This sheet is for 1 Mark questions
S.r No                                                  Question
  1      _______ is the practice and precautions taken to protect valuable information from unauthorized
         access, recording, disclosure or destruction.
  2
         _______ platforms are used for safety and protection of information in the cloud.
  3      Compromising confidential information comes under _________
  4      An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
  5      The CIA triad is often represented by which of the following?
  6      Related to information security, confidentiality is the opposite of which of the following?
  7      When you use the word ______it means you are protecting your data from getting disclosed.
  8      _______ means the protection of data from modification by unknown users.
  9      _______ of information means, only authorized users are capable of accessing the information.
 10      This helps in identifying the origin of information and authentic user. This referred to here as
         __________
 11      Data ___________ is used to ensure confidentiality.
 12
         What does OSI stand for in the OSI Security Architecure?
 13      A company requires its users to change passwords every month. This improves the ________ of the
         network.
 14
         Release of message contents and Traffic analysis are two types of _________ attacks.
 15      The ________ is encrypted text.
 16      What type of attack uses a fraudulent server with a relay address?
 17
         Which of the following Algorithms not belong to symmetric encryption
 18      Which is the largest disadvantage of the symmetric Encryption?
 19      In cryptography, what is cipher?
 20      In asymmetric key cryptography, the private key is kept by __________
 21      Which one of the following algorithm is not used in asymmetric-key cryptography?
 22      In cryptography, the order of the letters in a message is rearranged by __________
 23      What is data encryption standard (DES)?
 24      A asymmetric-key (or public key ) cipher uses
 25      In asymmetric key cryptography, the two keys e and d, have special relationship to
 26      _________________ is the process or mechanism used for converting ordinary plain text into
         garbled non-human readable text & vice-versa.
 27      ______________ is a means of storing & transmitting information in a specific format so that only
         those for whom it is planned can understand or process it.
 28      4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use
         ___________ for a secure transformation of data.
 29      Conventional cryptography is also known as _____________ or symmetric-key encryption.
 30      The procedure to add bits to the last block is termed as _________________
 31      How many rounds does the AES-192 perform?
32
     ECC encryption system is __________
33   ________function creates a message digest out of a message.
34   Extensions to the X.509 certificates were added in version ____
35   A digital signature needs ____ system
36   “Elliptic curve cryptography follows the associative property.”
37   ECC stands for
     When a hash function is used to provide message authentication, the hash function value is referred
38   to as
39   Message authentication code is also known as
40   The main difference in MACs and digital signatures is that, in digital signatures the hash value of the
     message is encrypted with a user’s public key.
41   The DSS signature uses which hash algorithm?
42   What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
43   In the handshake protocol which is the message type first sent between client and server ?
44   One commonly used public-key cryptography method is the ______ algorithm.
45   he ________ method provides a one-time session key for two parties.
46   The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not
     authenticated to each other.
47   In the handshake protocol which is the message type first sent between client and server ?
48   1. VPN is abbreviated as __________
49   __________ provides an isolated tunnel across a public network for sending and receiving data
     privately as if the computing devices were directly connected to the private network.
50   Which of the statements are not true to classify VPN systems?
51   What types of protocols are used in VPNs?
52   VPNs uses encryption techniques to maintain security and privacy which communicating remotely
     via public network.
53   There are _________ types of VPNs.
54   _________ type of VPNs are used for home private and secure connectivity.
55   Which types of VPNs are used for corporate connectivity across companies residing in different
     geographical location?
56   Site-to-Site VPN architecture is also known as _________
57   There are ________ types of VPN protocols.
58   IPSec is designed to provide security at the _________
59   In tunnel mode, IPSec protects the ______
60   Pretty good privacy (PGP) is used in ______
61
     PGP encrypts data by using a block cipher called ______
62   IKE creates SAs for _____.
63   ______ provides either authentication or encryption, or both, for packets at the IP level.
64   A _______network is used inside an organization.
65   SSL provides _________.
66   IKE uses _______
67   In ______, there is a single path from the fully trusted authority to any certificate.
68   A ______ provides privacy for LANs that must communicate through the global Internet.
69    _______ uses the idea of certificate trust levels.
70   ________ provides privacy, integrity, and authentication in e-mail.
71   In _____, there can be multiple paths from fully or partially trusted authorities.
72   ______ provides authentication at the IP level.
73   In _______, the cryptographic algorithms and secrets are sent with the message.
74   ______ was invented by Phil Zimmerman.
75
     ISAKMP stands for ______
76   PGP makes use of which cryptographic algorithm?
77   What is the key size allowed in PGP?
78
     In SSL, what is used for authenticating a message?
79
     S/MIME is abbreviated as __________________
80   Security Measures Needed to protect ________ during their transmission
81   __________ means knowledge obtained from investigation, study , intelligence new ,facts .
82   Prevention of the unauthorised used of Resources refers too?
83   Protection against Denial by one of these parties in a communication refers to?
84
     Which One of them is Passive attack?
85   What is lying of IP address called as?
86
     What is full form of DDoS?
87   A hacker guessing suggested password to a program is call as?
88
     Symmetric key encryption is also called as?
89   Conversion of Cypher text to plain text?
90   __is used to create the organisation's overall security program.
91   An act of protecting information from unauthorised disclouser to an entity.-
92   A way to ensure that the entity is indeed what it claims to be.-
93   The__model is 7 layer architecture where each layer is having some specific functionality to perform.
94
     The full form of OSI is OSI model__.
95   The technique in which when one character is replaced by another Character is called as?
96   Conversion of plain text into Cipher text is called as________.
 97   In Symmetric schemes requires both parties to share how many secret key?
 98   Blum Blum Shub Generator is based on which Algorithm?
 99   In DES step both LPT and RPT undergoes in how much key Rounds?
100   What is the 4th step in DES Algorithm?
101   In AES in which Round Subkeys are Generated from Original key for each round?
102
    AES stands for?
103 Which of them is type of Cipher?
104 The message which is not understandable is called as?
105 The__is a polygraphic substitution cipher based on linear algebra.
106 __is the practice of concealing a message within another message,image or file.
107 In asymmetric key cryptography, the private key is kept by __________
108 What is data encryption standard (DES)?
109 In cryptography the original message before being transform is called
110 An asymmetric-key (or public-key) cipher uses
111 In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual
    messages, it is very slow if the message is
112 The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties
    are not
113   In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
114   For RSA to work, the value of P must be less than the value of
115   In RSA, Ф(n) = _______ in terms of p and q.
116   In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).
117   RSA is also a stream cipher like Merkel-Hellman.
118
    USENET falls under which category of public key sharing?
119 PGP makes use of which cryptographic algorithm?
120
      Public key cryptography also called as________
121
      ECC stands for
122
      Diffie-Hellman algorithm is widely known as_________
123 Hash function is used for________
124
      RSA algorithm is best example of_______
125 IPSec is designed to provide security at the _________
126 In tunnel mode, IPSec protects the ______
127
      HTTPS is abbreviated as _________
128 An attempt to make a computer resource unavailable to its intended users is called ______
129
      SSL primarily focuses on _______
130   Pretty good privacy (PGP) is used in ______
131   __________ is used for encrypting data at network level
132   WPA2 is used for security in _______
133   Which of the following is not a strong security protocol
134 TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based
    connection.
