Quiznetik

Information Cyber Security (ICS) | Set 2

1. When you use the word ______it means you are protecting your data from getting disclosed.

Correct : A. confidentiality

2. _______ means the protection of data from modification by unknown users.

Correct : B. integrity

3. _______ of information means, only authorized users are capable of accessing the information.

Correct : D. availability

4. This helps in identifying the origin of information and authentic user. This referred to here as __________

Correct : C. authenticity

5. Data ___________ is used to ensure confidentiality.

Correct : A. encryption

6. What does OSI stand for in the OSI Security Architecure?

Correct : B. open systems interconnections

7. A company requires its users to change passwords every month. This improves the ________ of the network.

Correct : C. security

8. Release of message contents and Traffic analysis are two types of _________ attacks.

Correct : C. passive attack

9. The ________ is encrypted text.

Correct : B. cipher text

10. What type of attack uses a fraudulent server with a relay address?

Correct : B. mitm

11. Which of the following Algorithms not belong to symmetric encryption

Correct : B. rsa

12. Which is the largest disadvantage of the symmetric Encryption?

Correct : B. problem of the secure transmission of the secret key.

13. In cryptography, what is cipher?

Correct : A. algorithm for performing encryption and decryption

14. In asymmetric key cryptography, the private key is kept by __________

Correct : B. receiver

15. Which one of the following algorithm is not used in asymmetric-key cryptography?

Correct : C. electronic code book algorithm

16. In cryptography, the order of the letters in a message is rearranged by __________

Correct : A. transpositional ciphers

17. What is data encryption standard (DES)?

Correct : A. block cipher

18. A asymmetric-key (or public key ) cipher uses

Correct : B. 2 key

19. In asymmetric key cryptography, the two keys e and d, have special relationship to

Correct : D. each other

20. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

Correct : D. cryptography

21. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

Correct : B. cryptography

22. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

Correct : A. secret key

23. Conventional cryptography is also known as _____________ or symmetric-key encryption.

Correct : A. secret-key

24. The procedure to add bits to the last block is termed as _________________

Correct : D. padding

25. How many rounds does the AES-192 perform?

Correct : B. 12

26. ECC encryption system is __________

Correct : B. asymmetric key encryption algorithm

27. ________function creates a message digest out of a message.

Correct : C. hash

28. Extensions to the X.509 certificates were added in version ____

Correct : C. 3

29. A digital signature needs ____ system

Correct : B. asymmetric-key

30. “Elliptic curve cryptography follows the associative property.”

Correct : A. true

31. ECC stands for

Correct : A. elliptic curve cryptography

32. When a hash function is used to provide message authentication, the hash function value is referred to as

Correct : D. message leap

33. Message authentication code is also known as

Correct : C. keyed hash function

34. The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.

Correct : B. false

35. The DSS signature uses which hash algorithm?

Correct : C. sha-1

36. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

Correct : C. 36 bytes

37. In the handshake protocol which is the message type first sent between client and server ?

Correct : B. client_hello

38. One commonly used public-key cryptography method is the ______ algorithm.

Correct : C. rsa

39. he ________ method provides a one-time session key for two parties.

Correct : A. diffie-hellman

40. The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.

Correct : A. man-in-the-middle

41. 1. VPN is abbreviated as __________

Correct : C. virtual private network

42. __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

Correct : D. virtual private network

43. Which of the statements are not true to classify VPN systems?

Correct : C. securing the network from bots and malwares

44. What types of protocols are used in VPNs?

Correct : A. application level protocols

45. VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.

Correct : A. true

46. There are _________ types of VPNs.

Correct : B. 2

47. _________ type of VPNs are used for home private and secure connectivity.

Correct : A. remote access vpns

48. Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?

