Q. 5 The CIA triad is often represented by which of the following?
A : Triangle
B : Diagonal
C : Ellipse
D : Circle
Show Answer
Triangle
Q. 8 _______ means the protection of data from modification by unknown users.
A : Confidentiality
B : Integrity
C : Authentication
D : Non-repudiation
Show Answer
Integrity
Q. 10 This helps in identifying the origin of information and authentic user. This
referred to here as __________
A : Confidentiality
B : Integrity
C : Authenticity
D : Availability
Show Answer
Authenticity
Q. 11 Data ___________ is used to ensure confidentiality.
A : Encryption
B : Locking
C : Decryption
D : Backup
Q. 14 Release of message contents and Traffic analysis are two types of _________
attacks.
A : Active Attack
B : Modification of Attack
C : Passive attack
D : DoS Attack
Show Answer
Passive attack
Q. 15 The ________ is encrypted text.
A : Cipher scricpt
B : Cipher text
C : Secret text
D : Secret script
Cipher text
Q. 17 Which of the following Algorithms not belong to symmetric encryption
A : 3DES (TripleDES)
B : RSA
C : RC5
D : IDEA
Show Answer
RSA
Q. 18 Which is the largest disadvantage of the symmetric Encryption?
A : More complex and therefore more time-consuming calculations.
B : Problem of the secure transmission of the Secret Key.
C : Less secure encryption function.
D : Isn’t used any more.
Show Answer
Problem of the secure transmission of the Secret Key.
Q. 19 In cryptography, what is cipher?
A : algorithm for performing encryption and decryption
B : encrypted message
C : both algorithm for performing encryption and decryption and encrypted message
D : decrypted message
algorithm for performing encryption and decryption
Q. 21 Which one of the following algorithm is not used in asymmetric-key
cryptography?
A : rsa algorithm
B : diffie-hellman algorithm
C : electronic code book algorithm
D : dsa algorithm
Show Answer
electronic code book algorithm
Q. 23 What is data encryption standard (DES)?
A : block cipher
B : stream cipher
C : bit cipher
D : byte cipher
Show Answer
block cipher
Q. 24 A asymmetric-key (or public key ) cipher uses
A : 1 key
B : 2 key
C : 3 key
D : 4 key
Show Answer
2 key
Q. 26 _________________ is the process or mechanism used for converting ordinary plain
text into garbled non-human readable text & vice-versa.
A : Malware Analysis
B : Exploit writing
C : Reverse engineering
D : Cryptography
Cryptography
Q.27 ______________ is a means of storing & transmitting information in a specific
format so that only those for whom it is planned can understand or process it.
A : Malware Analysis
B : Cryptography
C : Reverse engineering
D : Exploit writing
Show Answer
Cryptography
Q. 28 Cryptographic algorithms are based on mathematical algorithms where these
algorithms use ___________ for a secure transformation of data.
A : secret key
B : external programs
C : add-ons
D : secondary key
Show Answer
secret key
Q. 29 Conventional cryptography is also known as _____________ or symmetric-key
encryption.
A : secret-key
B : public key
C : protected key
D : primary key
secret-key
Q. 30 The procedure to add bits to the last block is termed as _________________
A : decryption
B : hashing
C : tuning
D : padding
Show Answer
padding
. 32 ECC encryption system is __________
A : symmetric key encryption algorithm
B : asymmetric key encryption algorithm
C : not an encryption algorithm
D : block cipher method
asymmetric key encryption algorithm
Q. 33 ________function creates a message digest out of a message.
A : encryption
B : decryption
C : hash
D : none of the above
Show Answer
hash
Q. 34 Extensions to the X.509 certificates were added in version ____
A:1
B:2
C:3
D:4
Show Answer
3
Q. 35 A digital signature needs ____ system
A : symmetric-key
B : asymmetric-key
C : either (a) or (b)
D : neither (a) nor (b)
asymmetric-key
Q. 36 Elliptic curve cryptography follows the associative property.
A : TRUE
B : FALSE
Show Answer
TRUE
Q. 37 ECC stands for
A : Elliptic curve cryptography
B : Enhanced curve cryptography
C : Elliptic cone cryptography
D : Eclipse curve cryptography
Show Answer
Elliptic curve cryptography
Q. 38 When a hash function is used to provide message authentication, the hash
function value is referred to as
A : Message Field
B : Message Digest
C : Message Score
D : Message Leap
Show Answer
Message Leap
Q. 39 Message authentication code is also known as
A : key code
B : hash code
C : keyed hash function
D : message key hash function
hash code
Q. 40 The main difference in MACs and digital signatures is that, in digital signatures
the hash value of the message is encrypted with a user’s public key.
