0% found this document useful (0 votes)
78 views16 pages

CS QB Insem

The document contains questions about information security concepts with corresponding options to choose from. The questions cover topics like security policies, attacks, cryptography, and common information security terms. There are 50 questions in total with a multiple choice format.

Uploaded by

Tareq Shaikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views16 pages

CS QB Insem

The document contains questions about information security concepts with corresponding options to choose from. The questions cover topics like security policies, attacks, cryptography, and common information security terms. There are 50 questions in total with a multiple choice format.

Uploaded by

Tareq Shaikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Sr. No.

Question Statement

1 In which category does the lack access control policy fall?


________________ ensures the organization is maintaining
2 standards set by industry regulations.

3 To keep user accounts secure _______________ is required.


_______________ is like standards rules & regulations set by
4 the management to advice their employees.
A ______________ takes place when an attacker pretends to be
5 an authentic user

______________ helps to identify the claimed identity of an


entity such as username and password during transmission
6 between sender and receiver.
____________ helps for checking whether the entity has the
7 right to perform action requested.

8 It is the protection of data to be accessed by unauthorized user.


_____________ is the art as well as science of secret writing of
9 message and makes the non-readable.
_________________ means making the network unavailable for
10 the user to communicate securely.

11 Main goal/goals of Information Security ___________


_________ aasures information is changed only in authorized
12 manner.
Access to internet compulsorily passes through the company's 
13 _________
Confidential work of office must be carried out in ___________
14 zone.
Once the ______ has been detected there should be provision
15 to remove infected data & files

16 Security policies are required to control __________


The organization need to implement ________ policy due to
17 rules & regulations or other legal requirements.

18 To keep user accounts secure _________ policy is required.

19 ____________ is an example of Passive Attack.


20 Telephonic conversation is an example of ___________

21 To insert bits into gaps of data stream is called ____________.


The mechanism used to ensure the identity of the entity
22 information exachange is called ___________.

23 Attack can be avoided by ____________


If sender sends some information and later on denied that he
24 never sends the information is called_________.

25 A trusted __________ is required for secure transmission.


The area of cryptography and cryptanalysis together is called
26 ____________.

27 Cryptographic Attack Method is/are __________


In __________ attack cryptanalyst has only access to cipher text
28 but no access to plain text.
In ________ attack cryptanalyst select cipher text and attempts
29 to find a matching plaintext.

30 To protect data in a single data block is called ________.


The process of studying methods of breaking cipher text
31 message is called as __________.

In _________ attack crptanalyst try to find out which


32 technology used to design cryptogrphic algorithms.

Categories of Security Services defined by X.800 __________


1. Authorization 2. Authentication 3. Access Control 4. Non-
33 repudiation

34 Protection of Data accessed by unauthorized user is ..............

To protect data derived from observing the data flow


35 is ...............
In the computer networks, the encryption techniques are
36 primarily used for improving the ________

37 Hackers usually used the computer virus for ______ purpose.

To protect the computer system against the hacker and


different kind of viruses, one must always keep _________ on in
38 the computer system.
39 ______________ attack affects the system.
40 __________ attack can be easily detected.
Mathematical Algorithms used to transform data into not easily
41 understandable is _____________
_____________ done by interrupting in the network connection
42 between the users.
The opponent observes a pattern of messages to get any clue
43 about origin of message is .............
______________ mechanism are not specific to any of the OSI
44 security service

_____________ defines security service as a communication


service provided by a system to give protection to the system
45 resources.

____________ helps for checking whether the entity has the


46 right to perform action requested.
______________ helps to identify the claimed identity of an
47 entity

48 _____________ maintains list of all Software and their usage.

49 _____________Maintains logs of network activities.