Correct : B. site-to-site vpns

49. Site-to-Site VPN architecture is also known as _________

Correct : C. extranet based vpn

50. There are ________ types of VPN protocols.

Correct : D. 6

51. In tunnel mode, IPSec protects the ______

Correct : A. entire ip packet

52. Pretty good privacy (PGP) is used in ______

Correct : B. email security

53. PGP encrypts data by using a block cipher called ______

Correct : A. international data encryption algorithm

54. IKE creates SAs for _____.

Correct : C. ipsec

55. SSL provides _________.

Correct : D. all of the above

56. IKE uses _______

Correct : D. all of the above

57. In ______, there is a single path from the fully trusted authority to any certificate.

Correct : A. x509

58. _______ uses the idea of certificate trust levels.

Correct : B. pgp

59. ________ provides privacy, integrity, and authentication in e-mail.

Correct : C. pgp

60. In _____, there can be multiple paths from fully or partially trusted authorities.

Correct : B. pgp

61. ______ provides authentication at the IP level.

Correct : A. ah

62. In _______, the cryptographic algorithms and secrets are sent with the message.

Correct : D. pgp

63. ______ was invented by Phil Zimmerman.

Correct : C. pgp

64. ISAKMP stands for ______

Correct : B. internet security association and key management protocol

65. PGP makes use of which cryptographic algorithm?

Correct : C. rsa

66. What is the key size allowed in PGP?

Correct : C. 1024-4096

67. In SSL, what is used for authenticating a message?

Correct : B. mac (message authentication code)

68. S/MIME is abbreviated as __________________

Correct : D. secure/multipurpose internet mail extensions

69. Security Measures Needed to protect ________ during their transmission

Correct : B. data

70. __________ means knowledge obtained from investigation, study , intelligence new ,facts .

Correct : C. information

71. Prevention of the unauthorised used of Resources refers too?

Correct : C. acess control

72. Protection against Denial by one of these parties in a communication refers to?

Correct : A. non-repudiation

73. Which One of them is Passive attack?

Correct : D. obtain message contain

74. What is lying of IP address called as?

Correct : A. ip spoofing

75. What is full form of DDoS?

Correct : B. distributed denial of service

76. A hacker guessing suggested password to a program is call as?

Correct : C. default password attack

77. Symmetric key encryption is also called as?

Correct : B. private key encryption

78. Conversion of Cypher text to plain text?

Correct : B. decryption

79. __is used to create the organisation's overall security program.

Correct : A. program policy

80. An act of protecting information from unauthorised disclouser to an entity.-

Correct : C. confidentiality

81. A way to ensure that the entity is indeed what it claims to be.-

Correct : A. authentication

82. The__model is 7 layer architecture where each layer is having some specific functionality to perform.

Correct : B. osi

83. The full form of OSI is OSI model__.

Correct : A. open systems interconnection

84. The technique in which when one character is replaced by another Character is called as?

Correct : B. substitution

85. Conversion of plain text into Cipher text is called as________.

Correct : A. encryption

86. In Symmetric schemes requires both parties to share how many secret key?

Correct : A. one

87. Blum Blum Shub Generator is based on which Algorithm?

Correct : B. public key

88. In DES step both LPT and RPT undergoes in how much key Rounds?

Correct : B. 16

89. What is the 4th step in DES Algorithm?

Correct : C. p-box permutation

90. In AES in which Round Subkeys are Generated from Original key for each round?

Correct : A. key expansion

91. AES stands for?

Correct : B. advance encryption standard

92. Which of them is type of Cipher?

Correct : C. both of them

93. The message which is not understandable is called as?

Correct : A. cipher text

94. The__is a polygraphic substitution cipher based on linear algebra.

Correct : A. hill cipher

95. __is the practice of concealing a message within another message,image or file.

Correct : A. steganography

96. In asymmetric key cryptography, the private key is kept by __________

Correct : B. receiver

97. In cryptography the original message before being transform is called

Correct : B. plain text

98. An asymmetric-key (or public-key) cipher uses

Correct : A. 1 key

99. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

Correct : C. long

100. In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

Correct : D. each other