135 IPSec operates in..... different modes
136 length of the IPv4 address is ....
137 Internet Key Exchange has .... phases and modes of operations
138 PGP is abbreviated as
139
      SET stands for
140   Transport layer Protocol consists of ... main components
141   length of the IPv6 acddress is ....
142   SSL provides _________.
143   IPSec provides ....protocols for network layer
144   length of the IPv6 header is....
Image                 a                        b                         c
        a) Network Security         b) Database Security c) Information Security
        a) Cloud workload           b) Cloud security
        protection platforms        protocols              c) AWS
        a) Bug                      b) Threat              c) Vulnerability
        a) Cyber-crime              b) Cyber Attack        c) System hijacking
        a) Triangle                 b) Diagonal            c) Ellipse
        a) Closure                  b) Disclosure          c) Disaster
        a) Confidentiality          b) Integrity           c) Authentication
        a) Confidentiality          b) Integrity           c) Authentication
        a) Confidentiality          b) Integrity           c) Non-repudiation
        a) Confidentiality          b) Integrity           c) Authenticity
        a) Encryption               b) Locking             c) Decryption
                                 b) Open Systems
        a) Open System Interface Interconnections          c) Open Source Initiative
        a) Performance              b) Reliability         c) Security
                                    b) Modification of
        a) Active Attack            Attack                 c) Passive attack
        a) Cipher scricpt           b) Cipher text         c) Secret text
        NTLM                        MITM                   NetBIOS
        3DES (TripleDES)
                                 RSA                 RC5
        More complex and therefore
                                 Problem of the secureLess secure encryption functi
        algorithm for performing e encrypted message both algorithm for performin
         sender                    receiver              sender and receiver
        rsa algorithm              diffie-hellman algori electronic code book algorit
        transpositional ciphers     substitution ciphers   both transpositional ciphers a
         block cipher               stream cipher          bit cipher
        1 key                       2 key                  3 key
        others                      data                   keys
        Malware Analysis            Exploit writing        Reverse engineering
        Malware Analysis            Cryptography           Reverse engineering
         secret key                  external programs add-ons
        secret-key                   public key          protected key
        decryption                   hashing             tuning
                                  10                  12                               14
symmetric key encryption
algorithm                asymmetric key encrnot an encryption algorithm
encryption                   decryption              hash
                         1                       2                              3
symmetric-key                asymmetric-key          either (a) or (b)
                          1                   0
Elliptic curve cryptography Enhanced curve cryptElliptic cone cryptography
Message Field                Message Digest          Message Score
key code                     hash code               keyed hash function
                         1                       0
MD5                          SHA-2                   SHA-1
 42 bytes                    32 bytes                36 bytes
server_hello                 client_hello            hello_request
 RSS                         RAS                     RSA
 Diffie-Hellman              RSA                     DES
man-in-the-middle            ciphertext attack       plaintext attack
server_hello                 client_hello            hello_request
Visual Private Network       Virtual Protocol NetwVirtual Private Network
Visual Private Network       Virtual Protocol NetwVirtual Protocol Networking
Protocols used for tunnelling
                            Whether VPNs are prov
                                               Securing the network from b
Application level protocols Tunnelling protocols Network protocols
                         1 False
                         3                       2                              5
Remote access VPNs           Site-to-site VPNs       Peer-to-Peer VPNs
Remote access VPNs           Site-to-site VPNs       Peer-to-Peer VPNs
Remote connection based Peer-to-Peer VPNs Extranet based VPN
                         3                       4                              5
Transport layer              Network layer           Application layer
Entire IP packet             IP header               IP payload
Browser security             Email security          FTP security
                             Private data
International data           encryption              Internet data encryption
encryption algorithm         algorithm               algorithm
SSL                         PGP                      IPSec
AH                          ESP                     PGP
private                     public                  semi-private
 message integrity          confidentiality         compression
 Oakley                     SKEME                    ISAKMP
X509                         PGP                     KDC
VPP                         VNP                     VNN
X509                        PGP                      KDC
IPSec                        SSL                     PGP
X509                         PGP                    KDC
AH                          ESP                     PGP
 IPSec                       SSL                    TLS
IPSec                        SSL                    PGP
                            Internet Security
Internet system             Association and Key
Association and Key         Management              Interchange System And
Management Packet           Protocol                Key Modeling Protocol
DES                         AES                     RSA
1024-1056                    1024-4056              1024-4096
                            MAC (Message
MAC (Message Access         Authentication          MAC (Machine
Code)                       Code)                   Authentication Code)
Secure/Multimedia           Secure/Multipurpos
Internet Mailing            e Internet Mailing Secure/Multimedia Internet
Extensions                  Extensions         Mail Extensions
file                        Data                    packet
Security                    Data                    Information
Data Integrity              Data confidentiality    Acess Control
Non-Repudiation             Data integrity          Authentication
                            modify message in
Denial of Service           transit                 Replay previous message
IP Spoofing                 IP Scamming             IP Lying
                            Distributed Denial of
Derived Denial of service   service                 Denial of service
Password Guessing           Dictionary Attack       Default password attack
                            Private Key
public key Encryption       Encryption              Both of these
Encryption                  Decryption              Simple text
program policy              purpose                 security
intergrity                  avability               confidentiality
Authentication              Accountability          identification
TCP                         OSI                     OIS
open systems                open software
interconnection             interconnection         open connection
Transposition               Substitution            Combinational
Encryption                  Decryption              Hidden Text
one                              two                       three
Private key                      Public key                both a & b
                             8                        16                               32
key transformation               S-box Substitution        P-box Permutation
Key Expansion                    Initial Round             Finale Round
Authorized Encryption            Advance Encryption
Standard                         Standard                  Advance Encryption Strategy
Stream Cipher                    Block Cipher              both of Them
Cipher Text                      plain text                Hidden text
Hill cipher                      playfair cipher           Affine cipher
steganography                    cryptography              cipher
sender                           receiver                  sender and receiver
block cipher                     stream cipher             bit cipher
simple text                      plain text                empty text
 1 key                           2 key                      3 key
Short                            Flat                      Long
Authenticated                    Joined                    Submit
other                            Data                      Keys
p                                q                         n
 (p)/(q)                          (p)(q)                   (p-1)(q-1)
                             1                         0
                             1                         0
                                 publicly available
public announcement              directory             public key authority
RSA                              AES                   DES
Asymmetric key                   Symmetric key
cryptography                     cryptography          Both a and b
Elliptic Curve                   Elliptic Cryptography
Cryptography                     Curve                 Error Correcting Code
                                 key agreement
Key exchange algorithm           algorithm             only a
Message authentication           Digital Signature         Both a and b
Asymmetric key                   Symmetric key
cryptography                     cryptography              Elliptic Curve Cryptography
Transport layer                  Network layer             Application layer
