#2 Information security and data protection

Description

- at Quiz on #2 Information security and data protection, created by хомяк убийца on 13/05/2018.
хомяк убийца
Quiz by хомяк убийца, updated more than 1 year ago
хомяк убийца
Created by хомяк убийца over 6 years ago
956
21

Resource summary

Question 1

Question
This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Answer
  • Conditional access
  • Authentication
  • Identification
  • Anonymizer
  • Authorization

Question 2

Question
In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack
Answer
  • Password
  • Two factor authentication
  • Security token
  • Authentication

Question 3

Question
Why would reusing a ticket as a replay attack is Kerberos not be successful?
Answer
  • The tickets are encrypted
  • The tickets are digitally signed
  • The tickets are used a token
  • The tickets are time stamped

Question 4

Question
What is Man in the middle attack?
Answer
  • The attackers catch our employee in the middle of them and start applying physical pressure on them
  • The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras
  • The hacker jacks in a network and records all the information sent over the network

Question 5

Question
What is encryption strength is based on? Please select the best answer
Answer
  • The strength of the algorithm, the length of the key, and the secrecy of the key
  • The length of the key, the type of algorithm, and the strength of the key
  • The privacy of the key, the length of the algorithm, and the strength of the key
  • The strength of the key, the length of the algorithm, and the privacy of the key

Question 6

Question
One form of ‘something you have’ is the _____ and USB tokens
Answer
  • Fingerprint
  • Tokens
  • Identification
  • Password
  • Digital signatures

Question 7

Question
The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as (Please select the best answer)
Answer
  • Password authentication
  • Physical authentication
  • Fingerprint authentication
  • Biometric authentication

Question 8

Question
What is a good way to make users in a network safer in the internet
Answer
  • Get a slow connection so they cannot download too much
  • Deny all internet access
  • All of the above
  • None of the above
  • Set up a filtering proxy server so you can check all the incoming traffic

Question 9

Question
When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a
Answer
  • It is known as the Man in the middle attack
  • It is known as the TCP/IP spoofing attack
  • It is known as the Back door attack
  • It is known as the Replay attack

Question 10

Question
In which of the following attack does the attacker capture a portion of the communication between two parties, modifies it, and inserts
Answer
  • Man-in-the-middle attack
  • Spoofing
  • Sniffing
  • Denial-of-service

Question 11

Question
A password represents
Answer
  • Something you have
  • None of the above
  • Something you are
  • Something you know
  • All of the above

Question 12

Question
List the main aspects of information security: I. Confidentiality II. Integrity III. Availability IV. Consistency
Answer
  • I-III-IV
  • I-III
  • I-II-III
  • I only
  • II-III-IV

Question 13

Question
Which of the following describes the challenge-response
Answer
  • A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
  • A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)
  • A special hardware device that is used to generate random text in a cryptography system
  • The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.

Question 14

Question
Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?
Answer
  • 6
  • 8
  • 9
  • 16

Question 15

Question
Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should
Answer
  • Encrypt the message with Alice’s public key and send Alice the message
  • Encrypt the message with Alice’s private key and send the encrypted message to Alice
  • Encrypt the message with his public key and send Alice the message
  • Encrypt the message with his private key and send the encrypted message to Alice

Question 16

Question
Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature
Answer
  • Bob applies a hash function to m and then encrypts the result with his private key
  • Bob applies a hash function to m and then encrypts the result with his public key
  • Bob applies a hash function to m and then encrypts the result with Alice’s public key
  • Bob encrypts m with his private key and then applies a hash function to the result

Question 17

Question
Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Answer
  • Applies Bob's public key to the digital signature, applies the has function to m, and compares the results of the two operations;
  • Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m;
  • Applies a de-hashing function to the digital signature and compare the result to m;
  • No correct answer;

Question 18

Question
Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with
Answer
  • The CA's private key
  • Bob’s public key
  • The CA's public key
  • Bob’s private key

Question 19

Question
A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.
Answer
  • Network Adapter
  • Antivirus Software
  • Intrusion Detection System
  • Firewall

Question 20

Question
Which security action should be finished before access is given to the network?
Answer
  • Identification and authorization
  • Identification and authentication
  • Authentication and authorization
  • Authentication and password

Question 21

Question
Which of the following types of encryption would BEST to use for a large amount of data?
Answer
  • Asymmetric
  • Symmetric
  • RSA
  • Hash

Question 22

Question
Which statement correctly describes the difference between a secure cipher and a secure hash?
Answer
  • A hash produces a variable output for any input size; a cipher does not.
  • A cipher can be reversed; a hash cannot.
  • A cipher produces the same size output for any input size; a hash does not.

