Question 1
Question
This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Answer
-
Conditional access
-
Authentication
-
Identification
-
Anonymizer
-
Authorization
Question 2
Question
In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack
Question 3
Question
Why would reusing a ticket as a replay attack is Kerberos not be successful?
Answer
-
The tickets are encrypted
-
The tickets are digitally signed
-
The tickets are used a token
-
The tickets are time stamped
Question 4
Question
What is Man in the middle attack?
Answer
-
The attackers catch our employee in the middle of them and start applying physical pressure on them
-
The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras
-
The hacker jacks in a network and records all the information sent over the network
Question 5
Question
What is encryption strength is based on? Please select the best answer
Answer
-
The strength of the algorithm, the length of the key, and the secrecy of the key
-
The length of the key, the type of algorithm, and the strength of the key
-
The privacy of the key, the length of the algorithm, and the strength of the key
-
The strength of the key, the length of the algorithm, and the privacy of the key
Question 6
Question
One form of ‘something you have’ is the _____ and USB tokens
Answer
-
Fingerprint
-
Tokens
-
Identification
-
Password
-
Digital signatures
Question 7
Question
The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as (Please select the best answer)
Question 8
Question
What is a good way to make users in a network safer in the internet
Question 9
Question
When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a
Answer
-
It is known as the Man in the middle attack
-
It is known as the TCP/IP spoofing attack
-
It is known as the Back door attack
-
It is known as the Replay attack
Question 10
Question
In which of the following attack does the attacker capture a portion of the communication between two parties, modifies it, and inserts
Answer
-
Man-in-the-middle attack
-
Spoofing
-
Sniffing
-
Denial-of-service
Question 11
Question
A password represents
Answer
-
Something you have
-
None of the above
-
Something you are
-
Something you know
-
All of the above
Question 12
Question
List the main aspects of information security: I. Confidentiality II. Integrity III. Availability IV. Consistency
Answer
-
I-III-IV
-
I-III
-
I-II-III
-
I only
-
II-III-IV
Question 13
Question
Which of the following describes the challenge-response
Answer
-
A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
-
A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)
-
A special hardware device that is used to generate random text in a cryptography system
-
The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.
Question 14
Question
Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?
Question 15
Question
Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should
Answer
-
Encrypt the message with Alice’s public key and send Alice the message
-
Encrypt the message with Alice’s private key and send the encrypted message to Alice
-
Encrypt the message with his public key and send Alice the message
-
Encrypt the message with his private key and send the encrypted message to Alice
Question 16
Question
Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature
Answer
-
Bob applies a hash function to m and then encrypts the result with his private key
-
Bob applies a hash function to m and then encrypts the result with his public key
-
Bob applies a hash function to m and then encrypts the result with Alice’s public key
-
Bob encrypts m with his private key and then applies a hash function to the result
Question 17
Question
Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Answer
-
Applies Bob's public key to the digital signature, applies the has function to m, and compares the results of the two operations;
-
Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m;
-
Applies a de-hashing function to the digital signature and compare the result to m;
-
No correct answer;
Question 18
Question
Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with
Answer
-
The CA's private key
-
Bob’s public key
-
The CA's public key
-
Bob’s private key
Question 19
Question
A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.
Question 20
Question
Which security action should be finished before access is given to the network?
Answer
-
Identification and authorization
-
Identification and authentication
-
Authentication and authorization
-
Authentication and password
Question 21
Question
Which of the following types of encryption would BEST to use for a large amount of data?
Answer
-
Asymmetric
-
Symmetric
-
RSA
-
Hash
Question 22
Question
Which statement correctly describes the difference between a secure cipher and a secure hash?
Answer
-
A hash produces a variable output for any input size; a cipher does not.
-
A cipher can be reversed; a hash cannot.
-
A cipher produces the same size output for any input size; a hash does not.
Question 23
Question
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
Answer
-
Decryption
-
Cryptanalysis
-
Cryptography
-
Brute force cracking
Question 24
Question
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Answer
-
Auditability
-
Availability
-
Integrity
-
Confidentiality
Question 25
Question
Which of the following appears when an asset of the system become lost, unavailable or unusable?
Answer
-
Interception
-
Interruption
-
Interpretation
-
Modification
-
Fabrication
Question 26
Question
Show incorrect kind of threats
Answer
-
Interception
-
Interruption
-
Interpretation
-
Modification
-
Fabrication
Question 27
Question
Bock cipher maps each plaintext block to :
Question 28
Question
What is vulnerability?
Answer
-
A weakness in the security system
-
A Method which uses flaws to have more access, privileges or resources to the system
-
A method which used to eliminate or reduce threats
-
A kind of auth to system
Question 29
Question
A(n) _____ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through
Question 30
Question
What is assumed by cipher in cryptography ?
Question 31
Question
What is assumed by ciphertext in cryptography?
Question 32
Question
What is assumed by plaintext in cryptography?
Question 33
Question
In cryptography, what is key?
Answer
-
Info used to cipher, known only to sender and receiver
-
Algorithm for transforming plaintext to ciphertext
-
Encrypted message
-
Recovering plaintext from ciphertext
-
Converting plaintext to ciphertext
Question 34
Question
What is cryptoanalysis?
