CNS MID-1 QUIZ IMP Objective
1. In which of the following the attacker obtains a copy of message sent by the user            [   ]
     a) Modification          b) Masquerading      c) Replaying          d) None of these
2. Which of the following is not a security goal                                                [   ]
     a) Confidentiality       b) Integrity       c) Verification         d) Availability
3. Encipherment security mechanism can provide                                                  [   ]
     a) Confidentiality          b) Integrity    c) Verification         d) Availability
4. In symmetric key cryptography, the key used by the sender and receiver is       [        ]
     a) Different       b) Shared      c) Two Keys are used         d) Multiple Keys
5. In transposition, the plaintext letters are                                                  [   ]
    a) Substituted         b) Rearranged         c) Removed                   d) Mixed
6. I sent data set {A,B,C,D} to a recipient which got received as {B,A,C,D}                  [ ]
    a) Confidentiality is lost b) Integrity is lost c) Availability is compromised d) None
7. Encryption Strength is based on                                                           [ ]
    a) Strength of algorithm b) Secrecy of key c) Length of key d) All of the above
8. The GCD(18,300) is                                                                       [ ]
    a) 4                   b) 8           c) 12                  d) 6
9. Euler’s totient ᶲ(37)=                                                                   [ ]
    a) 24                  b) 22          c) 13                  d) 36
10. 7^3 mod 19 =                                                                            [ ]
    a) 18                  b) 1           c) 14                  d) 12
11. How many primitive roots are there for 25                                               [ ]
    a) 4                   b) 5           c) 7                   d) 8
12. Out of the following which of these integers is not prime                               [ ]
    a) 21                  b) 35          c) 71                  d) 101
13. How many positive integer are less than 21 are relatively prime to 21                   [ ]
    a) 18                  b) 19          c) 21                  d) 24
14. What is 11 mod 7 and -11 mod 7                                                         [ ]
    a) 4 and 5             b) 4 and 4     c) 5 and 3             d) 4 and -4
15. In public key encryption if A wants to send a encrypted message                        [ ]
    a) A encrypts message with his private key b) A encrypts message using B’s private key
    c) A encrypts message using B’s public key d) A encrypts message with his public key
16. The Acronym DES stands for                                                             [ ]
    a) Digital Encryption Standard        b) Data Encryption Standard
    c) Digital Encryption System          d) Double Encryption Standard
17. Which of the following are disadvantages of the Symmetric Key Cryptography             [ ]
    a) Nonrepudiation b) Scalability c) Key distribution d) Security
18. Evaluate the expression 6359 mod 320                                                   [ ]
    a) 681          b) 811        c) 3781          d) 279
19. Caesar Cipher is an example of                                                         [ ]
    a) Poly-alphabetic Cipher b) Mono-alphabetic Cipher
    c) Multi-alphabetic Cipher d) Bi-alphabetic Cipher
20. The DES algorithm has a key length of                                                      [   ]
    a) 128 bits b) 32 bits     c) 64 bits     d) 16 bits
   21. A website login mechanism employs both password and PIN sent to a mobile. The scenario is
 a) High convenience but low security          b) High convenience but good security
 b) Low convenience but low security           d) Low convenience but good security
   22. I sent data set {A,B,C,D} to a recipient which got received as {B,A,C,D}
 a) Data security is compromised                    b) Data integrity is lost
 b) Confidentiality is lost                         d) Data availability is compromised
   23. A fake email posing as a legitimate email from bank is
 a) Attack on availability                 b) Masquerading attack
 b) DoS attack                                     d) Attack on confidentiality
   24. A group of 30 members uses symmetric key encryption for message transmission. How many secret keys are needed
 a) 30                  b) 65                  c) 435          d) 900
   25. Rail Fence Technique is an example of
 a) Substitution b) Transposition     c) Product cipher       d)Caesar cipher
   26. Which one is the strong attack mechanism
 a) Chosen plaintext attack      b) Chosen cipher text
 b) Brute Force Attack              d) Man in the middle attack
   27. Interception is an attack on
 a) Availability     b) Confidentiality    c)Integrity    d) Authenticity
   28. Which of the following is passive attack
 a) Relay attack      b) Masquerade
 b) Traffic analysis d) Denial of Service NIST
   29. Which one of the following is active attack?
 a) Masquerade              b) Traffic analysis
 c) Eavesdropping d) Shoulder surfing
 30. prevents either sender or receiver from denying a transmitted message.