Entire IP packet                 IP header                 IP payload
                                 Secured Hyper
Hypertexts Transfer              Text Transfer             Hyperlinked Text Transfer
Protocol Secured                 Protocol                  Protocol Secured
Denial-of-service attack         Virus attack              Worms attack
                                 integrity and non-
integrity and authenticity       repudiation               authenticity and privacy
Browser security                 Email security            WiFi security
IPSec                            HTTPS                     SMTP
Ethernet                         Wi-Fi                     Bluetooth
SSL                              HTTPL                     SMTP
                        1                    0
                        3                    2                       4
32 bits                     64 bits              16 bits
                        4                     3                      2
Pretty Good Privacy         Pretty Good Policy Policy Good Privacy
                            Secure Electronic   Simple Electronic
Set Electronic Transaction Transaction          Transaction
                          2                   1                      3
32 bits                     64 bits             16 bits
message integrity           confidentiality     compression
                          7                   3                      1
64 bits                     16 bits             32 bits
                             Correct
             d
                             Answer
                                c
d) Physical Security
d) One Drive                   a
d) Attack                      b
d) Digital crime               b
d) Circle                      a
d) Disposal                    b
d) Availability                a
d) Non-repudiation             b
d) Availability                d
d) Availability                c
d) Backup                      a
d) Open Standard
Interconnections               b
d) None of the above            c
d) DoS Attack                  c
d) Secret script               b
SMB                            b
IDEA                           b
 Isn't used any more.          b
decrypted message              a
all the connected devices      b
dsa algorithm                  c
quadratic ciphers              a
byte cipher                    a
4 key                          b
each other                     d
Cryptography                   d
Exploit writing                b
secondary key                  a
primary key                    a
padding                        d
                        16     b
block cipher method           b
none of the above             c
                          4   c
neither (a) nor (b)           b
                              a
Eclipse curve cryptograph     a
Message Leap                  d
message key hash functi       b
                              b
Does not use hash algori      c
 48 bytes                     c
certificate_request           b
 RAA                          c
AES                           a
none of the above             a
certificate_request           b
Virtual Protocol Networki     c
Virtual Private Network       d
Levels of security provid     c
Mailing protocols             a
                          4   b
Router-to-router VPNs         a
Country-to-country VPNs       b
Country-to-country VPNs       c
                          6   d
Session layer                 b
IP trailer                    a
WiFi security                 b
Local data encryption
algorithm                     a
 VP                            c
SSL                            b
semi-public                    a
 all of the above              d
 all of the above              d
none of the above              a
VPN                            d
none of the above              b
none of the above              c
none of the above              b
 SSL                           a
PGP                            d
 none of the above             c
Internet Security
Association and Key
Modeling Protocol              b
Rabin                          c
 1024-2048                     c
MAC (Machine Access
Code)                          b
 Secure/Multipurpose
Internet Mail Extensions       d
All of above               b
None of These              c
None of these              c
None of these              a
obtain message contain d
None Of theses         a
None of these              b
None of these              c
None of these              b
none of these              b
none of these              a
none of these              c
security                   a
none of these              b
open system internet       a
None of these              b
none of above              a
four                    a
none of these           b
                     64 b
Expansion permutation c
none of these           a
none of these            b
none of these            c
both a & c               a
none of these            a
receiver                 a
none of these            b
byte cipher              a
filled text              b
4 key                    a
Thin                     c
Separate                 a
Each other               d
r                        c
 (p+1)(q+1)              c
                         b
                         a
public key certificate   a
ROBIN                    a
None of the above        a
None of the above        a
Both a and b             d
only a                   c
All of the above         a
Session layer            b
IP trailer               a
Hyper Text Transfer
Protocol Secure          d
Botnet process           a
confidentiality and
integrity                a
FTP security             b
S/MIME                   a
E-mail                   b
SFTP                     c
                          a
                         5b
128 bit                   a
                         5c
Pretty Good Protection    a
none of the above         b
                         4a
128 bit                   b
all of the above          d
                         4a
8 bits                    c
                                  This sheet is for 2 Mark questions
S.r No                                             Questions
         According to the CIA Triad, which of the below-mentioned element is not considered in
  1      the triad?
  2      When integrity is lacking in a security system, _________ occurs.
  3      Data integrity gets compromised when _____ and _____ are taken control off.
  4      Which of the following type of attack can actively modify Communications or data?
  5      Which of the following is a form of DoS attack?
  6      A digital signature is
         ________is a term used in cryptography that refers to a message before encryption or
  7      after decryption.
  8      What is the role of Key Distribution Center?
  9      All the following are examples of real security and privacy threats except:
 10      From the options below, which of them is not a vulnerability to information security?
 11      From the options below, which of them is not a threat to information security?
         _________is the art as well as science of secret writing of information / message and
         makes them non-readable. The process of studying methods of breaking cipher text
 12      message called as________
 13      ___________ is a weakness that can be exploited by attackers.
 14      Which of the following is not the External Security Threats?
         If a security mechanism offers availability, then it offers a high level of assurance that
 15      the data, objects, and resources are _______________ by authorized subjects.
         Assymmetric Encryption: Why can a message encrypted with the Public Key only be
 16      decrypted with the receiver's appropriate Private Key?
     In which way does the Combined Encryption combine symmetric and assymmetric
     encryption?
17
18   When __________ is converted to unreadable format, it is termed as _____________
     ____________ is a mono-alphabetic encryption code wherein each & every letter of
19   plain-text is replaced by another letter in creating the cipher-text.
      ________________ is a cipher formed out of substitution where for a given key-value
     the cipher alphabet for every plain text remains fixed all through the encryption
20   procedure.
     ______________ employs a text string as a key that is implemented to do a series of
21   shifts on the plain-text.
     In _____________ a sequence of actions is carried out on this block after a block of
22   plain-text bits is chosen for generating a block of cipher-text bits.
     In _______________ the plain-text is processed 1-bit at a time & a series of actions is
23   carried out on it for generating one bit of cipher-text.
24   Which of the following is not an example of a block cipher?
     _________ is implemented using the Feistel Cipher which employs 16 round of Feistel
25   structure.
      ____________ carries out all its calculations on bytes rather than using bits and is at
     least 6-times faster than 3-DES.
26
27   The 4×4 byte matrices in the AES algorithm are called
28   In AES the 4×4 bytes matrix key is transformed into a keys of size __________
29   DES follows
     The DES Algorithm Cipher System consists of ____________rounds (iterations) each
30   with a round key and The DES algorithm has a key length of______
31   Digital signature provides_____
     How many real and imaginary roots does the equation y2=x3-1 have
32
     How many real and imaginary roots does the equation y2=x3-4x have
33
     The main difference in MACs and digital signatures is that, in digital signatures the hash
34   value of the message is encrypted with a user’s
     The RSA signature uses which hash algorithm?
35
     To implement Diffie-Hellman, the two end users Alice and Bob, while communicating
     over a channel they know to be private, mutually agree on positive whole numbers p
36   and q, such that p is a _______ and q is a ______ of p.
     Kerberos builds on ______ cryptography and requires a _____, and optionally may use
37   public cryptography during certain phases of authentication
     For kerberose authentication first step, the client authenticates itself to the ____which
38   forwards the username to a_____.
