1. An algorithm in encryption is called _____________.
Correct : C. Cipher
2. The information that gets transformed in encryption is ____________.
Correct : A. Plain text
3. In brute force attack, on average half of all possible keys must be tried to achieve
success.
Correct : A. True
4. A (n) ______ algorithm transforms ciphertext to plaintext.
Correct : B. Decryption
5. The ________ is the message after transformation.
Correct : A. Ciphertext
6. Which of the following is not a type of virus?
Correct : A. Boot sector
7. A computer ________ is a malicious code which self-replicates by copying itself to other
programs.
Correct : B. Virus
8. _______________ infects the master boot record and it is challenging and a complex task to
remove this virus.
Correct : A. Boot Sector Virus
9. ______________ infects the executable as well as the boot sectors.
Correct : D. Multipartite Virus
10. Trojan creators do not look for _______________.
Correct : B. Protecting Data
11. Once activated __________ can enable ____________to spy on the victim, steal their
sensitive information & gain backdoor access to the system.
Correct : C. Trojans, Cyber-Criminals
12. During a DOS attack, the regular traffic on the target _____________ will be either
dawdling down or entirely interrupted.
Correct : C. Website
13. The intent of a __________ is to overkill the targeted server’s bandwidth and other
resources of the target website.
Correct : B. DoS attack
14. In ________ some cyber-criminals redirect the legitimate users to different phishing
sites and web pages via emails, IMs, ads and spyware.
Correct : C. Phishing
15. Trojan creators do not look for _______________.
Correct : D. Securing systems with such programs
16. 1. When one participant in a communication pretends to be someone else, it is called
_________?
Correct : D. Masquerade
17. ________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.
Correct : C. Whale phishing
18. Compromising confidential information comes under _________.
Correct : B. Threat
19. When an attacker sends unsolicited communication, it is an example of_____.
Correct : A. Spoofing
20. Masquerading is _______.
Correct : B. Pretending to be an authorized user
21. Integrity is protection of data from all of the following except ________.
Correct : C. Data analysis
22. A security program cannot address which of the following business goals?
Correct : A. Accuracy of information
23. The absence of a fire-suppression system would be best characterized as_______.
Correct : C. Vulnerability
24. Asymmetric key cryptography is used for all of the following
except_______.
Correct : D. Steganography
25. Firewalls are to protect against________.
Correct : D. Unauthorized Attacks
26. The first computer virus is__________.
Correct : D. Creeper
27. _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.
Correct : C. Information Security
28. From the options below, which of them is not a vulnerability to information security?
Correct : C. Floo
29. Possible threat to any information cannot be ________________.
Correct : A. Ignored
30. A _________ can gain access illegally to a system if the system is not properly tested in
scanning and gaining access phase.
Correct : B. Malicious hacker
31. _________________ is the process or mechanism used for converting ordinary plain
text into garbled non-human readable text & vice-versa.
Correct : D. Cryptography
32. When plain text is converted to unreadable format, it is termed as _____________.
Correct : C. Cipher-text
33. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
Correct : B. Cryptography
34. Cryptography can be divided into ______ types.
Correct : B. 2
35. Data which is easily readable & understandable without any special algorithm or
method is called _________________.
Correct : B. Plain text
36. Plain text are also called _____________.
Correct : C. Raw text
37. There are ________ types of cryptographic techniques used in general.
Correct : B. 3
38. Conventional cryptography is also known as _____________ or symmetric-key
encryption.
Correct : A. Secret-key
39. Data Encryption Standard is an example of a _____________ cryptosystem.
Correct : A. Conventional
40. _______ Cryptography deals with traditional characters, i.e., letters & digits directly.
Correct : C. C Classic
41. ____________ Cryptography operates on binary-bit series and strings.
Correct : A. Modern
42. ____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.
Correct : B. Caesar Cipher
43. ________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.
Correct : B. Shift Cipher
44. In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
Correct : C. Playfair Cipher
45. ______________ employs a text string as a key that is implemented to do a series of
shifts on the plain-text.