Answer
-
Study of principles/methods deciphering ciphertext without knowing key
-
Info used to cipher, known only to sender and receiver
-
Algorithm for transforming plaintext to ciphertext
-
Recovering plaintext from ciphertext
-
Converting plaintext to ciphertext
Question 35
Question
In asymmetric key cryptography, the public key for decryption is kept by:
Question 36
Question
Which of these are threats against to modern computer?
Answer
-
Network attacks, firewall and worms
-
Viruses, worms and encryption
-
Network attacks, viruses and worms
-
Viruses, network encryptions and worms
Question 37
Question
How the industry solves the threats ?
Answer
-
Firewall, IDS, Kerberos, blogs
-
IDS, firewall, authentication, policies
-
Virus, worms, attacks, web-sites
-
Network attacks, IDS, worms, virus
Question 38
Question
Which one of the following algorithm is not used in asymmetric key cryptography?
Answer
-
RSA algorithm
-
Diffle-Hellman algorithm
-
DES algorithm
-
DSA algorithm
Question 39
Question
In cryptography, the order of the order of the letters in a message in rearranged by
Question 40
Question
What is data encryption standard (DES)?
Answer
-
Block cipher
-
stream cipher
-
bit cipher
-
none of the mentioned
Question 41
Question
Cryptanalysis is used:
Question 42
Question
Cryptographic hash function takes an arbitrary block of data and returns
Answer
-
Fixed site bit string
-
variable size bit string
-
none of the mentioned
-
both of the mentioned
Question 43
Question
A substitution cipher substitutions one symbol with
Answer
-
Keys
-
Others
-
Multi Parties
-
Single Party
Question 44
Question
An asymmetric-key(or public key ) cipher uses
Question 45
Question
In the computer industry the “What you have” method is use of?
Answer
-
Passwords
-
Smart cards
-
Digital certificates’
Question 46
Question
A smartcard represents
Answer
-
None of the above
-
Something you are
-
All of the above
-
Something you have
-
Something you know
Question 47
Question
Convert one symbol of plaintext immediately into a symbol of cipher text (example:Caesar cipher)
Answer
-
Encryption
-
Plaintext
-
Block cipher
-
stream ciphers
Question 48
Answer
-
Asset lost, unusable, unavailable
-
Unauthorized access
-
Unauthorized change, tamper of data
-
Ex. Unauthorized add data to a DB
Question 49
Answer
-
Unauthorized change, tamper of data
-
Asset lost, unusable, unavailable
-
Unauthorized access
-
Ex. Unauthorized add data to a DB
Question 50
Question
Which are the examples of DEFENCE?
Answer
-
Firewalls, router access control list, spam filters, virus scanners
-
Employee communication, policy on company Intranet
-
Audit logs, intrusion detection system, network traffic monitoring
-
Network attacks, IDS, worms, virus
Question 51
Question
Which are the examples of DETERRENCE?
Answer
-
Employee communication, policy on company Intranet
-
Firewalls, router access control list, spam filters, virus scanners
-
Audit logs, intrusion detection system, network traffic monitoring
-
Network attacks, IDS, worms, virus
Question 52
Question
Which are the examples of DETECTION?
Answer
-
Audit logs, intrusion detection system, network traffic monitoring
-
Employee communication, policy on company Intranet
-
Firewalls, router access control list, spam filters, virus scanners
-
Network attacks, IDS, worms, virus
Question 53
Question
What is encryption?
Answer
-
Is the process of encoding a message so that its meaning is not obvious
-
Is the reverse process, transforming an encrypted message back into its normal, original form
-
Is the process of preventing any attacks from the hackers
Question 54
Question
In password protection, this is a random string of data or number used to modify a password hash
Answer
-
Nonce
-
Ssl
-
One time password
-
Secret key
-
Public key
Question 55
Question
Using public key cryptography suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should:
Answer
-
Encrypt the message with his private key, encrypt the result with Ailce’s public key and then send Alice the message
-
• Encrypt the message with his private key , encrypt yhe result with alices’ private key, and then send Alicce the message
-
• Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message
Question 56
Question
Which statement correctly describes the difference between a secure cipher and a secure hash?
Answer
-
Cipher can be reversed, hash cannot
-
A hash can be reversed, a cipher cannot
-
A hash production a variable output fot any input size, a cipher does not
-
A cipher produces the same size output for any input size, a hash does not
Question 57
Question
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies
Answer
-
• Brute force cracking
-
• Decryption
-
• Cryptoanalysis
-
• Cryptography
Question 58
Question
A well designed and configured _____ is like having single point of entry into your building with a security guard at the door allowing only authorized personnel into the building
Question 59
Question
Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with
Answer
-
The CA’s private key
-
Bobs public key
-
The CAs public key
-
Bobs private key
Question 60
Question
Suppose Alice receives from Bob a message m with digital signature for one message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Answer
-
Applies Bob’s public key to the digital signature applies to the hash function to m, and compares the results of the two operations.
-
Applies bobs public key to the digital signature, then a de-hashing function to the result. She then compares the result of this operation with the message m
-
Applies a de-hashing function to the digital signature and compares the result m
-
No correct answer