39   AS stands for ______ and KDC stands for ______ .
40   SHA-l has a message digest of____
     A hash function guarantees ______ of a message. It guarantees that message has not
41   be__________
     A digital signature needs a____ and verifying the _____of digital messages or
42   documents
     A digital signature scheme typically consists of three algorithms;
43
44   MD5 algorithm used to produce ___ and ____
45   MD5 produces __________ bits hash data and SHA-1 produces __________ bit of hash.
46   A digital signature is
     5. Which of the following statements are correct?
     1. PGP uses assymmetric encryption.
     2. In the world wide web, primarly symmetric Encryption is used.
     3. Symmetric encryption is require only one key for encryption
     4. PGP uses combined encryption.
47
48   For secure connection, Remote access VPNs rely on ___________ and ____________
     Security protocol for the e-mail system is _________
     i)IPSec
     ii) SSL
     iii) PGP
49   iv)none of the above
     Typically, ______ can receive application data from any application layer protocol, but
50   the protocol is normally HTTP.
51   IPSec defines two protocols: _______ and ________.
     In the ______ mode, IPSec protects information delivered from the transport layer to
52   the network layer.
53   IPSec in the ______ mode does not protect the IP header.
     ______ is designed to provide security and compression services to data generated from
54   the application layer.
55   _______ provide security at the transport layer.
56   SSL primarily focuses on _______
57   Pretty good privacy (PGP) security system uses
58   In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
59   In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
     In the _______ mode, IPSec protects the whole IP packet, including the original IP
60   header.
     The _______ mode is normally used when we need host-to-host (end-to-end) protection
61   of data.
62   Using VPN, we can access _______________
     __________ masks your IP address and _________ are also used for hides user’s
63   physical location.
     In _______, the cryptographic algorithms and secrets are sent with the message. ______
64   was invented by Phil Zimmerman.
     _________ is used for encrypting data at network level.
     i)IPSec
     ii) HTTPS
     iii)SMTP
65   iv)S/MIME
     What types of protocols are used in VPNs?
66
67   Which of them is active attack?
68   The act of sending false information to a resource is called as?
69   Asymmetric
     When attackerKeycreates
                       Encryption
                              fake iswebsite,
                                      also called as?
                                              which is same as original / real website is called
70   as?
     Instructions that are put into a computer program in order to stop it working properly and
71   destroy information
72   An ________ is a network exploit in which hacker attempt to make changes on Data
73   A malware which misleads users of it's true intent is called as?
74   Conversion of plain text into Cypher text is called as?
75   Vernam Cipher is also called as?
76   In which Encryption method 2 separate key for Encryption and Decryption?
77   which of the following is not vulnerability of the network layer?
     __details out the security practices explicitly for a particular issue or function as relevant
78   to the organisation.
     __is the most granular form of policy that provide information and direction for particular
79   system.
     when there is an excessive amount of data flow, which the system cannot handle, _____
80   attack takes place.
     __is a network attack in which a system is monitored and sometimes scanned for open
81   ports and vulnerabilities.
82   In the Encryption of 64 bits of data in block and produces _____ of Cipher text
83   In Expansion permutation ,RPT is Expanded From 32 bits to ?
84   In AES key Size is?
85   Link Encryption can occurs at which layer?
86   Blum Blum Shub Generator is best for?
87    In S- Box Substitution key transform from 56 bit to?
88    In AES how many Permutation are performed?
89    In AES how many Substitution are performed?
90    DES stands for?
91    Key must be at least of how many bits?
      The__is a symmetric-key based encryption technique that uses digraph substitution
92    cipher.
      A__is an electro-mechanical stream cipher device used for encrypting and decrypting
93    secret messages.
      In the DES algorithm, although the key size is 64 bits only 48bits are used for the
94    encryption procedure, the rest are parity bits.
95    Major attributes of AES-
96    Asymmetic keys based cryptography is also called as__.
97    In an asymmetric-key cipher, the sender uses the__________ key.
98    The _______ is a number or a set of numbers on which the cipher operates.
99    The ________ method provides a one-time session key for two parties.
      In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not
100   needed for which of the following cipher systems?
101   Which systems use a timestamp?
102   p = 7; q = 11; M = 8 find C
103   Which of these systems use timestamps as an expiration date?
      In an RSA system the public key of a given user is e = 31, n = 3599. What is the private
104   key of this user?
105   Set {1, 2, 3, 9, 10, and 24} is superincreasing
106   The relationship between a character in the plaintext to a character is
107   Elliptic Curve Cryptography uses smaller key size than RSA algorithm
      Which of the following authentication method(s) are used in public cryptography.
108               a) Hash Function. b) Message Encryption. c) Message Authentication Code
109   Process of transforming input message m into a fixed size string is called as
      Which of the following is true
        a) MD5 uses a 128 bit message digest
110                           b) MD5 is vulnerable against crytanalysis
111   The concept of ticket (digital documents that stores session key) as token is used by
      When a DNS server accepts and uses incorrect information from a host that has no
112   authority giving that information, then it is called _________
113   Which of the following is not a secured mail transferring methodology?
114   SFTP is abbreviated as ________
      ______ provides either authentication or encryption, or both, for packets at the IP
115   level.
116   One security protocol for the e-mail system is _________.
117   A _______network is used inside an organization
118   SSL provides _________.
119   An _________ is a network that allows authorized access from outside users.
      _________ is a collection of protocols designed by the IETF (Internet
120   Engineering Task Force) to provide security for a packet at the network level.
121   IPSec uses a set of SAs called the ________.
122   Transport layer Protocol components are...
123   IPSec provides which protocols for network layer
124   In Handshake protocol, Handshaking is done in how many phases
125   To protect credit card transactions over internet which protocol is used
126   Internet Key Exchange has which of the following modes of operations
127   ___ is a suite of protocol that protects IP traffic.
128   What type of protocols are used in VPNs?
      A remote-access VPN typically depends on either ____ or ____ for a secure
129   connection over public network.
130   Site- to- site VPNs are also known as___.
131   Which protocol consists of only 1 bit?
Image                    a                        b                      c                     d
        a) Confidentiality             b) Integrity           c) Authenticity       d) Availability
        a) Database hacking            b) Data deletion       c) Data tampering     d) Data leakage
        a) Access control, file        b) Network, file       c) Access control, file
        deletion                       permission             permission              d) Network, system
        a) Both Active and Passive     b) Neither Active nor                       d) Passive Attack
        attack                         Passive Attack        c) Active Attack Only Only
                                       b) Bandwidth           c) Connection         d) All of the
        a) Vulnerability attack        flooding               flooding              mentioned
                                                              c) an authentication
                                                              of an electronic
                                        b) a unique           record by tying it
        a) a bit string giving identity identification of a   uniquely to a key    d) an encrypted
        of a correspondent              sender                only a sender knows signature of a sender
        a) Cipher text                 b) Plain text          c) Plain script       d) Original text
                                       b) It intended to
                                       reduce the risks
        a) It is used to distribute    inherent in            c) All of the         d) None of the
        keys to everyone in world      exchanging keys        mentioned             mentioned
        a) Hackers                     b) Virus               c) Spam               d) Worm
                                       b) without deleting
                                       data, disposal of      c) unchanged default d) latest patches and
        a) flood                       storage media          password             updates not done
                                                              c) Information        d) Unchanged
        a) Disaster                    b) Eavesdropping       leakage               default password
                                    b) Cryptanalyst,          c) Cryptography,      d) Decryption,
        a) Cryptanalyst, Cryptology Confidentiality           Cryptanalyst          Cryptology
                                       b) System without      c) System with        d) System with a
        a) System with Virus           firewall               vulnerabilities       strong password
                                                            c) Underground          d) Denial of Service
        a) Front-door Threats          b) Back-door Threats Threats                 (DoS)
        a) Controlled                  b) Audited             c) Accessible         d) Repudiated
                                                            The Public Key
                                                            contains a special
                                                            function which is       The encrypted
                                                            used to encrypt the     message contains
                                       A so called "one way message and which       the function for
        Not true, the message can      function with back can only be reversed      decryption which
        also be decrypted with the     door" is applyed for by the appropriate      identifies the Private
        Public Key.                    the encryption.      Private Key.            Key.