 a) Access Control       b) Non repudiation
 c) Masquerade              d) Integrity
 31. Tool for implementing security policy may be called as
 a) Security process        b) Security authentication
 c) Security gaps           d) Security mechanism
 32.Biometric authentication works on the basis of
 a) Human characteristics b) Passwords
 c) Smart cards                     d) Pin
 33.Lack of access control policy is a
 a) Bug                     b) Threat
 c) Vulnerability           d) Attack
 34.Existence of weakness in a system or network is called _______
 a) Threat         b) Vulnerability
 c) Exploit                 d) Attack
35.Name the network attack that floods it with useless traffic.
a) Spoofing                         b) Denial of Service attack
c) Virus                            d) Trojan Horse
36.One Time Pad is also known as
a) Playfair cipher         b) Hill cipher
c) Vigenere Cipher                  d) Perfect Secrecy
37.Encryption Strength is based on
a) Strength of Algorithm            b) Secrecy of key
c) Length of key                    d) All of the above
38.Example of an Authentication Token is
a) Key fob                          b) Smart card
c) Pin                              d) None of these
39.. _ involves trying every possible key until a proper translation of cipher text into plain text is obtained.
a) Man in the middle attack         b) Chosen Plain text Attack
c) Brute Force attack               d) None of these
40. Chosen cipher text attack is based on
a) Cryptanalysis                    b) Cryptography
c) Encryption              d) Decryption
  41. Interception is an attack on
a) Availability             b) Confidentiality
c) Integrity                d) Authenticity
42. prevents either sender or receiver from denying a transmitted message.
a) Access Control           b) Non repudiation
c) Masquerade                       d) Integrity
43.Which one of the following is active attack?
a) Masquerade                       b) Traffic analysis
c) Eavesdropping            d) Shoulder surfing
44.Chosen cipher text attack is based on
a) Cryptanalysis                    b) Cryptography
c) Encryption                       d) Decryptio
45. Which of the following is passive attack?
a) Relay attack                     b) Masquerade
c) Traffic analysis                 d) Denial of service
46. Vigenere cipher is an example of
a) Polyalphabetic cipher            b) Caesar cipher
c) Mono alphabetic cipher           d) Product cipher
47.For confidentiality, data to be sent is
a) Encrypted                        b) Decrypted
c) Corrected                        d) Both (a) and (b)
48.Interception is an attack on
b) Availability            b) Confidentiality
c) Integrity                        d) Authenticity
49.Which of the following is passive attack
c) Relay attack            b) Masquerade
d) Traffic analysis                 c) Denial of Service NIST
50.Which one of the following is active attack?
a) Masquerade                       b) Traffic analysis
c) Eavesdropping          d) Shoulder surfing
51.__prevents either sender or receiver from denying a transmitted message.
a) Access Control         b) Non repudiation
c) Masquerade                     d) Integrity
52. Tool for implementing security policy may be called as
a) Security process               b) Security authentication
c) Security gaps                  d) Security mechanism
53.Biometric authentication works on the basis of
a) Human characteristics          b) Passwords
c) Smart cards                             d) Pin
54.Lack of access control policy is a
a) Bug                              b) Threat
c) Vulnerability                    d) Attack
55.Existence of weakness in a system or network is called _______
a) Threat                  b) Vulnerability
c) Exploit                          d) Attack
56.Name the network attack that floods it with useless traffic.
a) Spoofing
b) Denial of Service attack
c) Virus
d) Trojan Horse
57.One Time Pad is also known as
a) Playfair cipher         b) Hill cipher
c) Vigenere Cipher                  d) Perfect Secrecy
58.Encryption Strength is based on
a) Strength of Algorithm            b) Secrecy of key
c) Length of key                    d) All of the above
59.Example of an Authentication Token is
a) Key fob                          b) Smart card
c) Pin                              d) None of these
60.. _ involves trying every possible key until a proper translation of cipher text into plain text is obtained.
a) Man in the middle attack                          b) Chosen Plain text Attack
c) Brute Force attack                                d) None of these