Quiznetik

Information Cyber Security (ICS) | Set 3

1. For RSA to work, the value of P must be less than the value of

Correct : C. n

2. In RSA, Ф(n) = _______ in terms of p and q.

Correct : C. (p-1)(q-1)

3. In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).

Correct : B. false

4. RSA is also a stream cipher like Merkel-Hellman.

Correct : A. true

5. USENET falls under which category of public key sharing?

Correct : A. public announcement

6. PGP makes use of which cryptographic algorithm?

Correct : A. rsa

7. Public key cryptography also called as________

Correct : A. asymmetric key cryptography

8. ECC stands for

Correct : A. elliptic curve cryptography

9. Diffie-Hellman algorithm is widely known as_________

Correct : D. both a and b

10. Hash function is used for________

Correct : C. both a and b

11. RSA algorithm is best example of_______

Correct : A. asymmetric key cryptography

12. In tunnel mode, IPSec protects the ______

Correct : A. entire ip packet

13. HTTPS is abbreviated as _________

Correct : D. hyper text transfer protocol secure

14. An attempt to make a computer resource unavailable to its intended users is called ______

Correct : A. denial-of-service attack

15. SSL primarily focuses on _______

Correct : A. integrity and authenticity

16. Pretty good privacy (PGP) is used in ______

Correct : B. email security

17. __________ is used for encrypting data at network level

Correct : A. ipsec

18. WPA2 is used for security in _______

Correct : B. wi-fi

19. Which of the following is not a strong security protocol

Correct : C. smtp

20. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

Correct : A. true

21. IPSec operates in..... different modes

Correct : B. 2

22. length of the IPv4 address is ....

Correct : A. 32 bits

23. Internet Key Exchange has .... phases and modes of operations

Correct : C. 2

24. PGP is abbreviated as

Correct : A. pretty good privacy

25. SET stands for

Correct : B. secure electronic transaction

26. Transport layer Protocol consists of ... main components

Correct : A. 2

27. length of the IPv6 acddress is ....

Correct : D. 128 bit

28. IPSec provides ....protocols for network layer

Correct : A. 7

29. length of the IPv6 header is....

Correct : C. 32 bits

30. CIA triad is also known as

Correct : B. aic (availability, integrity, confidentiality)

31. of information means, only authorised users are capable of accessing the information.

Correct : A. confidentiality

32. means the protection of data from modification by unknown users.

Correct : B. integrity

33. When you use the word it means you are protecting your data from getting disclosed.

Correct : A. confidentiality

34. When integrity is lacking in a security system,                     occurs.

Correct : C. data tampering

35. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

Correct : C. they help understands security and its components better

36. This helps in identifying the origin of information and authentic user. This referred to here as

Correct : C. authenticity

37. Data is used to ensure confidentiality.

Correct : A. encryption

38. Data integrity gets compromised when and are taken control off.

Correct : C. access control, file permission

39. is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Correct : C. information security

40. From the options below, which of them is not a threat to information security?

Correct : D. unchanged default password

41. Compromising confidential information comes under

Correct : B. threat

42. The full form of OSI is OSI model is

Correct : A. open systems interconnection

43. In layer, vulnerabilities are directly associated with physical access to networks and hardware.

Correct : A. physical

44. If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

Correct : A. release of message content-passive attack

45. If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

Correct : D. traffic analysis -active attacks

46. The information that gets transformed in encryption is

Correct : A. plain text

47. A unique piece of information that is used in encryption.

Correct : C. key

48. Study of creating a d using encryption and decryption techniques.

Correct : B. cryptography

49. An attack in which the user receives unwanted amount of e- mails.

Correct : C. e-mail bombing

50. In same keys are implemented for encrypting as well as decrypting the information.

Correct : A. symmetric key encryption

51. The procedure to add bits to the last block is termed as

Correct : D. padding

52. Cryptanalysis is used

Correct : A. to find some insecurity in a cryptographic scheme

53. Conventional cryptography is also known as or symmetric-key encryption.

Correct : A. secret-key

54. is the art & science of cracking the cipher-text without knowing the key.

