Quiznetik

Cryptography and Network Security (CNS) | Set 2

1. In Elgamal cryptosystem, given the prime p=31,What is the respective plaintext character for C = (27, 20)?

Correct : A. h

2. How many real and imaginary roots does the equation y2=x3-1 have

Correct : D. 2 imaginary, 1 real

3. “In ECC, the inverse of point P =(x1, y1) is Q = (-x1, y1). “

Correct : B. false

4. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0)?

Correct : A. (15, -56)

5. How many real and imaginary roots does the equation y2=x3-4x have

Correct : B. all real

6. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is 2P if P = (4, 3.464)

Correct : A. (12.022, -39.362)

7. In public key cryptosystem             keys are used for encryption and decryption.

Correct : B. different

8. PGP system uses

Correct : C. private & public key system

9. Knapsack problem can be solved by

Correct : A. public key cryptosystem

10. Merkle hellman is a symmetric cryptosystem.

Correct : B. false

11. In public key cryptosystem which is kept as public?

Correct : A. encryption keys

12. A cryptographic hash function has variable output length.

Correct : B. false

13. In a trapdoor function, the functions are easy to go in

Correct : A. one direction

14. Which algorithm can be used to sign a message?

Correct : A. public key algorithm

15. In this Merkle Hellman method same key is used for encryption and decryption.

Correct : B. false

16. A set of numbers is called as super increasing if

Correct : B. each element greater than sum of all the previous elements

17. There are         major ways of stealing email information.

Correct : B. 3

18. Which of them is not a major way of stealing email information?

Correct : B. reverse engineering

19. is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.

Correct : A. email security

20. is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.

Correct : D. email

21. Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as              details and passwords.

Correct : B. credit card, login id

22. Unsolicited Bulk E-mails (UBI) are called

Correct : C. spam emails

23. Using email hacking illicit hackers can send & spread           virus               and spam emails.

Correct : A. trojans, redirected malicious urls

24. is the technique used for tricking users to disclose their username and passwords through fake pages.

Correct : B. phishing

25. Which of them is an example of grabbing email information?

Correct : A. cookie stealing

26. Which of the following is a non-technical type of intrusion or attack technique?

Correct : C. social engineering

27. If the data stored in the             is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

Correct : C. cookies

28. The stored cookie which contains all your personal data about that website can be stolen away by             using or trojans.

Correct : A. attackers, malware

29. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.

Correct : A. true

30. Which of them is not a proper method for email security?

Correct : D. click on unknown links to explore

31. What are email security services?

Correct : D. all of the above

32. PGP security system uses

Correct : C. public & private key cryptosystem

33. What is the key size allowed in PGP?

Correct : C. 1024-4096

34. Who created PGP?

Correct : A. phil zimmermann

35. What is the PGP stand for?

Correct : C. pretty good privacy

36. PGP makes use of which cryptographic algorithm?

Correct : C. rsa

37. PGP offers        block ciphers for message encryption?

Correct : D. all of the above

38. S/MIME stands for          .

Correct : B. secure multipurpose internet mail extensions.

39. is used for hiding the payment information from the merchant.

Correct : A. set.

40. The cryptography algorithms used in S/MIME are .

Correct : C. rsa,des-3

41. In S/MIME,MLA stands for .

Correct : A. mailing list agent.

42. Which component is included in IP security?

Correct : A. authentication header (ah)

43. WPA2 is used for security in

Correct : C. wi-fi

44. An attempt to make a computer resource unavailable to its intended users is called

Correct : A. denial-of-service attack

45. PGP is used in

Correct : B. email security

46. In tunnel mode, IPSec protects the

Correct : A. entire ip packet

47. IPSec is designed to provide security at the

Correct : B. network layer

48. Which of the following is not a strong security protocol?

Correct : C. smtp

49. SSL primarily focuses on

Correct : A. integrity and authenticity

50. Why did SSL certificate require in HTTP?

Correct : C. for encrypted data sent over http protocol

51. SFTP is abbreviated as

Correct : A. secure file transfer protocol

52. mointors user activity on internet and transmit that information in the background to someone else

Correct : B. spyware

53. Firewall is type of------

Correct : D. none of these

54. The full form of Malware is

Correct : C. malicious software

55. There are types of computer virus.

Correct : C. 10

56. A computer           is a malicious code which self-replicates by copying itself to other programs.

Correct : B. virus

57. Which of them is not an ideal way of spreading the virus?

Correct : C. official antivirus cds

58. is the kind of firewall is connected between the device and the network connecting to internet.

Correct : A. hardware firewall

59. Which of the following is not a software firewall?

Correct : D. linksys firewall

60. Firewall examines each           that are entering or leaving the internal network

Correct : D. data packets

61. A firewall protects which of the following attacks?

Correct : C. denial of service

62. Packet filtering firewalls are deployed on

Correct : A. routers