                                                      First, the message
                                                    is encrypted with
                                                    assymmetric
                                                    encryption and
First, the message is        The secret key is      aferwards it is        The secret key is
encrypted with symmetric symmetrically              encrypted              assymmetrically
encryption and aferwards it transmitted, the        symmetrically          transmitted, the
is encrypted assymmetrically message itself         together with the      message itself
together with the key.       assymmetrically.       key                    symmetrically.
                                                    plain text, cipher-     ciphen-text, plain
plain text, rotten text       raw text, cipher-text text                   text
                                                                           Monoalphabetic
Polyalphabetic Cipher         Caesar Cipher         Playfair Cipher        Cipher
                                                                           Monoalphabetic
Polyalphabetic Cipher         Caesar Cipher         Playfair Cipher        Cipher
Vigenere Cipher                Shift Cipher         Playfair Cipher        Block Cipher
Block Cipher                  One-time pad          Hash functions         Vigenere Cipher
Block Cipher                  One-time pad          Stream cipher          Vigenere Cipher
DES                           IDEA                  Caesar cipher          Twofish
DES                           IDEA                  Caesar cipher          Twofish
DES                           AES                   Caesar cipher          Twofish
States                        Words                 Transitions            Permutations
32 words                      64 words              54 words               44 words
                                                    Feistel Cipher
Hash Algorithm                 Caesars Cipher       Structure              SP Networks
12; 128 Bits                  18; 32 Bits           9 ; 16 Bits            16 ; 64 Bits
authentication                nonrepudiation        both (a) and (b)       neither (a) nor (b)
2 real, 1 imaginary           all real              all imaginary          2 imaginary, 1 real
2 real, 1 imaginary           all real              all imaginary          2 imaginary, 1 real
private key, as well as public
key                            private key.         public key             none of above
                                                                           None of the
MD5                            SHA-1                MD5 and SHA-1          mentioned.
                              prime number;         odd number;
prime number; square          generator             generator              odd number; square
symmetric key; trusted third asymmetric key;        symmetric key;         asymmetric
party                        trusted third party    unnown                 key;unkown party;
                                                                            Authentication
Authentication Server ; key Central Server ; key client Server ; key        Server ; ticket-
distribution center         distribution center distribution center         granting server
                            Authentication              Authorization       Authentication
Authentication Server; key system; key divide          Server; key dual     Server; key
distribution center        center                      center               distribution center
160 bits                   512 bits                    628 bits             820 bits
                                 Authentication; Over
Authentication; Replaced.        view.                integrity; Changed    integrity;Left.
private-key system;              shared-key system.; public-key system.;
authenticity                     integrity           authenticity           All of them
                                 1 A key generation    1 A key generation   1 A key exchange
1 A key generation               algorithm.            algorithm.           algorithm.
algorithm.                       2 A signing           2 A signing          2 Encryption
2 Integity algorithm,            algorithm,            algorithm,           algorithm,
3 A signature verifying          3 A signature         3 encryption         3 A signature
algorithm                        verifying algorithm   algorithm            verifying algorithm
Digest of string, Name of        Digest of string,     Signature of string ,
string                           Signature of string   Name of string        All of them
128;160                          150; 128              160; 112              112; 160
                                                       an authentication of
                                                       an electronic record
                                a unique               by tying it uniquely
a bit string giving identity of identification of a    to a key only a      an encrypted
a correspondent                 sender                 sender knows         signature of a sender
1,2                              1,3                   3,4                  2,3
IPSec, SSL                       L2TP, SSL             IPSec, SSH           SSH, SSL
(i) correct but (ii) incorrect   only (ii) correct     only (iii) correct    (i) and (ii) correct
SSL                              TLS                   either (a) or (b)    both (a) and (b)
AH; SSL                          PGP; ESP              AH; ESP              all of the above
transport                        tunnel                either (a) or (b)    neither (a) nor (b)
 transport                       tunnel                either (a) or (b)    neither (a) nor (b)
SSL                              TLS                   either (a) or (b)    both (a) and (b)
SSL                              TLS                   either (a) or (b)    both (a) and (b)
                                  integrity and non-   authenticity and      confidentiality and
integrity and authenticity       repudiation           privacy              integrity
                                  Private key               Public & Private key   None of the
Public key cryptosystem           cryptosystem             cryptosystem            mentioned
secret                            public                   either (a) or (b)       both (a) and (b)
secret                            public                   either (a) or (b)       both (a) and (b)
transport                         tunnel                   either (a) or (b)       neither (a) nor (b)
transport                         tunnel                   either (a) or (b)       neither (a) nor (b)
                                                                                   Encrypts our local
Access sites that are blocked Compromise other’s Hide our personal                 drive files while
geographically                system remotely    data in the cloud                 transferring
Antivirus ; Incognito mode        Firewall ; VPN           Firewall ; Firewall     VPN ; VPN
IPSec,PGP                         SSL, PGP                 TLS ; PGP               PGP, PGP
                                   (i) correct but (ii)
only (i) correct                  incorrect                only (ii) correct       (i) and (ii) correct
Application level protocols       Tunnelling protocols Network protocols           Mailing protocols
                                  modify message in        Replay previous
Denial of Service                 transit                  message                 All of them
Spoofing                          Worm                     Virus                   None of these
Private key                       Public key               local key               none of these
Spoofing                          virus                    Phishing                none of these
Worms                             Virus                    Spoofing                phishing
Passive attack                    Active attack            both of them            none of these
phishing                          Spoofing                 Worms                   Trojan attack
Encryption                        Decryption               Cryptography            none of these
Permutation                       one time pad          play fair                  none of these
Symmetric                         Asymmetric            Both of these              none of these
                                  identity and resource                            weak or non existent
route spoofing                    ID vulnerability      IP Address spoofing        authentication
                                                        system specific
Issue-Specific Policy             program policy        policy                     none of these
                                                        system specific
Issue-Specific Policy             program policy        policy                     none of these
                                  DoS (Denial of                                   Buffer Overflow
Database crash attack             Service) attack       Data overflow Attack       attack
Active attack                     passive attack            none of these          dos attack
32 bits                           64 bits                   128 bits               56 bits
32 bits                           56 bits                   48 bits                64 bits
32 bits                           64 bits                   96 bits                128 bits
                              1                           2 Both a & b             none of these
Cipher text                       Key Generation            both a & n             none of these
16 bits                         32 bits                  48 bits                    64 bits
                            1                        2                          3                         4
                            1                        2                          3                         4
