometric authentication

Questão 8

Questão
What is a good way to make users in a network safer in the internet
Responda
  • Get a slow connection so they cannot download too much
  • Deny all internet access
  • All of the above
  • None of the above
  • Set up a filtering proxy server so you can check all the incoming traffic

Questão 9

Questão
When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a
Responda
  • It is known as the Man in the middle attack
  • It is known as the TCP/IP spoofing attack
  • It is known as the Back door attack
  • It is known as the Replay attack

Questão 10

Questão
In which of the following attack does the attacker capture a portion of the communication between two parties, modifies it, and inserts
Responda
  • Man-in-the-middle attack
  • Spoofing
  • Sniffing
  • Denial-of-service

Questão 11

Questão
A password represents
Responda
  • Something you have
  • None of the above
  • Something you are
  • Something you know
  • All of the above

Questão 12

Questão
List the main aspects of information security: I. Confidentiality II. Integrity III. Availability IV. Consistency
Responda
  • I-III-IV
  • I-III
  • I-II-III
  • I only
  • II-III-IV

Questão 13

Questão
Which of the following describes the challenge-response
Responda
  • A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
  • A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)
  • A special hardware device that is used to generate random text in a cryptography system
  • The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.

Questão 14

Questão
Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?
Responda
  • 6
  • 8
  • 9
  • 16

Questão 15

Questão
Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should
Responda
  • Encrypt the message with Alice’s public key and send Alice the message
  • Encrypt the message with Alice’s private key and send the encrypted message to Alice
  • Encrypt the message with his public key and send Alice the message
  • Encrypt the message with his private key and send the encrypted message to Alice

Questão 16

Questão
Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature
Responda
  • Bob applies a hash function to m and then encrypts the result with his private key
  • Bob applies a hash function to m and then encrypts the result with his public key
  • Bob applies a hash function to m and then encrypts the result with Alice’s public key
  • Bob encrypts m with his private key and then applies a hash function to the result

Questão 17

Questão
Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Responda
  • Applies Bob's public key to the digital signature, applies the has function to m, and compares the results of the two operations;
  • Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m;
  • Applies a de-hashing function to the digital signature and compare the result to m;
  • No correct answer;

Questão 18

Questão
Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with
Responda
  • The CA's private key
  • Bob’s public key
  • The CA's public key
  • Bob’s private key

Questão 19

Questão
A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.
Responda
  • Network Adapter
  • Antivirus Software
  • Intrusion Detection System
  • Firewall

Questão 20

Questão
Which security action should be finished before access is given to the network?
Responda
  • Identification and authorization
  • Identification and authentication
  • Authentication and authorization
  • Authentication and password

Questão 21

Questão
Which of the following types of encryption would BEST to use for a large amount of data?
Responda
  • Asymmetric
  • Symmetric
  • RSA
  • Hash

Questão 22

Questão
Which statement correctly describes the difference between a secure cipher and a secure hash?
Responda
  • A hash produces a variable output for any input size; a cipher does not.
  • A cipher can be reversed; a hash cannot.
  • A cipher produces the same size output for any input size; a hash does not.

Questão 23

Questão
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
Responda
  • Decryption
  • Cryptanalysis
  • Cryptography
  • Brute force cracking

Questão 24

Questão
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Responda
  • Auditability
  • Availability
  • Integrity
  • Confidentiality

Questão 25

Questão
Which of the following appears when an asset of the system become lost, unavailable or unusable?
Responda
  • Interception
  • Interruption
  • Interpretation
  • Modification
  • Fabrication

Questão 26

Questão
Show incorrect kind of threats
Responda
  • Interception
  • Interruption
  • Interpretation
  • Modification
  • Fabrication

Questão 27

Questão
Bock cipher maps each plaintext block to :
Responda
  • Same length cipher text block
  • Different length cipher text block
  • The same letter
  • No answer

Questão 28

Questão
What is vulnerability?
Responda
  • A weakness in the security system
  • A Method which uses flaws to have more access, privileges or resources to the system
  • A method which used to eliminate or reduce threats
  • A kind of auth to system

Questão 29

Questão
A(n) _____ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through
Responda
  • Antivirus
  • Intrusion Detection System (IDS)
  • Personal Firewall
  • Network Monitor

Questão 30

Questão
What is assumed by cipher in cryptography ?
Responda
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Questão 31

Questão
What is assumed by ciphertext in cryptography?
Responda
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Questão 32

Questão
What is assumed by plaintext in cryptography?
Responda
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Questão 33

Questão
In cryptography, what is key?
Responda
  • Info used to cipher, known only to sender and receiver
  • Algorithm for transforming plaintext to ciphertext
  • Encrypted message
  • Recovering plaintext from ciphertext
  • Converting plaintext to ciphertext

Questão 34

Questão
What is cryptoanalysis?
Responda
  • Study of principles/methods deciphering ciphertext without knowing key
  • Info used to cipher, known only to sender and receiver
  • Algorithm for transforming plaintext to ciphertext
  • Recovering plaintext from ciphertext
  • Converting plaintext to ciphertext

Questão 35

Questão
In asymmetric key cryptography, the public key for decryption is kept by:
Responda
  • Sender
  • Receiver
  • Sender and receiver
  • Everyone in the network
  • All the connected devices to the network

Questão 36

Questão
Which of these are threats against to modern computer?
Responda
  • Network attacks, firewall and worms
  • Viruses, worms and encryption
  • Network attacks, viruses and worms
  • Viruses, network encryptions and worms