Correct : B. cryptanalysis

55. In cryptography, what is cipher?

Correct : A. algorithm for performing encryption and decryption

56. In asymmetric key cryptography, the private key is kept by __________

Correct : B. receiver

57. In cryptography, the order of the letters in a message is rearranged by __________

Correct : A. transpositional ciphers

58. Cryptanalysis is used __________

Correct : A. to find some insecurity in a cryptographic scheme

59. Which one of the following is a cryptographic protocol used to secure HTTP connection?

Correct : B. transport layer security (tls)

60. Voice privacy in GSM cellular telephone protocol is provided by _______

Correct : A. a5/2 cipher

61. ElGamal encryption system is __________

Correct : B. asymmetric key encryption algorithm

62. Cryptographic hash function takes an arbitrary block of data and returns _________

Correct : A. fixed size bit string

63. In the above figure from left to right, the correct order of the shaded levels are

Correct : D. network level, transport level, application level

64. In the above figure, which of the above shaded block is transparent to end users and applications?

Correct : A. ip/ipsec

65. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

Correct : B. false

66. Which one of the following is not a higher –layer SSL protocol?

Correct : C. alarm protocol

67. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

Correct : C. 214

68. The full form of SSL is

Correct : B. secure socket layer

69. Which protocol is used to convey SSL related alerts to the peer entity?

Correct : A. alert protocol

70. Which protocol consists of only 1 bit?

Correct : D. change cipher spec protocol

71. Which protocol is used for the purpose of copying the pending state into the current state?

Correct : D. change cipher spec protocol

72. In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.

Correct : D. warning, fatal

73. Pretty good privacy (PGP) security system uses

Correct : C. public & private key cryptosystem

74. Data compression includes

Correct : C. removal of redundant character & uniform distribution of characters

75. PGP offers _____ block ciphers for message encryption.

Correct : D. all of the mentioned

76. Which of the following is not a secured mail transferring methodology?

Correct : A. pop3

77. __________ is used for encrypting data at network level.

Correct : A. ipsec

78. S/MIME is abbreviated as __________________

Correct : D. secure/multipurpose internet mail extensions

79. PGP encrypts data by using a block cipher called ______

Correct : A. international data encryption algorithm

80. When were VPNs introduced into the commercial world?

Correct : D. late 90’s

81. What protocol is NOT used in the operation of a VPN?

Correct : C. ymum

82. Which of the following statements is NOT true concerning VPNs?

Correct : D. is the backbone of the internet

83. Traffic in a VPN is NOT ____________

Correct : C. accessible from unauthorized public networks

84. Which layer 3 protocols can be transmitted over an L2TP VPN?

Correct : D. ip and ipx

85. ESP (Encapsulating Security Protocol) is defined in which of the following standards?

Correct : A. ipsec

86. L2F was developed by which company?

Correct : B. cisco

87. Which layer of the OSI reference model does PPTP work at?

Correct : B. layer 2

88. Which layer of the OSI reference model does IPsec work at?

Correct : C. layer 3

89. Firewalls can be of _______ kinds.

Correct : C. 3

90. _________________ is the kind of firewall is connected between the device and the network connecting to internet.

Correct : A. hardware firewall

91. _________ is software that is installed using an internet connection or they come by-default with operating systems.

Correct : B. software firewall

92. Which of the following is not a software firewall?

Correct : D. linksys firewall

93. Firewall examines each ____________ that are entering or leaving the internal network.

Correct : D. data packets

94. A firewall protects which of the following attacks?

Correct : C. denial of service (dos)

95. There are ______ types of firewall.

Correct : B. 4

96. Packet filtering firewalls are deployed on ________

Correct : A. routers

97. In the ______________ layer of OSI model, packet filtering firewalls are implemented.

Correct : D. network layer

98. The __________ defines the packet filtering firewall rules.

Correct : A. access control list

99. ACL stands for _____________

Correct : D. access control list

100. When a packet does not fulfil the ACL criteria, the packet is _________

Correct : B. dropped