                                Data Encryption          Data Encryption
Decryption Standards            Standard                 Strategy                   None of these
                            8                       16                         32                        56
playfair cipher                 vignere cipher           hill cipher                affine cipher
Rotor machine                   cipher                   all of these               none of the above
                            1                        0 maybe                        can't say
symmetric key based             it works as block      it uses 128 bit
algorithm                       cipher                 blocks.                      all of the above
                                private key
Public Key Cryptography         cryptography             a and b                    none of the above
1 key                           2 key                     3 key                     4 key
Short                           Flat                     Long                       Thin
Diffie-Hellman                fixed Diffie-Hellman RSA                   None of above
                              Public
Public-Key Certificate        announcements         Public-Key Directory All of the above
                           19                    57                   64                                 55
                              Public
Public-Key Certificate        announcements         Public-Key Directory All of the above
                         3031                     3130                     2930                        3029
                            1                        0
many-to-one                     one-to-many              one-to-one                 none of the above
                            1                        0
a and b                         b and c            a and c             All of the above
                                                   Message
Hash Function                   Message Encryption Authentication Code None of the above
only a                          only b                   both true                  both false
Kerberos                        Digital Signature        Digital Certificate        ElGamal Scheme
DNS lookup                      DNS hijacking            DNS spoofing               DNS authorizing
POP3                            SSMTP                    Mail using PGP             S/MIME
Secure File Transfer            Secured File             Secure Folder              Secure File
Protocol                        Transfer Protocol        Transfer Protocol          Transferring Protocol
AH                              ESP                      SSL                        PGP
SSL                             PGP                      IPSec                      None of the above
Private                         Public                   Semi-private               Semi-public
message integrity               confidentiality          compression                all of the above
intranet                        internet                 extranet                   None of the above
SSL                           IPSec                  PGP                  None of the above
SAD                           SAB                    SADB                 None of the above
Handshake protocol            Record Protocol        Both above           None of the above
                              Encapsulating
Authentication Header         Security Payload       Both a and b         None of the above
                          2                      3                    4                       5
SET                           PGP                    HTTP                 Alert protocol
Aggressive mode               Quick mode             Both a and b         None of the above
Ip address                  Ip header            Ip sec                   ip Identification
Application level protocols Tunnelling protocols Mailing protocols        Network protocols
IPSec(IP
Security),SSL(secure socket
layer)                      L2TP,SSL             IPSec,SSH                SSH,SSL
                              Switch-to switch                         Router-to-router
Peer-to-peer VPNs             VPNs                   Peer-to-peer VPNs VPNs
                              Handshake              Upper-Layer       Change Cipher
Alert Protocol                Protocol               Protocol          Spec Protocol
    Correct
    Answer
       c
       c
      b
      c
b
d
c
c
b
a
d
d
c
a
a
a
a
b
a
b
a
d
c
c
a
d
d
a
c
b
b
d
a
b
c
b
b
d
a
b
b
b
b
c
d
c
b
c
a
c
b
d
a
a
c
a
b
a
b
b
a
c
a
c
a
b
b
a
d
c
b
c
c
c
a
c
c
a
d
         This sheet is for 3 Mark questions
S.r No
   1
  2
  4
  5
  6
  8
  9
 10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
                                   This sheet is for 3 Mark questions
                                                       Question
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered the main goals of informat
 Physical threats to companies include:
i) Theft ii) Accidents iii) Cybercrimes          iv) Fraud
Match the following with elements of information security
     .
1. Physical elements         A. The software is updated on a regular basis with license copy of antivirus
2. System Elements           B. Any information stored accessible to authorized user only
3. Process Elements          C. one can put security such as security guard and surveillance cameras which observe the
    .                              confidential zone 24 x 7
         1   2    3
a)       B  C     A
b)       B  A     C
c)       C  A     B
d)       C  B     A              .
              .
What are the types of security policies?
OSI Security Architecture focuses mainly on following aspects of information security.
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the targ
Consider the following statements:
i. Masquerade Attack – It takes place when an attacker pretends to be authentic user.
ii. Replay Attack – the newly generated malicious code retransmitted again and again to receiver
iii. DoS Attack – making the network unavailable for the user to communicate securely
_____________ is a special type of vulnerability that doesn’t possess risk.
______ is the state of personal freedom or being free from potential threats, whereas ______ refers to the state of be
Match the following pairs
1. Known Plaintext Attack           A. Cryptanalyst has only access to cipher text but doesn't have access to
corresponding                          corresponding plain text
2) Ciphertext only Attack           B. Cryptanalyst chooses a cipher text and attempts to find a matching plaintext
3) Chosen Plaintext Attack         C. Cryptanalyst try to access plain text and its corresponding cipher text
4) Chosen Ciphertext Attack         D. Cryptanalyst can encrypt plain text of his own choice (guess) and later on
find ...                                    ciphertext obtained from corresponding plain text
         1   2     3    4
a)       D   C    B    A
b)       B   D    A    C
c)       D   B    C    A
d)       C   A    D    B
 .
Which is the principle of the encryption using a key?
AES stands for ________________ and DES stand for __________
________ is implemented using the Feistel Cipher which employs ______ round of Feistel structure.
10. Which of all the following are an example of a block cipher?
AES uses a ____________ bit block size and a key size of __________ bits.
______ rounds does the AES-192 perform and ______ rounds does the AES-256 perform and _______ is the
expanded key size of AES-192
For the AES-_____ algorithm there are __________ similar rounds and _________ round is different.
Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key
 In the DES stand for ________ algorithm the round key is __________ bit and the Round Input is ____________bits.
In triple DES, the key size is ___ and meet in the middle attack takes ___ tests to break the key.
What is the general equation for elliptic curve systems?
In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0)?
Which one of the following algorithm are example of asymmetric-key cryptography?
Digital signature can provide ____,______,_____ all for the message
Which of the all following are an elements/fields of the X.509 certificates?
Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority
from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in
the correct order as –
 X.509 certificate recommends which cryptographic algorithm _____ and The issuer unique identifier of the X.509
certificates was added in which version _____?
Kerberos is a computer-network_____ protocol that works on the basis of _____ to allow nodes communicating
over a non-secure network to prove their _____to one another in a secure manner.
Kerberos builds on ______ cryptography and requires a _____, and optionally may use _____cryptography during
certain phases of authentication
A digital signature is required
(i) to tie an electronic message to the sender’s identity
(ii)for non repudiation of communication by a sender
(iii) to prove that a message was sent by the sender in a court of law
(iv) in all e-mail transactions
IPSec is not designed to provide security at the
i)Transport layer
ii) Application layer
iii)Session layer
iv)Network layer
Which component is included in IP security?
Pretty good privacy (PGP) is not used in
i) Browser security
ii) Email security
iii)FTP security
iv)WiFi security
Which all are not operates in the transport mode or the tunnel mode.
i)SSL
ii) PGP
iii)IPSec
iv)ECC
_____defines two protocols: _______ and ________.
PGP offers _____ block ciphers for message encryption.
i)Triple-DES
ii) CAST
iii) IDEA
The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
i) list of protocols
ii) cipher suite
iii) list of keys
PGP provides ______ , _______ , ________ in e-mail.
Which of the following is not a secured mail transferring methodology?
i)POP3
ii) SSMTP
iii)Mail using PGP
iv)S/MIME
PGP have not used which cryptographic algorithms?
i)DES
ii) AES
iii)RSA
iv)Rabin
A ______ can hide a user’s browsing activity, __________ masks your IP address and _________ are also used for
hides user’s physical location.
