Quiznetik

Information and Network Security | Set 1

1. An algorithm in encryption is called _____________.

Correct : C. Cipher

2. The information that gets transformed in encryption is ____________.

Correct : A. Plain text

3. In brute force attack, on average half of all possible keys must be tried to achieve success.

Correct : A. True

4. A (n) ______ algorithm transforms ciphertext to plaintext.

Correct : B. Decryption

5. The ________ is the message after transformation.

Correct : A. Ciphertext

6. Which of the following is not a type of virus?

Correct : A. Boot sector

7. A computer ________ is a malicious code which self-replicates by copying itself to other programs.

Correct : B. Virus

8. _______________ infects the master boot record and it is challenging and a complex task to remove this virus.

Correct : A. Boot Sector Virus

9. ______________ infects the executable as well as the boot sectors.

Correct : D. Multipartite Virus

10. Trojan creators do not look for _______________.

Correct : B. Protecting Data

11. Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

Correct : C. Trojans, Cyber-Criminals

12. During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted.

Correct : C. Website

13. The intent of a __________ is to overkill the targeted server’s bandwidth and other resources of the target website.

Correct : B. DoS attack

14. In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.

Correct : C. Phishing

15. Trojan creators do not look for _______________.

Correct : D. Securing systems with such programs

16. 1. When one participant in a communication pretends to be someone else, it is called _________?

Correct : D. Masquerade

17. ________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.

Correct : C. Whale phishing

18. Compromising confidential information comes under _________.

Correct : B. Threat

19. When an attacker sends unsolicited communication, it is an example of_____.

Correct : A. Spoofing

20. Masquerading is _______.

Correct : B. Pretending to be an authorized user

21. Integrity is protection of data from all of the following except ________.

Correct : C. Data analysis

22. A security program cannot address which of the following business goals?

Correct : A. Accuracy of information

23. The absence of a fire-suppression system would be best characterized as_______.

Correct : C. Vulnerability

24. Asymmetric key cryptography is used for all of the following except_______.

Correct : D. Steganography

25. Firewalls are to protect against________.

Correct : D. Unauthorized Attacks

26. The first computer virus is__________.

Correct : D. Creeper

27. _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

Correct : C. Information Security

28. From the options below, which of them is not a vulnerability to information security?

Correct : C. Floo

29. Possible threat to any information cannot be ________________.

Correct : A. Ignored

30. A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.

Correct : B. Malicious hacker

31. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

Correct : D. Cryptography

32. When plain text is converted to unreadable format, it is termed as _____________.

Correct : C. Cipher-text

33. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

Correct : B. Cryptography

34. Cryptography can be divided into ______ types.

Correct : B. 2

35. Data which is easily readable & understandable without any special algorithm or method is called _________________.

Correct : B. Plain text

36. Plain text are also called _____________.

Correct : C. Raw text

37. There are ________ types of cryptographic techniques used in general.

Correct : B. 3

38. Conventional cryptography is also known as _____________ or symmetric-key encryption.

Correct : A. Secret-key

39. Data Encryption Standard is an example of a _____________ cryptosystem.

Correct : A. Conventional

40. _______ Cryptography deals with traditional characters, i.e., letters & digits directly.

Correct : C. C Classic

41. ____________ Cryptography operates on binary-bit series and strings.

Correct : A. Modern

42. ____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.

Correct : B. Caesar Cipher

43. ________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.

Correct : B. Shift Cipher

44. In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.

Correct : C. Playfair Cipher

45. ______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text.

Correct : D. Vigenere Cipher

46. The ________________ has piece of the keyword that has the same length as that of the plaintext.

Correct : A. One-time pad

47. In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

Correct : C. Stream cipher

48. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.

Correct : D. D Block Cipher

49. The procedure to add bits to the last block is termed as _________________.

Correct : A. Padding

50. Which of the following is not an example of a block cipher?

Correct : A. DES

51. DES stands for ________________.

Correct : D. Data Encryption Standard

52. ____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.

Correct : D. AES

53. AES stands for ________________.

Correct : C. Advanced Encryption Standar

54. AES is at least 6-times faster than 3-DES.

Correct : A. True

55. _____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.

Correct : C. Steganography

56. _____________ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.

Correct : A. Steganography

57. Steganography follows the concept of security through obscurity.

Correct : A. True

58. The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.

Correct : C. Steganography

59. Which of the following is not a steganography tool?

Correct : B. ReaperExploit

60. Which of the following is not a steganography tool?

Correct : D. Burp Suite

61. The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.

Correct : C. Ordinary file

62. People will normally think it as a normal/regular file and your secret message will pass on without any _______________.

Correct : C. Suspicion

63. By using ______________ you can diminish the chance of data leakage.

Correct : A. Steganography

64. Which mode of operation has the worst “error propagation” among the following?

Correct : A. EC

65. Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?

Correct : C. C CTR

66. Which mode requires the implementation of only the encryption algorithm?

Correct : B. B CTR

67. Which of the following modes of operation does not involve feedback?

Correct : A. OF

68. Which of the following is a natural candidates for stream ciphers?

Correct : A. OF

69. Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?

Correct : D. JUPITER

70. Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm?

Correct : D. MARS

71. How many rounds does the AES-192 perform?

Correct : B. 12

72. What is the expanded key size of AES-192?

Correct : C. 52 words

73. The 4×4 byte matrices in the AES algorithm are called_______.

Correct : D. States

74. In AES the 4×4 bytes matrix key is transformed into a keys of size __________.

Correct : D. 44 words

75. For the AES-128 algorithm there are __________ similar rounds and _________ round is different.

Correct : A. 9 ; the last

76. There is an addition of round key before the start of the AES round algorithms.

Correct : A. True

77. How many computation rounds does the simplified AES consists of?

Correct : C. 2

78. On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?

Correct : B. Swapping of halves

79. What is the block size in the Simplified AES algorithm?

Correct : C. 40 bits

80. What is the key size in the S-AES algorithm?

Correct : C. 16 bits

81. Which of the following is a faulty S-AES step function?

Correct : C. Byte substitution

82. How many step function do Round 1 and 2 each have in S-AES?

Correct : D. 4 and 3

83. The inverse transformation matrix times the forward transformation matrix equals the identity matrix.

Correct : A. True

84. How many round keys are generated in the AES algorithm?

Correct : B. 11

85. DES follows_________.

Correct : B. Feistel Cipher Structure

86. The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.

Correct : A. 16

87. The DES algorithm has a key length of ______.

Correct : C. 64 Bits

88. In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.

Correct : A. 48, 32

89. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________.

Correct : D. Scaling of the existing bits

90. The Initial Permutation table/matrix is of size _____.

Correct : B. 8×8

91. The number of unique substitution boxes in DES after the 48 bit XOR operation are___.

Correct : B. 8

92. What is the number of possible 3 x 3 affine cipher transformations?

Correct : C. 1344

93. The S-Box is used to provide confusion, as it is dependent on the unknown key.

Correct : A. True

94. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.

Correct : B. 11

95. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text.

Correct : D. 88

96. In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user?

Correct : D. 3031

97. Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153).

Correct : B. 19367

98. RSA is also a stream cipher like Merkel-Hellman.

Correct : A. True

99. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

Correct : B. p and q should be prime

100. In RSA, Ф(n) = _______ in terms of p and q.

Correct : B. (p-1)(q-1)