Questão 37

Questão
How the industry solves the threats ?
Responda
  • Firewall, IDS, Kerberos, blogs
  • IDS, firewall, authentication, policies
  • Virus, worms, attacks, web-sites
  • Network attacks, IDS, worms, virus

Questão 38

Questão
Which one of the following algorithm is not used in asymmetric key cryptography?
Responda
  • RSA algorithm
  • Diffle-Hellman algorithm
  • DES algorithm
  • DSA algorithm

Questão 39

Questão
In cryptography, the order of the order of the letters in a message in rearranged by
Responda
  • Transpositionalcip ciphers
  • substitution ciphers
  • All kinds of the ciphers
  • None of the mentioned

Questão 40

Questão
What is data encryption standard (DES)?
Responda
  • Block cipher
  • stream cipher
  • bit cipher
  • none of the mentioned

Questão 41

Questão
Cryptanalysis is used:
Responda
  • To find some insecurity in cryptographic scheme
  • to increase the speed
  • to encrypt the data
  • none of the mentioned

Questão 42

Questão
Cryptographic hash function takes an arbitrary block of data and returns
Responda
  • Fixed site bit string
  • variable size bit string
  • none of the mentioned
  • both of the mentioned

Questão 43

Questão
A substitution cipher substitutions one symbol with
Responda
  • Keys
  • Others
  • Multi Parties
  • Single Party

Questão 44

Questão
An asymmetric-key(or public key ) cipher uses
Responda
  • 1 key
  • 2 key
  • 3 key
  • 4 key

Questão 45

Questão
In the computer industry the “What you have” method is use of?
Responda
  • Passwords
  • Smart cards
  • Digital certificates’

Questão 46

Questão
A smartcard represents
Responda
  • None of the above
  • Something you are
  • All of the above
  • Something you have
  • Something you know

Questão 47

Questão
Convert one symbol of plaintext immediately into a symbol of cipher text (example:Caesar cipher)
Responda
  • Encryption
  • Plaintext
  • Block cipher
  • stream ciphers

Questão 48

Questão
Interruption is
Responda
  • Asset lost, unusable, unavailable
  • Unauthorized access
  • Unauthorized change, tamper of data
  • Ex. Unauthorized add data to a DB

Questão 49

Questão
Modification is
Responda
  • Unauthorized change, tamper of data
  • Asset lost, unusable, unavailable
  • Unauthorized access
  • Ex. Unauthorized add data to a DB

Questão 50

Questão
Which are the examples of DEFENCE?
Responda
  • Firewalls, router access control list, spam filters, virus scanners
  • Employee communication, policy on company Intranet
  • Audit logs, intrusion detection system, network traffic monitoring
  • Network attacks, IDS, worms, virus

Questão 51

Questão
Which are the examples of DETERRENCE?
Responda
  • Employee communication, policy on company Intranet
  • Firewalls, router access control list, spam filters, virus scanners
  • Audit logs, intrusion detection system, network traffic monitoring
  • Network attacks, IDS, worms, virus

Questão 52

Questão
Which are the examples of DETECTION?
Responda
  • Audit logs, intrusion detection system, network traffic monitoring
  • Employee communication, policy on company Intranet
  • Firewalls, router access control list, spam filters, virus scanners
  • Network attacks, IDS, worms, virus

Questão 53

Questão
What is encryption?
Responda
  • Is the process of encoding a message so that its meaning is not obvious
  • Is the reverse process, transforming an encrypted message back into its normal, original form
  • Is the process of preventing any attacks from the hackers

Questão 54

Questão
In password protection, this is a random string of data or number used to modify a password hash
Responda
  • Nonce
  • Ssl
  • One time password
  • Secret key
  • Public key

Questão 55

Questão
Using public key cryptography suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should:
Responda
  • Encrypt the message with his private key, encrypt the result with Ailce’s public key and then send Alice the message
  • • Encrypt the message with his private key , encrypt yhe result with alices’ private key, and then send Alicce the message
  • • Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message

Questão 56

Questão
Which statement correctly describes the difference between a secure cipher and a secure hash?
Responda
  • Cipher can be reversed, hash cannot
  • A hash can be reversed, a cipher cannot
  • A hash production a variable output fot any input size, a cipher does not
  • A cipher produces the same size output for any input size, a hash does not

Questão 57

Questão
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies
Responda
  • • Brute force cracking
  • • Decryption
  • • Cryptoanalysis
  • • Cryptography

Questão 58

Questão
A well designed and configured _____ is like having single point of entry into your building with a security guard at the door allowing only authorized personnel into the building
Responda
  • Firewall
  • Network adapter
  • Antivirus software
  • Intrusion detection system

Questão 59

Questão
Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with
Responda
  • The CA’s private key
  • Bobs public key
  • The CAs public key
  • Bobs private key

Questão 60

Questão
Suppose Alice receives from Bob a message m with digital signature for one message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Responda
  • Applies Bob’s public key to the digital signature applies to the hash function to m, and compares the results of the two operations.
  • Applies bobs public key to the digital signature, then a de-hashing function to the result. She then compares the result of this operation with the message m
  • Applies a de-hashing function to the digital signature and compares the result m
  • No correct answer

Semelhante

Tricky words: Set one
barrie edmonds
Present continuos tense
anama_gordillo
DELIVERING AT PACE
Natalie West
UNIT 1
missbotch
Untitled
atanuroy505
ANTT
Gaffer Ji
Phrasel Verb (Prepositions IN, ON, UP and AT)
Dmitriy Lagutin
Phrasel Verb (Prepositions IN, ON, UP and AT)
Петр Казаков
ANTT
Gaffer Ji
Preposition
jizaco0508