A : TRUE
B : FALSE
Show Answer
FALSE
Q. 41 The DSS signature uses which hash algorithm?
A : MD5
B : SHA-2
C : SHA-1
D : Does not use hash algorithm
Show Answer
SHA-1
Q. 42 What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
A : 42 bytes
B : 32 bytes
C : 36 bytes
D : 48 bytes
Show Answer
36 bytes
Q. 43 In the handshake protocol which is the message type first sent between client
and server ?
A : server_hello
B : client_hello
C : hello_request
D : certificate_request
Show Answer
client_hello
Q. 44 One commonly used public-key cryptography method is the ______ algorithm.
A : RSS
B : RAS
C : RSA
D : RAA
RSA
Q. 45 The ________ method provides a one-time session key for two parties.
A : Diffie-Hellman
B : RSA
C : DES
D : AES
Show Answer
Diffie-Hellman
Q. 46 The _________ attack can endanger the security of the Diffie-Hellman method if
two parties are not authenticated to each other.
A : man-in-the-middle
B : ciphertext attack
C : plaintext attack
D : none of the above
Show Answer
man-in-the-middle
Q. 48 VPN is abbreviated as __________
A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Private Network
D : Virtual Protocol Networking
Show Answer
Virtual Private Network
Q. 49 __________ provides an isolated tunnel across a public network for sending and
receiving data privately as if the computing devices were directly connected to the
private network.
A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Protocol Networking
D : Virtual Private Network
Q. 58 IPSec is designed to provide security at the _________
A : Transport layer
B : Network layer
C : Application layer
D : Session layer
Show Answer
Network layer
Q. 59 In tunnel mode, IPSec protects the ______
A : Entire IP packet
B : IP header
C : IP payload
D : IP trailer
Show Answer
Entire IP packet
Q. 60 Pretty good privacy (PGP) is used in ______
A : Browser security
B : Email security
C : FTP security
D : WiFi security
Email security
Q. 61 PGP encrypts data by using a block cipher called ______
A : International data encryption algorithm
B : Private data encryption algorithm
C : Internet data encryption algorithm
D : Local data encryption algorithm
Show Answer
International data encryption algorithm
Q. 62 IKE creates SAs for _____.
A : SSL
B : PGP
C : IPSec
D : VP
Show Answer
IPSec
Q. 63 ______ provides either authentication or encryption, or both, for packets at the IP
level.
A : AH
B : ESP
C : PGP
D : SSL
ESP
Q. 64 A _______network is used inside an organization.
A : private
B : public
C : semi-private
D : semi-public
Show Answer
private
Q. 65 SSL provides _________.
A : message integrity
B : confidentiality
C : compression
D : all of the above
Show Answer
all of the above
Q. 66 IKE uses _______
A : Oakley
B : SKEME
C : ISAKMP
D : all of the above
all of the above
Q. 67 In ______, there is a single path from the fully trusted authority to any certificate.
A : X509
B : PGP
C : KDC
D : none of the above
Show Answer
X509
Q. 68 A ______ provides privacy for LANs that must communicate through the global
Internet.
A : VPP
B : VNP
C : VNN
D : VPN
Show Answer
VPN
Q. 69 _______ uses the idea of certificate trust levels.
A : X509
B : PGP
C : KDC
D : none of the above
Show Answer
PGP
Q. 70 ________ provides privacy, integrity, and authentication in e-mail.
A : IPSec
B : SSL
C : PGP
D : none of the above
PGP
. 73 In _______, the cryptographic algorithms and secrets are sent with the message.