_______ uses the idea of certificate trust levels. ________ provides privacy, integrity, and authentication in e-mail
and In _____, there can be multiple paths from fully or partially trusted authorities.
 _______ uses the idea of certificate trust levels. In _______, the cryptographic algorithms and secrets are sent with
the message. ______ was invented by Phil Zimmerman.
_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a
packet at the _______level.
SSL provides _________.
i)message integrity
ii) confidentiality
iii)compression
iv) all of the above
IKE uses _______
i) Oakley
ii) SKEME
iii) ISAKMP
iv) all of the above
Which types of VPNs are not used for corporate connectivity across companies residing in different geographical
location?
i)Remote access VPNs
ii) Site-to-site VPNs
iii) Peer-to-Peer VPNs
iv)Country-to-country VPNs
 Site-to-Site VPN architecture is also known as _________
i)Remote access VPNs
ii) Peer-to-Peer VPNs
iii)Extranet based VPN
iv)Country-to-country VPNs
Site-to-site VPNs are also known as ________
Which of the statements are not true to classify VPN systems?
Which of them is type of Password Guessing?
Play Fair Cipher was invented by whom?
Which of these is Type of virus?
In Cypher text conversion when each letter is replaced by it's next 3rd letter?
Hiding text by rearranging the letter order is called as?
Which of them are example of Symmetric key Encryption?
A Computer ________ is a Standalone malware Computer programthat replicates itself in order to spread to other
computer.
Message - "come home" Encrypt these message using Rail Fence Cypher text?
Convert the message into Cipher text using "Caesar Cypher" Plain text-"after the party"
The Attack in which multiple computer system attacks a single system is called as?
For Encryption of 64 bit code how much bit of key is required?
AES Cypher was Designed by whom?
End to End Encryption Can occurs at which levels?
In S- Box Substitution 48 bits of input generates how many bits of output block?
In AES a plain text of 128bits requires how many bit of key?
Final Round of AES consist of what?
In DES 5th steps consist of?
Which of them are example of Symmetric Key Encryption?
In which of the Encryption technique text is rearranged?
In Row Shift which of the row remains unchanged?
. n = 35; e = 5; C = 10. What is the plaintext (use RSA) ?
For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find the cipher text.
p = 3; q = 11; M = 5 find C
In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?
p = 5; q = 11; M = 9 find C
For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.
 p = 17; q = 31; M = 2 find C
Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the plaintext to be transmitted if the
ciphertext is (28,9).
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to
each other.
IPSec defines two protocols: _______ and ________
The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL
session.
PGP encrypts data by using a block cipher called ______
______ is designed to provide security and compression services to data generated from the application
layer.
In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
When the sender and the receiver of an email are on the same system, we need
In SSL, what is used for authenticating a message?
Why did SSL certificate require in HTTP?
S/MIME is abbreviated as __________________
Which component is included in IP security?
An HTTP connection uses port ___whereas HTTPS uses port___and invoke SSL.
In SSL Protocol,each upper layer message if fragmented into a maximum of___byte.
Types of SSL records--
In PGP, to exchange e-mail message a user needs a ring of ____keys.
Which protocol is used to convey SSL related alerts to the peer entity?
SSL primarily focuses on _______
_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide
security for a packet at the network level.
When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information, then it is called _________
Which internet protocol is used for securely exchanging the information between client's web browser and
the web server
Internet Key Exchange modes, Aggressive mode and Quick mode are used to negotiate IKE SA and
IPSec's SA respectively
Image                        a                                           b
  0     a) They help understanding hacking better      b) They are key elements to a securi
  0     a) i,ii,iv                                     b) ii,iii,iv
  0     a)                                             b)
  0     a) Regulatory, Availability, User Policies  b) Confidentiality, Advisory, Integrity
  0     a) Security Techniques / Mechanisms, Categorie
                                                    b) Security Attack, Security Techniqu
  0     a) Vulnerability attack                     b) Bandwidth flooding
  0     a) (i) & (ii) correct but (iii) incorrect   b) (i) & (iii) correct but (ii) incorrect
  0     a) Vulnerabilities without risk                b) Vulnerabilities without attacker
  0     a) Regularity, Privacy                         b) Security, Privacy
  0     a)                                             b)
         The key indicates which funcion is used for    The key contains the secret
         encryption. Thereby it is more difficult to    function for encryption including
         decrypt a intercepted message as the           parameters. Only a password can
         function is unknown.                           activate the key.
         Advanced Encryption Security, Data             Advanced Encryption Standard,
         Encryption Security                            Data Encryption Standard
         DES, 16                                        IDEA,16
         DES, IDEA, Caesar cipher                       IDEA, Caesar cipher, Twofish
         128; 128 or 256                                64; 128 or 192
         10;14; 64 words                                12; 14; 52 words
         192; 2 pair of 5 similar rounds ; every
         alternate                                      128; 9 ; the last
          i) only                                       ii) iii) and iv)
         Data Encryption Security; 48; 32               Data Encrypted Standard; 64; 32
         2192 ; 2112                                    2184;2111
unit3_1_3
m.jpg     a                                             b
         (15, -56)                                      (-23, -43)
         rsa algorithm, dsa algorithm, diffie-hellman diffie-hellman algorithm, electronic
         algorithm                                    code book algorithm, dsa algorithm
          integrity, confidentiality                   integrity, authentication, nonrepudi
          Issuer Name, Serial Modifier, Issuer unique   Serial Modifier, Issuer Name, Issuer
         Identifier                                     unique Identifier
         X2 X1 X1 B                                     X1 X1 X2 A
         RSA; 2                                         DES; 2
         Confedintiality ; tickets; identity            Confedintiality ; tickets; session
         symmetric key; trusted third party; public-    asymmetric key; trusted third party;
         key                                            public-key
         i and ii                                       i, ii, iii
i), ii), iv)                                  i), iii), iv)
                                              Encapsulating Security Payload
Authentication Header (AH)                    (ESP)
i), ii), iv)                                  i), iii), iv)
 i), ii), iv)                                 i), iii), iv)
IPSec ;AH; SSL                                IPSec ;PGP; ESP
(i) correct but (ii) incorrect                (ii), (iii) correct
only (i) correct                              only (ii) correct
                                              privacy, iAvailability, and attack-
Availability, integrity, and authentication   resistant
only (i)                                      only (ii)
i), ii), iv)                                  i), iii), iv)
Firewall ; Antivirus ; Incognito mode         Firewall ; Antivirus ; VPN
X509, PGP, PGP                                PGP, PGP, PGP
SSL; IPSec,PGP                                PGP; SSL, PGP
IPSec ; network                               SSL ; network
(i) correct but (ii) incorrect                   only (ii) correct
(i) correct but (ii) incorrect                   only (ii) correct
i), ii), iv)                                     i), iiI), iv)
(i) correct but (ii) incorrect                   only (ii) correct
Switch-to-switch VPNs                            Peer-to-Peer VPNs
Protocols used for tunnelling the traffic        Whether VPNs are providing site-to-s
Default password attack                          Dictionary Attack
Charles Wheatstone                               julius Caesar
Worms                                            Trojan horses
Play fair                                        Caesar Cipher
Transposition                                    permutation
DES                                              AES
Worm                                             Trojan Horse
homecome                                         hocomeme
DJXIU XKH REUXB                                  DIWHU WKH SDUWB
Trojan Horse                                     Worm
                                            32                                   46
Rijndael-Daeman                                  Charles Wheatstone
1,2,3,4                                          3,4,6,7
8bits                                            16bits
                                            32                                   64
Byte Substitution                                Shift Row
P-box Permutation                                XOR & SWAP
DES                                              AES
Substitution                                     Transposition
                                             1                                    2
                                             5                                    6
                                            80                                   92
                                           28                                   26
 p and q should be divisible by Ф(n)            p and q should be co-prime
                                           42                                   14
                                           54                                   43