Correct : D. Vigenere Cipher
46. The ________________ has piece of the keyword that has the same length as that of the
plaintext.
Correct : A. One-time pad
47. In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.
Correct : C. Stream cipher
48. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.
Correct : D. D Block Cipher
49. The procedure to add bits to the last block is termed as _________________.
Correct : A. Padding
50. Which of the following is not an example of a block cipher?
Correct : A. DES
51. DES stands for ________________.
Correct : D. Data Encryption Standard
52. ____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.
Correct : D. AES
53. AES stands for ________________.
Correct : C. Advanced Encryption Standar
54. AES is at least 6-times faster than 3-DES.
Correct : A. True
55. _____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.
Correct : C. Steganography
56. _____________ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.
Correct : A. Steganography
57. Steganography follows the concept of security through obscurity.
Correct : A. True
58. The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.
Correct : C. Steganography
59. Which of the following is not a steganography tool?
Correct : B. ReaperExploit
60. Which of the following is not a steganography tool?
Correct : D. Burp Suite
61. The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.
Correct : C. Ordinary file
62. People will normally think it as a normal/regular file and your secret message will pass on without any _______________.
Correct : C. Suspicion
63. By using ______________ you can diminish the chance of data leakage.
Correct : A. Steganography
64. Which mode of operation has the worst “error propagation” among the following?
Correct : A. EC
65. Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?
Correct : C. C CTR
66. Which mode requires the implementation of only the encryption algorithm?
Correct : B. B CTR
67. Which of the following modes of operation does not involve feedback?
Correct : A. OF
68. Which of the following is a natural candidates for stream ciphers?
Correct : A. OF
69. Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?
Correct : D. JUPITER
70. Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as
the AES algorithm?
Correct : D. MARS
71. How many rounds does the AES-192 perform?
Correct : B. 12
72. What is the expanded key size of AES-192?
Correct : C. 52 words
73. The 4×4 byte matrices in the AES algorithm are called_______.
Correct : D. States
74. In AES the 4×4 bytes matrix key is transformed into a keys of size __________.
Correct : D. 44 words
75. For the AES-128 algorithm there are __________ similar rounds and _________ round
is different.
Correct : A. 9 ; the last
76. There is an addition of round key before the start of the AES round algorithms.
Correct : A. True
77. How many computation rounds does the simplified AES consists of?
Correct : C. 2
78. On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?
Correct : B. Swapping of halves
79. What is the block size in the Simplified AES algorithm?
Correct : C. 40 bits
80. What is the key size in the S-AES algorithm?
Correct : C. 16 bits
81. Which of the following is a faulty S-AES step function?
Correct : C. Byte substitution
82. How many step function do Round 1 and 2 each have in S-AES?
Correct : D. 4 and 3
83. The inverse transformation matrix times the forward transformation matrix equals the identity matrix.
Correct : A. True
84. How many round keys are generated in the AES algorithm?
Correct : B. 11
85. DES follows_________.
Correct : B. Feistel Cipher Structure
86. The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.
Correct : A. 16
87. The DES algorithm has a key length of ______.
Correct : C. 64 Bits
88. In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.
Correct : A. 48, 32
89. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via
____________.
Correct : D. Scaling of the existing bits
90. The Initial Permutation table/matrix is of size _____.
Correct : B. 8×8
91. The number of unique substitution boxes in DES after the 48 bit XOR operation
are___.
Correct : B. 8
92. What is the number of possible 3 x 3 affine cipher transformations?
Correct : C. 1344
93. The S-Box is used to provide confusion, as it is dependent on the unknown key.
Correct : A. True
94. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88
and thus find the CT.
Correct : B. 11
95. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher
message=11 and thus find the plain text.
Correct : D. 88
96. In an RSA system the public key of a given user is e = 31, n = 3599. What is the private
key of this user?
Correct : D. 3031
97. Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153).
Correct : B. 19367
98. RSA is also a stream cipher like Merkel-Hellman.
Correct : A. True
99. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?