Question 1
Question
A message is authentic and digitally signed if sent with:
Answer
-
a message digest/hash encrypted with the receiver’s public key
-
a message digest/hash encrypted with the receiver’s private key
-
a message digest/hash encrypted with the sender’s public key
-
a message digest/hash encrypted with the sender’s private key
Question 2
Question
Which of the following issues is not addressed by Kerberos:
Answer
-
availability.
-
privacy.
-
integrity.
-
authentication.
Question 3
Question
In Asymmetric-Key Cryptography, two keys, e and d, have a special relationship to
Answer
-
Others
-
Data
-
Keys
-
Each other
Question 4
Question
Substitutional cipers are
Question 5
Question
Heart of Data Encryption Standard (DES), is the
Answer
-
Cipher
-
Rounds
-
Encryption
-
DES function
Question 6
Question 7
Question
In symmetric key cryptography, key used by sender and receiver is
Answer
-
Shared
-
Different
-
two keys are used
-
None
Question 8
Question
In symmetric-key cryptography, key(s) used for encryption and decryption is/are
Answer
-
Same
-
Different
-
Private
-
Public
Question 9
Question
Keys used in cryptography are
Answer
-
secret key
-
private key
-
public key
-
All of them
-
None of them
Question 10
Question
Cryptography can provide
Question 11
Question
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Answer
-
Data Size
-
Round Size
-
Key Size
-
Encryption Size
Question 12
Question
Cryptography algorithms (ciphers) are divided into
Answer
-
two groups
-
four groups
-
one single group
-
None
Question 13
Question
In Cryptography, original message, before being transformed, is called
Answer
-
Simpletext
-
Plaintext
-
Emptytext
-
Filledtext
Question 14
Question
SHA-l has a message digest of
Answer
-
160 bits
-
512 bits
-
628 bits
-
820 bits
Question 15
Question
A hash function guarantees integrity of a message. It guarantees that message has not be
Answer
-
Replaced
-
Over view
-
Changed
-
Left
Question 16
Question
To check integrity of a message, or document, receiver creates the
Answer
-
Cipher text
-
Hash
-
Hyper Text
-
Finger Print
Question 17
Question
A digital signature needs a
Answer
-
private-key
-
shared-key
-
public-key
-
All of them
-
None of them
Question 18
Question
Encryption and decryption provide secrecy, or confidentiality, but not
Answer
-
Authentication
-
Integrity
-
Keys
-
Frames
-
Confidentiality
Question 19
Question
When data must arrive at receiver exactly as they were sent, it is called
Answer
-
Message Confidentiality
-
Message Integrity
-
Message Splashing
-
Message Sending
Question 20
Question
In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
Answer
-
512 Bit Blocks
-
1023 Bit Blocks
-
1001 Bit Blocks
-
1510 Bit Blocks
-
2024 Bit Blocks
Question 21
Question
Message privacy means that sender and receiver expect
Answer
-
Integrity
-
Confidentiality
-
Authentication
-
Nonrepudiation
Question 22
Question
Message must be encrypted at sender site and decrypted at the
Answer
-
Sender Site
-
Site
-
Receiver site
-
Conferencing
Question 23
Question
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if message is
Answer
-
Short
-
Huge
-
Complex
-
Thin
-
None of them
Question 24
Question
An encryption algorithm transforms plaintext into
Answer
-
Cipher text
-
Simple Text
-
Plain Text
-
Empty Text
Question 25
Question
A transposition cipher reorders (permutes) symbols in a
Answer
-
block of packets
-
block of slots
-
block of signals
-
block of symbols
Question 26
Question
Ciphers of today are called round ciphers because they involve
Answer
-
Single Round
-
Double Rounds
-
Multiple Round
-
Round about
Question 27
Answer
-
Rivest, Shamir, Adleman
-
Roger, Shamir, Adrian
-
Robert, Shamir, Anthoney
-
Rivest, Shaw, Adleman
Question 28
Question
_______ is the science and art of transforming messages to make them secure and immune to attacks.
Answer
-
Cryptography
-
Cryptoanalysis
-
Crypt
-
Encryption
-
None of them
Question 29
Question
The _______ is a number or a set of numbers on which the cipher operates.
Answer
-
cipher
-
nonce
-
secret
-
key
-
none of the above
Question 30
Question
In a(n) ________ cipher, the same key is used by both the sender and receiver.
Answer
-
symmetric-key
-
asymmetric-key
-
Public-key cryptography
-
RSA algorithm
-
None of them
Question 31
Question
In a(n) ________, the key is called the secret key.
Answer
-
symmetric-key
-
asymmetric-key
-
Public-key cryptography
-
All of them
-
None of them
Question 32
Question
In a(n) ________ cipher, a pair of keys is used
Answer
-
symmetric-key
-
asymmetric-key
-
Private-key cryptography
-
DES algorithm
Question 33
Question
The Caesar cipher is a _______cipher that has a key of 3.
Answer
-
transposition
-
additive
-
asymmetric
-
substitution
-
none of the above
Question 34
Question
The ________ cipher reorders the plaintext characters to create a ciphertext.
