A) c) Encrypted text B) d) Decrypted text C) a) Plain text D) b) Parallel text
A) b) Procedure B) c) Cipher C) d) Module D) a) Algorithm
A) a) Authentication B) b) Identification C) d) Access control D) c) Validation
A) d) Auto verification B) c) Functional authorization C) b) Functional authentication D) a) General access
A) b) Identification B) c) Validation C) d) Verification D) a) Authentication
A) a) UserID B) d) fingerprint C) c) OTP D) b) Password
A) a) Identification B) d) Lock C) b) Authentication D) c) Access control
A) a) Artificial Intelligence B) d) IT C) c) Network Security D) b) ML
A) c) Interconnection of wide area networks B) b) A collection of unrelated computers C) d) A single network D) a) A network of interconnected local area networks
A) b) Transmission link B) d) Routing of data C) c) Data Assembly D) a) Exchange of Packets/Data
A) d) The physical casing that protects a computer’s internal components B) c) A type of software used to create documents and presentations C) a) A device used to display information on a computer screen D) b) A collection of interconnected computers and devices that can communicate and share resources
A) d) personal area network B) a) wide area network C) b) virtual private network D) c) local area network
A) b) the computer that terminates the data B) d) all of the mentioned C) a) the computer that routes the data D) c) the computer that originates the data
A) a) congestion control B) b) error control C) d) inter-networking D) c) routing
A) d) operating system interface B) a) optical service implementation C) c) open system interconnection D) b) open service Internet
A) d) 6 B) b) 5 C) a) 7 D) c) 4
A) d) router B) c) hub C) b) bridge D) a) firewall
A) b) application layer B) c) network layer C) d) physical layer D) a) transport layer
A) b) PC B) d) Servers C) a) Switch D) c) Smartphones
A) b) ARPANET B) a) ASAPNET C) c) CNNET D) d) NSFNET
A) a) hypertext transfer protocol B) d) internet protocol C) c) ethernet D) b) file transfer protocol
A) d) Print server B) b) Network C) a) File server D) c) Communication server
A) b) presentation layer B) d) application layer C) a) physical layer D) c) session layer
A) b) Intrusion detection B) c) Virus scanner C) d) Buffer overflow detection D) a) firewall
A) a) firewall B) d) Buffer overflow detection C) b) Intrusion detection D) c) Virus scanner
A) a) confidentiality B) b) integrity C) c) availability D) d) reliability
A) a) The goal is usually to make the system as secure as possible. B) d) To evaluate what level of security is necessary/appropriate. C) c) Sometimes the best security is to make sure you are not the easiest target for an attacker. D) b) To make the system as secure as possible within certain constraints.
A) d) All that mentioned. B) b) Cost of damages from an attack vs. cost of defending against the attack C) a) Cost of mounting a particular attack vs. value of attack to an adversary D) c) Likelihood of a particular attack
A) a) Security of a system is only as good as the security at its weakest point… B) c) Security is a process, not a product C) b) Security is not a “magic bullet” D) d) All that mentioned.
A) c) Firewalls B) a) Workload security C) b) Network security D) d) Access control
A) d) Access control B) a) Workload security C) c) Firewalls D) b) Network security
A) d) Mobile device security B) c) Industrial network security C) a) Data loss prevention D) b) Email-security
A) d) Mobile device security B) a) Data loss prevention C) c) Industrial network security D) b) Email-security
A) c) Industrial network security B) b) Email-security C) d) Mobile device security D) a) Data loss prevention
A) b) Email-security B) d) Security information and event management C) a) Data loss prevention D) c) Industrial network security
A) c) Industrial network security B) a) Web security C) b) Email-security D) d) Mobile device security
A) c) Security B) b) Cryptography C) d) Authentication D) a) Enciphering
A) b) Ciphertext B) a) Plaintext C) d) Decryption D) c) Information
A) d) Decryption B) a) Plaintext C) c) Information D) b) Ciphertext
A) d) Authentication B) b) Integrity C) a) Confidentiality D) c) Non-repudiation
A) b) Integrity B) c) Non-repudiation C) a) Confidentiality D) d) Authentication
A) d) Authentication B) b) Integrity C) a) Confidentiality D) c) Non-repudiation
A) a) Cryptosystems B) c) Cryptanalysis C) d) Cryptons D) b) Cryptology
A) b) symmetric-key encryption algorithm B) a) asymmetric-key encryption algorithm C) c) private key D) d) Authentication Key
A) c) public key B) b) symmetric-key encryption algorithm C) a) asymmetric-key encryption algorithm D) d) Authentication Key
A) d) encipher B) b) Decryption C) a) Encryption D) c) Translation
A) b) 1980s B) a) 1970s C) d) 1950s D) c) 1960s
A) a) shared to both of them. B) c) kept secret from the attacker. C) d) All that mentioned. D) b) completely randomized.