Question 23

Question
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
Answer
  • Decryption
  • Cryptanalysis
  • Cryptography
  • Brute force cracking

Question 24

Question
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Answer
  • Auditability
  • Availability
  • Integrity
  • Confidentiality

Question 25

Question
Which of the following appears when an asset of the system become lost, unavailable or unusable?
Answer
  • Interception
  • Interruption
  • Interpretation
  • Modification
  • Fabrication

Question 26

Question
Show incorrect kind of threats
Answer
  • Interception
  • Interruption
  • Interpretation
  • Modification
  • Fabrication

Question 27

Question
Bock cipher maps each plaintext block to :
Answer
  • Same length cipher text block
  • Different length cipher text block
  • The same letter
  • No answer

Question 28

Question
What is vulnerability?
Answer
  • A weakness in the security system
  • A Method which uses flaws to have more access, privileges or resources to the system
  • A method which used to eliminate or reduce threats
  • A kind of auth to system

Question 29

Question
A(n) _____ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through
Answer
  • Antivirus
  • Intrusion Detection System (IDS)
  • Personal Firewall
  • Network Monitor

Question 30

Question
What is assumed by cipher in cryptography ?
Answer
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Question 31

Question
What is assumed by ciphertext in cryptography?
Answer
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Question 32

Question
What is assumed by plaintext in cryptography?
Answer
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Question 33

Question
In cryptography, what is key?
Answer
  • Info used to cipher, known only to sender and receiver
  • Algorithm for transforming plaintext to ciphertext
  • Encrypted message
  • Recovering plaintext from ciphertext
  • Converting plaintext to ciphertext

Question 34

Question
What is cryptoanalysis?
Answer
  • Study of principles/methods deciphering ciphertext without knowing key
  • Info used to cipher, known only to sender and receiver
  • Algorithm for transforming plaintext to ciphertext
  • Recovering plaintext from ciphertext
  • Converting plaintext to ciphertext

Question 35

Question
In asymmetric key cryptography, the public key for decryption is kept by:
Answer
  • Sender
  • Receiver
  • Sender and receiver
  • Everyone in the network
  • All the connected devices to the network

Question 36

Question
Which of these are threats against to modern computer?
Answer
  • Network attacks, firewall and worms
  • Viruses, worms and encryption
  • Network attacks, viruses and worms
  • Viruses, network encryptions and worms

Question 37

Question
How the industry solves the threats ?
Answer
  • Firewall, IDS, Kerberos, blogs
  • IDS, firewall, authentication, policies
  • Virus, worms, attacks, web-sites
  • Network attacks, IDS, worms, virus

Question 38

Question
Which one of the following algorithm is not used in asymmetric key cryptography?
Answer
  • RSA algorithm
  • Diffle-Hellman algorithm
  • DES algorithm
  • DSA algorithm

Question 39

Question
In cryptography, the order of the order of the letters in a message in rearranged by
Answer
  • Transpositionalcip ciphers
  • substitution ciphers
  • All kinds of the ciphers
  • None of the mentioned

Question 40

Question
What is data encryption standard (DES)?
Answer
  • Block cipher
  • stream cipher
  • bit cipher
  • none of the mentioned

Question 41

Question
Cryptanalysis is used:
Answer
  • To find some insecurity in cryptographic scheme
  • to increase the speed
  • to encrypt the data
  • none of the mentioned

Question 42

Question
Cryptographic hash function takes an arbitrary block of data and returns
Answer
  • Fixed site bit string
  • variable size bit string
  • none of the mentioned
  • both of the mentioned

Question 43

Question
A substitution cipher substitutions one symbol with
Answer
  • Keys
  • Others
  • Multi Parties
  • Single Party