Answer
-
transposition
-
additive
-
asymmetric
-
substitution
-
shift
Question 35
Question
A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream.
Answer
-
S-box
-
P-box
-
T-box
-
none of the above
-
SP-boxes
Question 36
Question
A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.
Answer
-
S-box
-
P-box
-
T-box
-
none of the above
-
SP-boxes
Question 37
Question
DES is a(n) ________ method adopted by the U.S. government.
Answer
-
symmetric-key
-
asymmetric-key
-
decryption
-
encryption
-
None of them
Question 38
Question
DES has an initial and final permutation block and _________ rounds.
Answer
-
14
-
15
-
12
-
16
-
none of the above
Question 39
Question
DES uses a key generator to generate sixteen _______ round keys.
Answer
-
32-bit
-
48-bit
-
56-bit
-
42-bit
-
64-bit
Question 40
Question
AES has _____ different configurations
Question 41
Question
One commonly used public-key cryptography method is the ______ algorithm.
Question 42
Question
The ________ method provides a one-time session key for two parties.
Answer
-
Diffie-Hellman
-
RSA
-
DES
-
AES
-
DSA
Question 43
Question
In symmetric cryptography, which of the following MUST be true:
Answer
-
The same key is used for encryption and decryption
-
Encryption and decryption take the same amount of time
-
Different algorithms are used for encryption and decryption
-
Cryptographic operations are one‐way, and not reversible
Question 44
Question
Message _____ means that the data must arrive at the receiver exactly as sent.
Answer
-
confidentiality
-
integrity
-
authentication
-
availability
-
none of the above
Question 45
Question
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
Answer
-
confidentiality
-
integrity
-
availability
-
authentication
-
none of the above
Question 46
Question
________ means to prove the identity of the entity that tries to access the system's resources.
Answer
-
Message authentication
-
Entity authentication
-
Message confidentiality
-
Message integrity
-
none of the above
Question 47
Question
Digital signature cannot provide ________ for the message.
Answer
-
integrity
-
confidentiality
-
nonrepudiation
-
authentication
-
availability
Question 48
Question
Challenge-response authentication can be done using ________.
Answer
-
symmetric-key ciphers
-
asymmetric-key ciphers
-
keyed hash function
-
keyless hash function
-
all of the above
Question 49
Question
A digital signature needs a(n)_________ system.
Question 50
Question
The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
Question 51
Question
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Answer
-
Auditability
-
Confidentiality
-
Integrity
-
Availability
-
Identity
Question 52
Question
I have a company’s documents which are proprietary and a trade secret. How do I protect them from getting stolen?
Question 53
Question
Biometrics represents:
Answer
-
Something you know
-
Something you have
-
Something you are
-
All of the above
-
None of the above
Question 54
Question
In asymmetric encryption
Answer
-
same key is used for encryption and decryption
-
different keys are used encryption and decryption
-
no key is required for encryption and decryption
-
none of the mentioned
Question 55
Question
The sender “signs” a message as:
Answer
-
Digital Signature
-
Artificial Signature
-
Encrypted Signature
-
None of the above
Question 56
Question 57
Answer
-
Advanced Encryption Standard
-
Advanced Encryption System
-
Advanced Encryption Suggestion
-
None of the above
Question 58
Question
Authentication is:
Question 59
Question
The process to discover plaintext or key is known as
Answer
-
Cryptanalysis
-
Cryptography
-
Crypto design
-
Crypto processing
-
Cryptology
Question 60
Question
Output message in cryptography is called:
Answer
-
Plaintext
-
Ciphertext
-
Raw text
-
None of the above
Question 61
Question
Input message in cryptography is called:
Answer
-
Plaintext
-
Ciphertext
-
Encrypted text
-
None of the above
Question 62
Question 63
Question
Secure hash algorithm(SHA) developed by:
Question 64
Question
Conventional encryption is:
Answer
-
Symmetric encryption
-
Secret key encryption
-
Single key encryption
-
All of the above
Question 65
Question
In network security:
Answer
-
Data is protected from hackers
-
Data is protected from cracker
-
Both answers are possible
-
None of the above
Question 66
Question 67
Question
Cryptography ensures:
Answer
-
Confidentiality of data
-
Authentication of data
-
Integrity of data
-
All of the above
Question 68
Question
In network security:
Question 69
Question
Network security ensures:
Answer
-
Detecting attacks
-
Preventing attacks
-
Recovering attacks
-
All of the above
Question 70
Question
Encryption protects against:
Answer
-
Attacks
-
Viruses
-
Manipulation of data
-
All of the above
Question 71
Question
Authentication refers to:
Question 72
Question
The message is decrypted at ________ - side
Answer
-
Receiver
-
Sender
-
Broker
-
Attacker
-
All of the above
Question 73
Question
Cryptography relates to ______
Answer
-
Editing
-
Security
-
Testing
-
All of the above
Question 74
Question
Which of the following is not used for symmetric encryption?