__________ maintains a back up of all machines with the server
50 frequently.
Options

A B C D Correct
Answer
Threat Attack Bug Vulnerability D

User Policy Regulatory Policy Advisory Policy Password Policy B

Advisory Policy Password Policy User Policy Regulatory Policy B

User Policy Regulatory Policy Password Policy Advisory Policy D

Passive attack Replay Attack DoS Masquerade       D

Authorization Non-repudiation Authentication Access Control C

Access Control Authorization Authentication Non-repudiation B


Data
Data integrity Confidentiality Encipherment Attack Avoidance B
Network
Steganography Cryptography Security Cipher Text B

Masquerade Passive attack DoS attack Replay Attack C

integrity availability Confidentiality All of these D

System Integrity Data Integrity availability confidentiality B

Firewall biometric system proximity cards Integrity A

Unrestricted Restricted inside  outside B

Machine Log virus access C

security risks identify theft system misuse all of these D

Internet policy User Policy Advisory Regulatory D

Regulatory Advisory Password System C

Eavesdropping Access control Routing control event detection A


Active Attack Masquerade Passive attack Replay attack C

data padding routing traffic padding digital signature C


authorization Authentication
data exchange exchange Access Control Exchange D
Public key
Private key cryptogyaphy cryptogyaphy Hash Functions All of these D
Non-
Denial of Service Access Control Repudiation Auditing C

Virtual Private Virtual Publish


Virtual Public Network Network  Network None of these B

cryptology cryptosis cryptanalyst None of these A

Choosen Plaintext Cipher Text


Known Plaintext Attack Attack Attack All of these D
chosen cipher Side channel
Cipher text attack only text attack  attack All of these A
choosen Cipher Side channel
Cipher text attack text attack attack all of these B

connectionless connection data confidential traffic


confidentiality confidentiality ity flow confidentiality A

Cryptography Cryptanalysis Encryption Decryption B

cipher text attack chosen Plaintext


Known Plaintext attack only Attack side channel attack D

1, 2 ,3 2,3,4 1,3,4 1,2,3,4 D


connectionless Co Data Confidentia
Connection Confidentiality nfidentiality lity Data Integrity C

Connection Confi Connectionless  Traffic


Data Confidentiality dentiality Confidentiality Flow Confidentiality D

Security Longevity Performance Reliability A

To gain access
the sensitive
To corrupt the user's data To log, monitor information like
stored in the computer each and every user's Id and
system user's stroke Passwords All of the above D

Firewall Vlc player Antivirus None of these A


Active Passive Plaintext attack ciphertext attack A
Passive ciphertext plaintext Active D

Digital Signature Encipherment Traffic Padding Routing Control B

Routing Control Denial of Service Traffic Attack Masquerade B


Release of Message Modification of
contents Traffic Analysis Replay Attack message B
Attack
Attack Avoidance Attack Prevention Attack Detection Authentication C

RFC 2828 X.800 Both A and B None A

Peer
entity authentica
Data origin authentication tion Authorization Access Control C

authentication Authorization Auditing Access Control A


Process Element
Physical Elements System Elements s All of these C
Physical Element
Process Elements System Elements s All of these B
System Element
Process Elements Physical Elements s All of these B
Sr. No. Question Statement

In the AES-128 algorithm there are mainly __________ similar


1 rounds and _________ round is different from other round. 9 ; the last
Which of the following modes of operation in DES is used for Cipher Feedback
2 operating? Mode (CFB)

When do we compare the AES with DES, which of the following


functions from DES does not have an equivalent AES function in
3 cryptography? swapping of halves
Which of the following modes of operation in DES is used for Cipher Feedback
4 operating? Mode (CFB)
Private key
5 Symmetric key cryptography is also called _______ cryptography
Symmetric key cryptography uses ______ resource as compared
6 to Asymmetric key cryptography less
Symmetric key
7 For encryption of large message _______ is used cryptography
8 One time Pad is best example of ______________ Stream Cipher
9 ______________ uses concept of key generator. Stream Cipher
Monoalphabetic
10 Best example of substitution cipher is ___________ Cipher
11 Only 25 possible keys in __________ Vernam Cipher
___________ substitutes one letter of alphabet with any random
12 letter. Ceaser Cipher
13 Large random key cannot be created in _________ Vernam Cipher
_____________ uses 5 X 5 Matrix to store letters of the phrase
14 given. Ceaser Cipher

15 ___________ was invented by Charles Wheatstone in 1854. Vernam Cipher


Use Caesar’s Cipher to decipher the
16 following: HQFUBSWLRQ WHAW  ABANDONEDB LOCK