Question 44

Question
An asymmetric-key(or public key ) cipher uses
Answer
  • 1 key
  • 2 key
  • 3 key
  • 4 key

Question 45

Question
In the computer industry the “What you have” method is use of?
Answer
  • Passwords
  • Smart cards
  • Digital certificates’

Question 46

Question
A smartcard represents
Answer
  • None of the above
  • Something you are
  • All of the above
  • Something you have
  • Something you know

Question 47

Question
Convert one symbol of plaintext immediately into a symbol of cipher text (example:Caesar cipher)
Answer
  • Encryption
  • Plaintext
  • Block cipher
  • stream ciphers

Question 48

Question
Interruption is
Answer
  • Asset lost, unusable, unavailable
  • Unauthorized access
  • Unauthorized change, tamper of data
  • Ex. Unauthorized add data to a DB

Question 49

Question
Modification is
Answer
  • Unauthorized change, tamper of data
  • Asset lost, unusable, unavailable
  • Unauthorized access
  • Ex. Unauthorized add data to a DB

Question 50

Question
Which are the examples of DEFENCE?
Answer
  • Firewalls, router access control list, spam filters, virus scanners
  • Employee communication, policy on company Intranet
  • Audit logs, intrusion detection system, network traffic monitoring
  • Network attacks, IDS, worms, virus

Question 51

Question
Which are the examples of DETERRENCE?
Answer
  • Employee communication, policy on company Intranet
  • Firewalls, router access control list, spam filters, virus scanners
  • Audit logs, intrusion detection system, network traffic monitoring
  • Network attacks, IDS, worms, virus

Question 52

Question
Which are the examples of DETECTION?
Answer
  • Audit logs, intrusion detection system, network traffic monitoring
  • Employee communication, policy on company Intranet
  • Firewalls, router access control list, spam filters, virus scanners
  • Network attacks, IDS, worms, virus

Question 53

Question
What is encryption?
Answer
  • Is the process of encoding a message so that its meaning is not obvious
  • Is the reverse process, transforming an encrypted message back into its normal, original form
  • Is the process of preventing any attacks from the hackers

Question 54

Question
In password protection, this is a random string of data or number used to modify a password hash
Answer
  • Nonce
  • Ssl
  • One time password
  • Secret key
  • Public key

Question 55

Question
Using public key cryptography suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should:
Answer
  • Encrypt the message with his private key, encrypt the result with Ailce’s public key and then send Alice the message
  • • Encrypt the message with his private key , encrypt yhe result with alices’ private key, and then send Alicce the message
  • • Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message

Question 56

Question
Which statement correctly describes the difference between a secure cipher and a secure hash?
Answer
  • Cipher can be reversed, hash cannot
  • A hash can be reversed, a cipher cannot
  • A hash production a variable output fot any input size, a cipher does not
  • A cipher produces the same size output for any input size, a hash does not

Question 57

Question
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies
Answer
  • • Brute force cracking
  • • Decryption
  • • Cryptoanalysis
  • • Cryptography

Question 58

Question
A well designed and configured _____ is like having single point of entry into your building with a security guard at the door allowing only authorized personnel into the building
Answer
  • Firewall
  • Network adapter
  • Antivirus software
  • Intrusion detection system

Question 59

Question
Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with
Answer
  • The CA’s private key
  • Bobs public key
  • The CAs public key
  • Bobs private key

Question 60

Question
Suppose Alice receives from Bob a message m with digital signature for one message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Answer
  • Applies Bob’s public key to the digital signature applies to the hash function to m, and compares the results of the two operations.
  • Applies bobs public key to the digital signature, then a de-hashing function to the result. She then compares the result of this operation with the message m
  • Applies a de-hashing function to the digital signature and compares the result m
  • No correct answer
Show full summary Hide full summary

Similar

Tricky words: Set one
barrie edmonds
Present continuos tense
anama_gordillo
DELIVERING AT PACE
Natalie West
UNIT 1
missbotch
Untitled
atanuroy505
ANTT
Gaffer Ji
Phrasel Verb (Prepositions IN, ON, UP and AT)
Dmitriy Lagutin
Phrasel Verb (Prepositions IN, ON, UP and AT)
Петр Казаков
ANTT
Gaffer Ji
Preposition
jizaco0508