Question 75
Question
Finding plaintext, without knowing key is know as:
Answer
-
Cryptography
-
Cryptanalysis
-
Cryptology
-
None of the above
Question 76
Question
Which of the following is a transposition cipher?
Answer
-
Caesar cipher
-
Vigenere cipher
-
One time pad
-
Playfair cipher
Question 77
Question
Which of the following is a monoalphabetic cipher?
Answer
-
Caesar Cipher
-
Lucifier cipher
-
Playfair cipher
-
No correct answer
Question 78
Question
RSA involves very large _____ numbers.
Answer
-
Prime
-
Even
-
Odd
-
Any random
Question 79
Question
Cryptology means
Answer
-
Cryptography + Cryptodesign
-
Cryptography + Cryptanalysis
-
Cryptography itself known as cryptology also
-
None of the above
Question 80
Question
Diffie-Hellman key exchange is vulnerable to:
Question 81
Question
None of these Which of the following is an example of a passive attack?
Answer
-
Modify
-
Denial of Service (DoS)
-
Masquerade
-
Traffic analysis
Question 82
Question
Which kind of service ensures that a message was received from the actual sender not from an attacker?
Answer
-
Confidentiality
-
Access Control
-
Integrity
-
Non-repudiation
-
Authentication
Question 83
Question
Which of the following is an active attack? I. Release of message contents; II. Traffic analysis; III. Modify; IV. Denial of Service
Answer
-
I and II
-
I and III
-
III and IV
-
II and IV
-
I, III and IV
Question 84
Question
The method of hiding the secret is called
Answer
-
Cryptography
-
Watermarking
-
Cryptanalysis
-
Steganography
Question 85
Question
It is the art of breaking the cipher
Answer
-
Cryptanalysis
-
Watermarking
-
Cryptography
-
Steganography
Question 86
Question
The field which deals with _____ called cryptography
Question 87
Question
What would be the number of rounds in AES, if the key size is 24 bytes?
Question 88
Question
What would be the number of rounds in AES, if the key size is 32 bytes?
Question 89
Question
Which of the following step is absent in the last round of AES?
Answer
-
Shift row
-
Mix columns
-
Byte substitution
-
Add subkey
Question 90
Question
DES algorithm uses total ______ subkeys
Question 91
Question
The total number of rounds in DES algorithm.
Question 92
Question
Which of the following method provides a one-time session key for two parties?
Answer
-
Diffie-Hellman
-
RSA
-
DES
-
AES
Question 93
Question
What is the size of round key for DES algorithm?
Answer
-
32-bit
-
48-bit
-
64-bit
-
128-bit
Question 94
Question
What is the purpose of access control list?
Answer
-
to enforce a specified security policy
-
to prevent unauthorised access to data
-
to emphasize encryption
-
it is a key distribution center
Question 95
Question
Define a subject of Access Control List
Answer
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Question 96
Question
Define an object of Access Control List
Answer
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Question 97
Question
What does multilevel security mean?
Answer
-
Classification of information by the level of importance and permission of access by users with different security clearance
-
Classification of information by date and permission of access by users with different security clearance
-
Classification of information by the level of importance and permission of access by users name
-
Classification of information by date and permission of access by users name
Question 98
Question
How many levels are covered in multilevel security
Question 99
Question
No read up (read down) means
Answer
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Question 100
Question
No write down (write up) means
Answer
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Question 101
Question
What does “computationally infeasible to find data mapping to specific hash” mean?
Answer
-
One way property
-
Collision free property
-
Second way property
-
Collision property
Question 102
Question
Which of the following is not property of hash functions?
Question 103
Question
The purpose of hash function is to
Answer
-
Create a message
-
Compress a message
-
Divide a message
-
Conquer a message
Question 104
Question
Which of the following refers requirement of digital signature?
Answer
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be computationally infeasible to forge
Question 105
Question
Which of the following refers requirement of digital signature?
Answer
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be practical to save digital signature in storage
Question 106
Question
What is the property of direct digital signature?
Answer
-
Assumed receiver has sender’s private key
-
Involves only sender
-
Can encrypt using receiver’s public key
-
Assumed sender has receiver’s private key
Question 107
Answer
-
Access After Anyone
-
Authentication Authorization Accounting
-
Authentication Authorization Access
-
Authentication Access Accounting
Question 108
Question
Which of the term refers to authorization?
Answer
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
-
Accounting of service
Question 109
Question
Which of the term refers to accounting?
Answer
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
Question 110
Answer
-
TTP certifies trustworthiness of binding public key with its rightful owner’s identity
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Question 111
Question
Define a Kerberos
Answer
-
Trusted third party authentication system and makes no use of public key cryptography
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Question 112
Question
Which of the following does not refer for Kerberos property
Answer
-
Impeccability
-
Containment
-
Transparency
-
Viciousness
Question 113
Question
How BruteForce works
Answer
-
аttаckеr triеs еvеry possiblе combinаtion of chаrаctеrs
-
Install viruses
-
Attacker sends more data to an application than is expected
-
Attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability