1. When you use the word ______it means you are protecting your data from getting disclosed.
Correct : A. confidentiality
2. _______ means the protection of data from modification by unknown users.
Correct : B. integrity
3. _______ of information means, only authorized users are capable of accessing the information.
Correct : D. availability
4. This helps in identifying the origin of information and authentic user. This referred to here as __________
Correct : C. authenticity
5. Data ___________ is used to ensure confidentiality.
Correct : A. encryption
6. What does OSI stand for in the OSI Security Architecure?
Correct : B. open systems interconnections
7. A company requires its users to change passwords every month. This improves the ________ of the network.
Correct : C. security
8. Release of message contents and Traffic analysis are two types of _________ attacks.
Correct : C. passive attack
9. The ________ is encrypted text.
Correct : B. cipher text
10. What type of attack uses a fraudulent server with a relay address?
Correct : B. mitm
11. Which of the following Algorithms not belong to symmetric encryption
Correct : B. rsa
12. Which is the largest disadvantage of the symmetric Encryption?
Correct : B. problem of the secure transmission of the secret key.
13. In cryptography, what is cipher?
Correct : A. algorithm for performing encryption and decryption
14. In asymmetric key cryptography, the private key is kept by __________
Correct : B. receiver
15. Which one of the following algorithm is not used in asymmetric-key cryptography?
Correct : C. electronic code book algorithm
16. In cryptography, the order of the letters in a message is rearranged by __________
Correct : A. transpositional ciphers
17. What is data encryption standard (DES)?
Correct : A. block cipher
18. A asymmetric-key (or public key ) cipher uses
Correct : B. 2 key
19. In asymmetric key cryptography, the two keys e and d, have special relationship to
Correct : D. each other
20. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
Correct : D. cryptography
21. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
Correct : B. cryptography
22. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
Correct : A. secret key
23. Conventional cryptography is also known as _____________ or symmetric-key encryption.
Correct : A. secret-key
24. The procedure to add bits to the last block is termed as _________________
Correct : D. padding
25. How many rounds does the AES-192 perform?
Correct : B. 12
26. ECC encryption system is __________
Correct : B. asymmetric key encryption algorithm
27. ________function creates a message digest out of a message.
Correct : C. hash
28. Extensions to the X.509 certificates were added in version ____
Correct : C. 3
29. A digital signature needs ____ system
Correct : B. asymmetric-key
30. “Elliptic curve cryptography follows the associative property.”
Correct : A. true
31. ECC stands for
Correct : A. elliptic curve cryptography
32. When a hash function is used to provide message authentication, the hash function value is referred to as
Correct : D. message leap
33. Message authentication code is also known as
Correct : C. keyed hash function
34. The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.
Correct : B. false
35. The DSS signature uses which hash algorithm?
Correct : C. sha-1
36. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
Correct : C. 36 bytes
37. In the handshake protocol which is the message type first sent between client and server ?
Correct : B. client_hello
38. One commonly used public-key cryptography method is the ______ algorithm.
Correct : C. rsa
39. he ________ method provides a one-time session key for two parties.
Correct : A. diffie-hellman
40. The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
Correct : A. man-in-the-middle
41. 1. VPN is abbreviated as __________
Correct : C. virtual private network
42. __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.
Correct : D. virtual private network
43. Which of the statements are not true to classify VPN systems?
Correct : C. securing the network from bots and malwares
44. What types of protocols are used in VPNs?
Correct : A. application level protocols
45. VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
Correct : A. true
46. There are _________ types of VPNs.
Correct : B. 2
47. _________ type of VPNs are used for home private and secure connectivity.
Correct : A. remote access vpns
48. Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
Correct : B. site-to-site vpns
49. Site-to-Site VPN architecture is also known as _________
Correct : C. extranet based vpn
50. There are ________ types of VPN protocols.
Correct : D. 6
51. In tunnel mode, IPSec protects the ______
Correct : A. entire ip packet
52. Pretty good privacy (PGP) is used in ______
Correct : B. email security
53. PGP encrypts data by using a block cipher called ______
Correct : A. international data encryption algorithm
54. IKE creates SAs for _____.
Correct : C. ipsec
55. SSL provides _________.
Correct : D. all of the above
56. IKE uses _______
Correct : D. all of the above
57. In ______, there is a single path from the fully trusted authority to any certificate.
Correct : A. x509
58. _______ uses the idea of certificate trust levels.
Correct : B. pgp
59. ________ provides privacy, integrity, and authentication in e-mail.
Correct : C. pgp
60. In _____, there can be multiple paths from fully or partially trusted authorities.
Correct : B. pgp
61. ______ provides authentication at the IP level.
Correct : A. ah
62. In _______, the cryptographic algorithms and secrets are sent with the message.
Correct : D. pgp
63. ______ was invented by Phil Zimmerman.
Correct : C. pgp
64. ISAKMP stands for ______
Correct : B. internet security association and key management protocol
65. PGP makes use of which cryptographic algorithm?
Correct : C. rsa
66. What is the key size allowed in PGP?
Correct : C. 1024-4096
67. In SSL, what is used for authenticating a message?
Correct : B. mac (message authentication code)
68. S/MIME is abbreviated as __________________
Correct : D. secure/multipurpose internet mail extensions
69. Security Measures Needed to protect ________ during their transmission
Correct : B. data
70. __________ means knowledge obtained from investigation, study , intelligence new ,facts .
Correct : C. information
71. Prevention of the unauthorised used of Resources refers too?
Correct : C. acess control
72. Protection against Denial by one of these parties in a communication refers to?
Correct : A. non-repudiation
73. Which One of them is Passive attack?
Correct : D. obtain message contain
74. What is lying of IP address called as?
Correct : A. ip spoofing
75. What is full form of DDoS?
Correct : B. distributed denial of service
76. A hacker guessing suggested password to a program is call as?
Correct : C. default password attack
77. Symmetric key encryption is also called as?
Correct : B. private key encryption
78. Conversion of Cypher text to plain text?
Correct : B. decryption
79. __is used to create the organisation's overall security program.
Correct : A. program policy
80. An act of protecting information from unauthorised disclouser to an entity.-
Correct : C. confidentiality
81. A way to ensure that the entity is indeed what it claims to be.-
Correct : A. authentication
82. The__model is 7 layer architecture where each layer is having some specific functionality to perform.
Correct : B. osi
83. The full form of OSI is OSI model__.
Correct : A. open systems interconnection
84. The technique in which when one character is replaced by another Character is called as?
Correct : B. substitution
85. Conversion of plain text into Cipher text is called as________.
Correct : A. encryption
86. In Symmetric schemes requires both parties to share how many secret key?
Correct : A. one
87. Blum Blum Shub Generator is based on which Algorithm?
Correct : B. public key
88. In DES step both LPT and RPT undergoes in how much key Rounds?
Correct : B. 16
89. What is the 4th step in DES Algorithm?
Correct : C. p-box permutation
90. In AES in which Round Subkeys are Generated from Original key for each round?
Correct : A. key expansion
91. AES stands for?
Correct : B. advance encryption standard
92. Which of them is type of Cipher?
Correct : C. both of them
93. The message which is not understandable is called as?
Correct : A. cipher text
94. The__is a polygraphic substitution cipher based on linear algebra.
Correct : A. hill cipher
95. __is the practice of concealing a message within another message,image or file.
Correct : A. steganography
96. In asymmetric key cryptography, the private key is kept by __________
Correct : B. receiver
97. In cryptography the original message before being transform is called
Correct : B. plain text
98. An asymmetric-key (or public-key) cipher uses
Correct : A. 1 key
99. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
Correct : C. long
100. In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to