On Encrypting “thepepsiisintherefrigerator† using Vignere abqdnwewuwjphfvrrt


17 Cipher System using the keyword “HUMOR† we get rfznsdokvl
18 Which of the following ciphers is a block cipher? Playfair cipher

In which cipher the key chosen here is a string whose length must
19 be either less or equal to the length of the plain text? Verman Cipher
________________ is a cipher in which we consider both the
20 plain text and the key string in its binary form. Ceaser cipher

__________ the firstly developed encryption techniques which


gave us the idea of developing the entire encryption and Monoalphabetic
21 decryption process. Cipher
Using Vigenere cipher: Given Plain text: 'GIVE MONEY' Key: LOCK
22 the cipher text that we get? RWXOXCDOJ
23
Given Plain text: 'HELLO' Key: 3 Convert the given plain text into
24 ciphertext. KHOOT
___________ attacks can be used against cryptographic
25 algorithms that use multiple keys for encryption. Brute Force Attack
26 ____ rounds of encryption process are completed in DES. 8
Feistel Cipher
27 DES uses: Structure
28 The key length of DES algorithm is ________ 128 Bits
In the DES algorithm the round key is __________ bit and the
29 Round Input is ____________bits. 64,32
The Round Input is 32 bits, which is expanded to 48 bits via Duplication of the
30 ____________ in the DES algorithm  existing bits
In DES, the number of unique substitution boxes after the 48 bit
31 XOR operation are 12
 The 64 bit key input is reduced to 56 bits by ignoring every 4th
32 bit in the DES algorithm. 0
The multiplicative inverse of 0x95 in AES where
33 m(x)=x^8+x^4+x^3+x+1 is __________ 0x8F
34 The S-box value for byte stored in cell (6,D)   0x4A
35 The Inverse S-box value for byte stored in cell (3,3) 0x9B
36 The Inverse S-box value for byte stored in cell (6,3) 0x00
37 The Inverse S-box value for byte stored in cell (D,2) 0x5D
DES uses ______ bit keys so that there are ________ possible key
38 combinations. 64, 2^64
39 DES is vulnerable to __________ attack phishing 

Mix Columns, Sub-
byte, Shift Rows and
40 Steps of AES Encryption are: Add Round Key
Drawback of ECB is for occurence of __________ plain text block
41 it generate same cipher text block as output more than one

Using Columnar Transposition Technique(6X6 columns and


random sequence as 5 4 2 3 1 6) for plain text: "are you missing oieysmrisdesoyamgo
42 somebody" the cipher text is: umb
Using keyless Transposition Technique for plain text " be carefull eaeulhlcatbnrcflwiieh
43 while chatting" the cipher text is: tig
Using Ceaser Cipher for plain text "Sun rises in the East" the VXQULVHVLQWKHH
44 cipher text is: WVD
_____________ introduced simplest and easiest substitution
45 cipher. Charles Wheatstone
46 Double DES uses : four keys
47 Triple DES uses:  three keys
advanced
48 AES stands for encipher standard
Decrypt Encipher
49 DES stand for: Standard
50 Double and Triple are versions of: AES
51 AES is ____________ than DES. more secure 
Options

B C D Correct
Answer

5 similar rounds having


2 pair ; every alternate 8 ; the first and last 10 ; no A
Cipher Block chaining Electronic code book Output Feedback
(CBC) (ECB) Modes (OFB) C

xor of subkey with


f function permutation p function f A
Electronic code book Output Feedback Cipher Block chaining
(ECB) Modes (OFB) (CBC) B
conventional key
Public key cryptography cryptography both B and C A

more moderate very less A


Asymmetric key Secret key private key
cryptography cryptography cryptography B
Block Cipher Ceaser Cipher Playfair Cipher A
Block Cipher Both A and B None C
Playfair Cipher Ceaser Cipher Vernam Cipher C
Monoalphabetic
Playfair Cipher Cipher Ceaser Cipher D

Monoalphabetic Cipher Playfair Cipher Vernam Cipher B


Monoalphabetic Cipher Playfair Cipher Ceaser Cipher A
Monoalphabetic Cipher Playfair Cipher Vernam Cipher C
Monoalphabetic
Playfair Cipher Cipher Ceaser Cipher B

ENCRYPTION TEXT ABANDONEDB TEXT ENCRYPTION LOCK B

abqdvmwuwjphfvvyyrfz tbqyrvmwuwjphfvvyy baiuvmwuwjphfoeiyrfzn


nydokvl rfznydokvl ydokvl B
Caesar cipher Vernam cipher None of these A

Playfair Cipher Ceaser Cipher Monoalphabetic Cipher A

Monoalphabetic Cipher Playfair Cipher Verman Cipher D

Playfair Cipher Ceaser Cipher Vernam Cipher C


RWXOXCPOJ RWXOXCZOJ RWXOXCTOJ B

KHOOR KHOOK KHOOP B

Meet-in-the-Miiddle Replay attack Denial of Service B


10 16 24 C

Hash Algorithm Caesars Cipher SP Networks A


16 Bits 64 Bits 32 Bits C

48, 32 32, 32 56, 24 B


Scaling of the existing
Addition of ones bits Addition of zeros C

6 4 8D

1- A

0x8A 0xF8 0xA8 B


0x7F 0xFD 0x3C D
0x1F 0xC3 0x66 D
0x11 0x04 0x01 A
0x5F 0x2D 0x7F D

32, 2^32 56,2^56 16, 2^16 C


password Brute Force Man-in-Middle C

Sub-byte, Mix Columns Sub-byte, Shift Sub-byte, Shift Rows,


Shift Rows, and Add Rows, Add Round Key Mix Columns and Add
Round Key and Mix Columns Round Key D

less than one equal to one zero A

oieysmrisdesoyamgmbo oieysmrisdesoyaamgb oieysmrisdesoyaamgbm


u mou uo A
eaeulhlcatnbcrflwihei
eaeulhlcatnbcrflwiehtig tg eaeulhlcatnbcrflwiehgti B
VXQULVHVLQWKHHWV VXQULVHVLQWKHHV VXQULVHVLQWKHHDV
D DW W D

Julius Ceaser Vernam Matsui B


six keys two keys eight keys C
six keys nine keys five keys A
advanced encryption available encryption
standard standard none of these B
Data Encryption Data Encryption
Data Encipher Standard Standard Symmetry C
DES Both A and B None of above B
less secure weak None of above A
Sr. No. Question Statement

1 GCD of 15 and 12 is: 6


2 Solve 6^10 mod 11 using Fermat Theorem the answer is: 12
3 Solve using Euler's theorem: a=2 and n=11 11
4 GCD of 36 and 10 is: 5
5 Using Euclidean Algorithm GCD(48,30) is: 12
6 Using Euclidean Algorithm GCD(50,60) is 5
Public Key Encryption
7 RSA Algorithm is _______ Algorithm

8 In RSA Algorithm, suppose p=13 and q=11 and e=13 then d is: 39

9 In RSA Algorithm, suppose p=3 and q=11 and e=3 then d is: 11

10 Two numbers are said to be relatively prime if they have common factor as 2
11 Modulus function returns quotient
12 In RSA, the plain text is obtained by formula: C^d mod e
13 If n=4 then Ø(n)=? 1
14 If n=7 then Ã˜(n)=? 3
15 If n=7 then Ã˜(n)=? 3
16 Solve using Euler's Theorem: a=3 and n=10 9
17 Using Euclidean Algorithm calculate GCD(105,80) 5

18 Using RSA Algorithm Solve: p=7 , q=17 and e= 5 Calculate d 70


19 Using RSA Algorithm find d p=13, q=17, e=19 19
20 Using RSA Algorithm find d p=13, q=17, e=19 19
___________ is a process of generating keys using symmetric
21 or asymmetric key cryptography. Key Storage
22 ___________ is also called as Key Transportation. Key Distribution
Secure ____________________ is basic aim to achieve
23 integrity and trust in cryptography. Key Generation
Once Key is generated, stored and properly used then it is to
24 _____________ Update
______________ algorithm is also known as Key Exchange
25 Algorithm. RSA
Solve using Diffie Hellman algorithm: p=353, q=3,a=97 and
26 b=233 160
27 DH Algorithm is vulnerable to ___________ Brute Force Attack
28 Man-in-middle attack is also called ________ bucket brigade attack
A ______________ is the term used to recover large historical
29 encrypted data. Key Archive

30 Solve using Diffie Hellman Algorithm p=7, q=17, a=6 and b=4 3

Alice and Bob both use public numbers P = 23, G = 5. Alice


selected private key a = 4, and Bob selected b = 3 as the
31 private key. Find shared secret key. 19

Alice and Bob get public numbers P = 23, G = 9.  Alice selected
a private key a = 4 and Bob selected a private key b = 3. Find
32 the shared secret key. 18

33 The Diffie Hellman key exchange algorithm can be used  Encryption


Diffie Hellman
34 The sharing of the secret key is safe in _____________ Algorithm
The _____________algorithm can not be sued for any
35 asymmetric key exchange. RSA
36 Public key algorithms rely on ______ key one 
To provide both the authentication and confidentiality by a
37 ________ use of the public scheme triple
38 There are ____________ approaches to attack the RSA three
39 The approaches to attack the RSA __________ brute force

Constant
40 Timing attack in RSA can be avoided by __________ exponentiation time

Constant
41 Timing attack in RSA can be avoided by __________ exponentiation time
_________  Diffie and ________ Hellman develop Diffie
42 Hellman key exchange Algorithms in 1976. John, Mark
_________  Diffie and ________ Hellman develop Diffie
43 Hellman key exchange Algorithms in 1976. John, Mark
_____________ is an alternative to RSA and Diffie Hellman
44 Algorithms. Euler Curve
45 ECC is more powerful than RSA and Diffie Hellman. 1

Once the keys are exchanged, the communication of data can


46 be done through an insecure channel in _________ algorithm RSA
Necessary condition to apply the Chinese Remainder theorem
47 is modulo of congruence should be ________ Relatively Prime
48 Property/ties of operation of secure cipher. Diffusion
49 Using Ceaser Cipher "GOOD DOG" can be encrypted as "PMMX XMP"
Use Playfair Cipher:  Key text: Monarchy Plain text: Cipher text:
50 instruments gatlmzclrtxq
Options

B C D Correct
Answer
3 12 5 B
11 1 13 C
1 21 12 B
3 6 2 D
6 2 4 B
6 10 Private Key
12 C
Private Key Encryption Public Key Decryption
Algorithm Decryption Algorithm Algorithm A

35 37 36 C

9 7 5 C

common factor as 1 common factor as 3 none of above B


remainder dividend divisor B
C^d mod n d^C mod e d^C mod n B
2 3 4 B
6 5 4 B
6 5 4 B
1 3 6 B
8 3 15 A

77 67 57 B
191 91 291 C
191 91 291 C

Key Distribution Key Generation Key Validation C


Key Generation Key Storage Key Validation A

Key Distribution Key Storage  Key Validation B

Validate Usage Storage B

Diffie Hellman Both A and B None B

140 150 260 A


Man-in-middle Attack Password Attack Replay Attack B
replay attack password attack none A
Key Update Key store key validate A

1 6 4 B

16 18 20 C

9 14 16 B

Password Authenticated
Agreement Forward Secrecy All of these D

RSA  Substitution cipher Transposition  A

Diffie Hellman both none B


three two four C

single double quadruple C


two five four A
mathematical attacks timing attacks All of these D

Random delay Blinding All of these D

Random delay Blinding All of these D

Whitefield, Martin Martin, Whitefield Johnson, Jennifer B

Whitefield, Martin Martin, Whitefield Johnson, Jennifer B

Elliptic Curve Euclidean Curve none B


0 - A

Diffie Hellman both None of these B


No restriction on
Individually Prime Modulo None of these A
Confusion  Both A and B None C
"JLLX XLJ" "JRRG GRJ" "PTTX XTP" C
Cipher text: Cipher text:
Cipher text: gatlmzclrqtx gatlmzclrxtq gatlmzclfsty B

You might also like