                                          342                                  423
                                           66                                   65
                                           11                                   23
man-in-the-middle                               ciphertext attack
AH; SSL                                         PGP; ESP
list of protocols                               cipher suite
international data encryption algorithm         private data encryption algorithm
SSL                                             TLS
secret                                          public
One Message Access Agent                        One message transfer agent
                                                MAC (Message Authentication
MAC (Message Access Code)                       Code)
For making security weak                        For making information move faster
Secure/Multimedia Internet Mailing              Secure/Multipurpose Internet
Extensions                                      Mailing Extensions
                                                Encapsulating Security Payload
Authentication Header (AH)                      (ESP)
40;80                                           60;620
2^16                                            2^32
Handshake records                               Alert records
Secret                                          Public
Alert Protocol                                  Handshake Protocol
confidentiality and integrity                   authenticity and privacy
SSL                                             IPSec
DNS lookup                                      DNS hijacking
SSL                                             Handshake
                                           1                                     0
                c                                 d                 Correct Answer
c) They help understands security d) They help to understand the cy        c
c) i,ii,iii                         d) i,iii,iv                            a
c)                                  d)
c) Regulatory, Advisory, User Policied) Confidentiality, Data Authentica   c
c) Security Attack, Security Techn d) Security Techniques / Mechani        b
c) Connection flooding               d) UDP flooding                       c
c) (i),(ii), (iii) all incorrect     d) (i),(ii),(iii) all correct
c) Vulnerabilities without action   d) Vulnerabilities no one knows        a
c) Regularity, Advisory             d) Security, Advisory                  b
c)                                  d)
                                                                           d
All functions are public, only the   The key prevents the user of
key is secret. It contains the       having to reinstall the software    c
parameters used for the              at each change in technology or
encryption resp. decryption.         in the functions for encryption.
Advanced Encrypted Standard,         Active Encryption Standard,         b
Device Encryption Standard           Data Encrypted Standard
Caesar cipher, 2                     Twofish, 5                          a
Caesar cipher, wofish, IDEA          wofish, DES, IDEA,                  b
256; 128, 192, or 256                128; 128, 192, or 256               d
                                                                         b
14,16,60 words                       16,16, 64 words
                                                                         b
128; 8 ; the first and last          128; 10 ; no
ii) and iii)                         only iv)
Device Encryption Standard; 56;      Data Encryption Standard ; 48;      d
24                                   32
21682; 111                           21682; 112                          d
                                                                         d
c                                    d
                                                                         a
(69, 26)                             (12, -86)
                                   dsa algorithm, diffie-hellman
electronic code book algorithm, algorithm, electronic code book          a
dsa algorithm, rsa algorithm       algorithm
nonrepudiation,confidentiality, intauthentication,confidentiality, int   b
Issuer unique Identifier, Serial     Signature, Issuer Name, Issuer      d
Modifier,Signature                   unique Identifier
                                                                         c
X1 X2 X2 B                           X1 X2 X2 A
                                                                         a
AES; 1                               Rabin; 4
                                     authentication; cryptography;       c
authentication; tickets; identity    identity
symmetric key; trusted third         asymmetric key; trusted third       a
party; private key                   party; private key
    i, ii, iii, iv                   ii, iii, iv
                                                                d
ii), iii), iv)                   i), ii), iii)
                                                                d
Internet key Exchange (IKE)      All of the mentioned
ii), iii), iv)                   i), ii), iii)
ii), iii), iv)                   i), ii), iii)
IPSec ;AH; ESP                   all of the above               c
                                                                d
only (iii) correct               All (i), (ii), (iii) correct
                                                                b
only (iii) correct               All (i), (ii), (iii) correct
privacy, integrity, and                                         c
authentication                   none of the above
ii), iii), iv)                   i), ii), iii)
ii), iii), iv)                   i), ii), iii)
                                                                d
Firewall ; Firewall ; Firewall   VPN ; VPN ; VPN
                                                                b
KDC,KDC,KDC                      X509, PGP, SSL
                                                                d
TLS ; PGP                        PGP; PGP; PGP
                                                                a
PGP; transport                   none of the above
                                                                          d
only (i) correct                     only (iv) correct
only (i) correct                     only (iv) correct
ii), iii), iv)                       i), ii), iii)
only (iii) correct                   (i) and (ii) correct
Point-to-point VPNs                  Router-to-router VPNs                d
                                                                          c
Securing the network from bots an Levels of security provided for s
Brute Force Attack                   All of these                     d
Alex Charles                         none of these                    a
logic Bomb                           All of them                      d
Monoalphabetic                       none of these                    b
Both of them                         none of these                    c
BLOWFISH                             All of them                      d
DDoS                                 Logic Bomb                     a
cmoehmoe                             cmhmoeoe                       d
DIXHU WLH SEUXB                      none of these                  b
DDoS                                 logic bomb                     c
                                56                               64 c
Julius Caesar                        None of these                    a
3,4,5,6                              4,5,6,7                          b
32 bits                              48 bits                          c
                                96                              128 d
Add Subkey                           all of these                   d
S-box Substitution                   None of these                  b
BLOWFISH                             all of these                   d
Combinational                        none of these                  b
                                 3                                4a
                                 7                                8a
                                84                               84 a
                                  12                            15 b
p and q should be prime           p/q should give no remainder     c
                               15                               38 b
                                5                               27 c
                              243                              432 b
                                  64                                64 a
                                  63                                22 a
plaintext attack                       none of the above               a
AH; ESP                                all of the above                c
list of keys                           none of the above               b
internet data encryption               local data encryption
algorithm                              algorithm                       a
either (a) or (b)                      both (a) and (b)                d
either (a) or (b)                      both (a) and (b)                b
one User Agent                         Two User Agents                 d
MAC (Machine Authentication
Code)                                  MAC (Machine Access Code)        b
For encrypted data sent over           For sending and receiving emails
HTTP protocol                          unencrypted                      c
Secure/Multimedia Internet Mail        Secure/Multipurpose Internet
Extensions                             Mail Extensions                  d
Internet key Exchange (IKE)            All of the mentioned            d
80;443                                 620;80                          c
2^14                                   2^12                            c
Both a or b                            none of the above               c
Either a or b                          Both a and b                    b
Upper-Layer Protocol                   Change Cipher Spec Protocol     a
integrity and non-repudiation          integrity and authenticity      d
PGP                                    SET                             b
DNS spoofing                           DNS authorizing                 c
PGP                                    Alert Protocol                  a