A : IPSec
B : SSL
C : TLS
D : PGP
Show Answer
PGP
Q. 74 ______ was invented by Phil Zimmerman.
A : IPSec
B : SSL
C : PGP
D : none of the above
PGP
Q. 76 PGP makes use of which cryptographic algorithm?
A : DES
B : AES
C : RSA
D : Rabin
Show Answer
RSA
Q. 78 In SSL, what is used for authenticating a message?
A : MAC (Message Access Code)
B : MAC (Message Authentication Code)
C : MAC (Machine Authentication Code)
D : MAC (Machine Access Code)
MAC (Message Authentication Code)
Q. 79 S/MIME is abbreviated as __________________
A : Secure/Multimedia Internet Mailing Extensions
B : Secure/Multipurpose Internet Mailing Extensions
C : Secure/Multimedia Internet Mail Extensions
D : Secure/Multipurpose Internet Mail Extensions
Show Answer
Secure/Multipurpose Internet Mail Extensions
Q. 80 Security Measures Needed to protect ________ during their transmission
A : file
B : Data
C : packet
D : All of above
Data
Q. 81 __________ means knowledge obtained from investigation, study , intelligence
new ,facts .
A : Security
B : Data
C : Information
D : None of These
Show Answer
Information
Q. 82 Prevention of the unauthorised used of Resources refers too?
A : Data Integrity
B : Data confidentiality
C : Access Control
D : None of these
Show Answer
Access Control
Q. 83 Protection against Denial by one of these parties in a communication refers to?
A : Non-Repudiation
B : Data integrity
C : Authentication
D : None of these
Non-Repudiation
Q. 84 Which One of them is Passive attack?
A : Denial of Service
B : modify message in transit
C : Replay previous message
D : obtain message contain
85 What is lying of IP address called as?IP Spoofing IP Scamming IP Lying None Of theses a
Show Answer
obtain message contain
Q. 86 What is full form of DDoS?
A : Derived Denial of service
B : Distributed Denial of service
C : Denial of service
D : None of these
Show Answer
Distributed Denial of service
Q. 87 A hacker guessing suggested password to a program is call as?
A : Password Guessing
B : Dictionary Attack
C : Default password attack
D : None of these
Default password attack
Q. 88 Symmetric key encryption is also called as?
A : public key Encryption
B : Private Key Encryption
C : Both of these
D : None of these
Private Key Encryption
Q. 89 Conversion of Cypher text to plain text?
A : Encryption
B : Decryption
C : Simple text
D : none of these
Show Answer
Decryption
Q. 90 __is used to create the organisation’s overall security program.
A : program policy
B : purpose
C : security
D : none of these
Show Answer
program policy
Q. 91 An act of protecting information from unauthorised disclouser to an entity.-
A : intergrity
B : avability
C : confidentiality
D : none of these
confidentiality
Q. 92 A way to ensure that the entity is indeed what it claims to be.-
A : Authentication
B : Accountability
C : identification
D : security
Authentication
Q. 93 The__model is 7 layer architecture where each layer is having some specific
functionality to perform.
A : TCP
B : OSI
C : OIS
D : none of these
Show Answer
Q. 97 In Symmetric schemes requires both parties to share how many secret key?
A : one
B : two
C : three
D : four
Show Answer
One
Q. 101 In AES in which Round Subkeys are Generated from Original key for each
round?
A : Key Expansion
B : Initial Round
C : Finale Round
D : none of these
Show Answer
Key Expansion
Q. 102 AES stands for?
A : Authorized Encryption Standard
B : Advance Encryption Standard
C : Advance Encryption Strategy
D : none of these
Show Answer
Advance Encryption Standard
Q. 103 Which of them is type of Cipher?
A : Stream Cipher
B : Block Cipher
C : both of Them
D : none of these
both of Them
Q. 105 The__is a polygraphic substitution cipher based on linear algebra.
A : Hill cipher
B : playfair cipher
C : Affine cipher
D : none of these
Show Answer
Hill cipher
Q. 111 In Asymmetric-Key Cryptography, although RSA can be used to encrypt and
decrypt actual messages, it is very slow if the message is
A : Short
B : Flat
C : Long
D : Thin
Show Answer
Long
Q. 112 The man-in-the-middle attack can endanger the security of the Diffie-Hellman
method if two parties are not
A : Authenticated
B : Joined
C : Submit
D : Separate
Authenticated
Q. 114 For RSA to work, the value of P must be less than the value of
A:p
B:q
C:n
D:r
Show Answer
n
Q. 116 In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is
relatively prime to Ф(n).