A) a) Canonical application B) c) Translation C) d) Fault tolerance D) b) Data exchange
A) b) Social engineering B) c) Insider attacks C) d) Not mentioned D) a) Reverse engineering
A) b) Social engineering B) d) Not mentioned C) a) Reverse engineering D) c) Insider attacks
A) d) Not mentioned B) c) Insider attacks C) b) Social engineering D) a) Reverse engineering
A) d) Not mentioned B) c) Insider attacks C) b) Social engineering D) a) Reverse engineering
A) b) Vulnerability assessment B) a) Malware Analysis C) c) Ethical hacking D) d) Security research
A) b) Vulnerability assessment B) a) Malware Analysis C) c) Ethical hacking D) d) Security research
A) a) Malware Analysis B) c) Ethical hacking C) d) Security research D) b) Vulnerability assessment
A) c) Ethical hacking B) d) Security research C) a) Malware Analysis D) b) Vulnerability assessment
A) a) Violating intellectual property rights by illegally copying or distributing proprietary software or technology. B) c) Breaching confidentiality or privacy laws by accessing or reverse engineering protected information without authorization. C) b) Using reverse engineering techniques for malicious purposes, such as developing malware or exploiting vulnerabilities for illicit gain. D) d) All that mentioned.
A) b) Decryption algorithm B) a) Encryption algorithm C) c) Security D) d) Cyber security
A) a) Encryption algorithm B) b) Decryption algorithm C) c) Security D) d) Cyber security
A) d) All that mentioned. B) a) Multiple messages or a single message. C) b) Passive/active adversary. D) c) Chosen-plaintext attacks.
A) a) algorithm for performing encryption and decryption B) c) both algorithm for performing encryption and decryption and encrypted message C) d) decrypted message D) b) encrypted message
A) a) sender B) c) sender and receiver C) b) receiver D) d) all the connected devices to the network
A) b) diffie-hellman algorithm B) c) electronic code book algorithm C) d) dsa algorithm D) a) rsa algorithm
A) a) transpositional ciphers B) b) substitution ciphers C) c) both transpositional ciphers and substitution ciphers D) d) quadratic ciphers
A) a) block cipher B) b) stream cipher C) d) byte cipher D) c) bit cipher
A) b) to increase the speed B) a) to find some insecurity in a cryptographic scheme C) c) to encrypt the data
A) b) transport layer security (TLS) B) d) resource reservation protocol C) a) stream control transmission protocol (SCTP) D) c) explicit congestion notification (ECN)
A) b) b5/4 cipher B) c) b5/6 cipher C) d) b5/8 cipher D) a) A5/2 cipher
A) b) asymmetric key encryption algorithm B) a) symmetric key encryption algorithm C) c) not an encryption algorithm
A) a) fixed size bit string B) c) both fixed size bit string and variable size bit string C) b) variable size bit string D) d) variable sized byte string
A) c) inverse function B) b) bijective function C) a) boolean algebra D) d) surjective function
A) d) series B) c) sequence C) a) permutation D) b) combination
A) d) Advanced cryptology B) a) Block cipher C) c) AES encryption D) b) RSA encryption
A) a) Symmetric ciphers B) d) Alpha-numeric cryptography C) c) RSA encryption D) b) Asymmetric ciphers
A) None of the mentioned B) Privacy & Authentication C) Privacy D) Authentication
A) None of the mentioned B) Plaintext C) Plaintext & Ciphertext D) Ciphertext
A) None of the mentioned B) Unconditionally secure C) One-time pad & Unconditionally secure D) One-time pad
A) Can be either necessary or not B) Feedback is necessary C) Feedback is not necessary D) None of the mentioned
A) Priming key & Feedback B) Priming key C) Feedback D) None of the mentioned
A) None of the mentioned B) Posteriori probability is equal to priori probability C) Posteriori probability is less than priori probability D) Posteriori probability is greater than priori probability
A) One key transforming message to each cipher text & all keys should be equally likely B) All keys should be equally likely C) Only one key transforming message should exist D) None of the mentioned
A) Greater, greater B) Greater, lesser C) Lesser, lesser D) Lesser, greater
A) None of the mentioned B) Conditional probability of Y given X C) Conditional probability of X given Y D) Joint probability of X and Y
A) None of the mentioned B) True rate C) Absolute rate D) Optimum rate
A) None of the mentioned B) Unity C) Zero D) Infinity
A) When unique solution is available B) None of the mentioned C) When unique solution is not available D) All of the mentioned
A) Caesar & Trithemius cipher B) None of the mentioned C) Trithemius cipher D) Caesar cipher
A) False B) True
A) 128 bit B) 32 bit C) 64 bit D) 48 bit
A) 16 B) 8 C) 4 D) 6
A) All of the mentioned B) Unconditional security C) Can be used only once D) Random key
A) Infinite number of messages B) Finite number of messages C) None of the mentioned D) Finite & Infinite number of messages
A) Modulo 2 addition B) ORing C) ANDing D) Addition
A) All of the mentioned B) Synchronous encryption method C) None of the mentioned D) Self synchronous encryption method
A) Synchronous encryption method B) None of the mentioned C) All of the mentioned D) Self synchronous encryption method
A) None of the mentioned B) Simultaneously C) One after the other D) All of the mentioned
A) Synchronously B) Synchronously & Asynchronously C) None of the mentioned D) Asynchronously
A) All of the mentioned B) Atmospheric reflections C) ) Refraction D) Reflections from buildings
A) None of the mentioned B) All of the mentioned C) Below noise level D) Above noise level |