Quiznetik

Information and Cyber Security (ICS) | Set 1

1. Security Measures Needed to protect during their transmission

Correct : B. data

2. means knowledge obtained from investigation, study , intelligence new ,facts .

Correct : C. information

3. Prevention of the unauthorised used of Resources refers too?

Correct : C. acess control

4. Protection against Denial by one of these parties in a communication refers to?

Correct : A. non-repudiation

5. Which One of them is Passive attack?

Correct : D. obtain message contain

6. What is lying of IP address called as?

Correct : A. ip spoofing

7. What is full form of DDoS?

Correct : B. distributed denial of service

8. A hacker guessing suggested password to a program is call as?

Correct : C. default password attack

9. Symmetric key encryption is also called as?

Correct : B. private key encryption

10. Conversion of Cypher text to plain text?

Correct : B. decryption

11. is used to create the organisation's overall security program.

Correct : A. program policy

12. An act of protecting information from unauthorised disclouser to an entity.-

Correct : C. confidentiality

13. A way to ensure that the entity is indeed what it claims to be.-

Correct : A. authentication

14. The model is 7 layer architecture where each layer is having some specific functionality to perform.

Correct : B. osi

15. The full form of OSI is OSI model .

Correct : A. open systems interconnection

16. The technique in which when one character is replaced by another Character is called as?

Correct : B. substitution

17. Conversion of plain text into Cipher text is called as .

Correct : A. encryption

18. In Symmetric schemes requires both parties to share how many secret key?

Correct : A. one

19. Blum Blum Shub Generator is based on which Algorithm?

Correct : B. public key

20. In DES step both LPT and RPT undergoes in how much key Rounds?

Correct : B. 16

21. What is the 4th step in DES Algorithm?

Correct : C. p-box permutation

22. In AES in which Round Subkeys are Generated from Original key for each round?

Correct : A. key expansion

23. AES stands for?

Correct : B. advance encryption standard

24. Which of them is type of Cipher?

Correct : C. both of them

25. The message which is not understandable is called as?

Correct : A. cipher text

26. The is a polygraphic substitution cipher based on linear algebra.

Correct : A. hill cipher

27. is the practice of concealing a message within another message,image or file.

Correct : A. steganography

28. In asymmetric key cryptography, the private key is kept by

Correct : B. receiver

29. What is data encryption standard (DES)?

Correct : A. block cipher

30. In cryptography the original message before being transform is called

Correct : B. plain text

31. An asymmetric-key (or public-key) cipher uses

Correct : A. 1 key

32. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

Correct : C. long

33. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

Correct : A. authenticated

34. In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

Correct : D. each other

35. For RSA to work, the value of P must be less than the value of

Correct : C. n

36. In RSA, Ф(n) = in terms of p and q.

Correct : C. (p-1)(q-1)

37. In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).

Correct : B. false

38. RSA is also a stream cipher like Merkel-Hellman.

Correct : A. true

39. USENET falls under which category of public key sharing?

Correct : A. public announcement

40. PGP makes use of which cryptographic algorithm?

Correct : A. rsa

41. Public key cryptography also called as

Correct : A. asymmetric key cryptography

42. ECC stands for

Correct : A. elliptic curve cryptography

43. Diffie-Hellman algorithm is widely known as

Correct : D. both a and b

44. Hash function is used for

Correct : C. both a and b

45. RSA algorithm is best example of

Correct : A. asymmetric key cryptography

46. IPSec is designed to provide security at the

Correct : B. network layer

47. In tunnel mode, IPSec protects the

Correct : A. entire ip packet

48. HTTPS is abbreviated as

Correct : D. hyper text transfer protocol secure

49. An attempt to make a computer resource unavailable to its intended users is called

Correct : A. denial-of-service attack

50. SSL primarily focuses on                   Pretty good privacy (PGP) is used in

Correct : A. integrity and authenticity

51. is used for encrypting data at network level

Correct : A. ipsec

52. WPA2 is used for security in

Correct : B. wi-fi

53. Which of the following is not a strong security protocol

Correct : C. smtp

54. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

Correct : A. true

55. IPSec operates in..... different modes

Correct : B. 2

56. length of the IPv4 address is ....

Correct : A. 32 bits

57. Internet Key Exchange has .... phases and modes of operations

Correct : C. 2

58. PGP is abbreviated as

Correct : A. pretty good privacy

59. SET stands for

Correct : B. secure electronic transaction

60. Transport layer Protocol consists of ... main components

Correct : A. 2

61. length of the IPv6 acddress is ....

Correct : B. 64 bits

62. SSL provides .

Correct : D. all of the above

63. IPSec provides ....protocols for network layer

Correct : A. 7

64. length of the IPv6 header is....

Correct : C. 32 bits

65. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

Correct : C. authenticity

66. CIA triad is also known as

Correct : B. aic (availability, integrity, confidentiality)

67. of information means, only authorised users are capable of accessing the information.

Correct : A. confidentiality

68. means the protection of data from modification by unknown users.

Correct : B. integrity

69. When you use the word it means you are protecting your data from getting disclosed.

Correct : A. confidentiality

70. When integrity is lacking in a security system,                     occurs.

Correct : C. data tampering

71. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

Correct : C. they help understands security and its components better

72. This helps in identifying the origin of information and authentic user. This referred to here as

Correct : C. authenticity

73. Data is used to ensure confidentiality.

Correct : A. encryption

74. Data integrity gets compromised when and are taken control off.

Correct : C. access control, file permission

75. is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Correct : C. information security

76. From the options below, which of them is not a threat to information security?

Correct : D. unchanged default password

77. Compromising confidential information comes under

Correct : B. threat

78. Which of the following are not security policies?

Correct : C. availability

79. Examples of User Policies is/are:

Correct : D. all of the above

80. Policy ensures that the organization is maintaining standards set by specific industry regulation.

Correct : A. regulatory

81. Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior

Correct : B. advisory

82. What defines the restrictions on employees such as usage?

Correct : D. user policies

83. The full form of OSI is OSI model is

Correct : A. open systems interconnection

84. In layer, vulnerabilities are directly associated with physical access to networks and hardware.

Correct : A. physical

85. Which of the following attack can actively modify communications or data?

Correct : C. active attacks

86. Categories of Security Service

Correct : D. 1,2,3

87. Release of Message Content and Traffic analysis are type of :

Correct : D. passive attacks

88. If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

Correct : A. release of message content-passive attack

89. If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

Correct : D. traffic analysis -active attacks

90. means when an attacker pretends to be authentic user

Correct : A. masquerade

91. attack is when original data is modified and malicious data is inserted

Correct : B. replay(rewrite)

92. When original data is changed to make it non-meaningful by attacker it is known as

Correct : C. modification of messages

93. Which is the type of attack when Network is made unavailable for user

Correct : D. denial of service

94. Modification of Data is done in:

Correct : A. both active and passive attacks

95. The information that gets transformed in encryption is

Correct : A. plain text

96. A process of making the encrypted text readable again.

Correct : A. decryption

97. A unique piece of information that is used in encryption.

Correct : C. key

98. Assurance that authentic user is taking part in communication is:

Correct : A. authentication

99. ATM pin while withdrawing money is an example of using:

Correct : A. authentication

100. Study of creating a d using encryption and decryption techniques.

Correct : B. cryptography