A : TRUE
B : FALSE
Show Answer
FALSE
Q. 117 RSA is also a stream cipher like Merkel-Hellman.
A : TRUE
B : FALSE
Show Answer
TRUE
Q. 121 ECC stands for
A : Elliptic Curve Cryptography
B : Elliptic Cryptography Curve
C : Error Correcting Code
D : None of the above
Show Answer
Elliptic Curve Cryptography
Q. 122 Diffie-Hellman algorithm is widely known as_________
A : Key exchange algorithm
B : key agreement algorithm
C : only a
D : Both a and b
Show Answer
Key exchange algorithm
Q. 123 Hash function is used for________
A : Message authentication
B : Digital Signature
C : Both a and b
D : only a
Both a and b
Q. 124 RSA algorithm is best example of_______
A : Asymmetric key cryptography
B : Symmetric key cryptography
C : Elliptic Curve Cryptography
D : All of the above
Show Answer
Asymmetric key cryptography
Q. 127 HTTPS is abbreviated as _________
A : Hypertexts Transfer Protocol Secured
B : Secured Hyper Text Transfer Protocol
C : Hyperlinked Text Transfer Protocol Secured
D : Hyper Text Transfer Protocol Secure
Secured Hyper Text Transfer Protocol
Q. 128 An attempt to make a computer resource unavailable to its intended users is
called ______
A : Denial-of-service attack
B : Virus attack
C : Worms attack
D : Botnet process
Show Answer
Denial-of-service attack
Q. 129 SSL primarily focuses on _______
A : integrity and authenticity
B : integrity and non-repudiation
C : authenticity and privacy
D : confidentiality and integrity
Show Answer
integrity and authenticity
Q. 130 Pretty good privacy (PGP) is used in ______
A : Browser security
B : Email security
C : WiFi security
D : FTP security
Email security
Q. 131 __________ is used for encrypting data at network level
A : IPSec
B : HTTPS
C : SMTP
D : S/MIME
Show Answer
IPSec
Q. 132 WPA2 is used for security in _______
A : Ethernet
B : Wi-Fi
C : Bluetooth
D : E-mail
Show Answer
Wi-Fi
Q. 133 Which of the following is not a strong security protocol
A : SSL
B : HTTPL
C : SMTP
D : SFTP
Show Answer
SMTP
Q. 134 TSL (Transport Layer Security) is a cryptographic protocol used for securing
HTTP/HTTPS based connection.
A : TRUE
B : FALSE
Show Answer
TRUE
Q. 135 IPSec operates in….. different modes
A:3
B:2
C:4
D:5
Show Answer
2
Q. 136 length of the IPv4 address is ….
A : 32 bits
B : 64 bits
C : 16 bits
D : 128 bit
32 bits
Q. 137 Internet Key Exchange has …. phases and modes of operations
A:4
B:3
C:2
D:5
Show Answer
2
Q. 138 PGP is abbreviated as
A : Pretty Good Privacy
B : Pretty Good Policy
C : Policy Good Privacy
D : Pretty Good Protection
Show Answer
Pretty Good Privacy
Q. 139 SET stands for
A : Set Electronic Transaction
B : Secure Electronic Transaction
C : Simple Electronic Transaction
D : none of the above
Secure Electronic Transaction
Q. 140 Transport layer Protocol consists of … main components
A:2
B:1
C:3
D:4
Show Answer
2
Q. 141 length of the IPv6 acddress is ….
A : 32 bits
B : 64 bits
C : 16 bits
D : 128 bit
Show Answer
128 bits
Q. 142 SSL provides _________.
A : message integrity
B : confidentiality
C : compression
D : all of the above
Show Answer
all of the above
Q. 143 IPSec provides ….protocols for network layer
A:7
B:3
C:1
D:4
Show Answer
7
Q. 144 length of the IPv6 header is….
A : 64 bits
B : 16 bits
C : 32 bits
D : 8 bits
32 bits