A) a) Plain text B) c) Encrypted text C) b) Parallel text D) d) Decrypted text
A) a) Algorithm B) d) Module C) b) Procedure D) c) Cipher
A) d) Access control B) a) Authentication C) b) Identification D) c) Validation
A) a) General access B) b) Functional authentication C) d) Auto verification D) c) Functional authorization
A) a) Authentication B) c) Validation C) b) Identification D) d) Verification
A) a) UserID B) c) OTP C) b) Password D) d) fingerprint
A) d) Lock B) a) Identification C) b) Authentication D) c) Access control
A) d) IT B) c) Network Security C) a) Artificial Intelligence D) b) ML
A) b) A collection of unrelated computers B) d) A single network C) a) A network of interconnected local area networks D) c) Interconnection of wide area networks
A) d) Routing of data B) c) Data Assembly C) b) Transmission link D) a) Exchange of Packets/Data
A) d) The physical casing that protects a computer’s internal components B) a) A device used to display information on a computer screen C) c) A type of software used to create documents and presentations D) b) A collection of interconnected computers and devices that can communicate and share resources
A) a) wide area network B) d) personal area network C) c) local area network D) b) virtual private network
A) a) the computer that routes the data B) d) all of the mentioned C) c) the computer that originates the data D) b) the computer that terminates the data
A) a) congestion control B) d) inter-networking C) c) routing D) b) error control
A) a) optical service implementation B) c) open system interconnection C) b) open service Internet D) d) operating system interface
A) a) 7 B) c) 4 C) b) 5 D) d) 6
A) d) router B) a) firewall C) c) hub D) b) bridge
A) c) network layer B) d) physical layer C) b) application layer D) a) transport layer
A) b) PC B) a) Switch C) c) Smartphones D) d) Servers
A) d) NSFNET B) b) ARPANET C) c) CNNET D) a) ASAPNET
A) b) file transfer protocol B) a) hypertext transfer protocol C) d) internet protocol D) c) ethernet
A) b) Network B) d) Print server C) a) File server D) c) Communication server
A) b) presentation layer B) d) application layer C) c) session layer D) a) physical layer
A) b) Intrusion detection B) c) Virus scanner C) d) Buffer overflow detection D) a) firewall
A) a) firewall B) b) Intrusion detection C) d) Buffer overflow detection D) c) Virus scanner
A) a) confidentiality B) d) reliability C) b) integrity D) c) availability
A) c) Sometimes the best security is to make sure you are not the easiest target for an attacker. B) d) To evaluate what level of security is necessary/appropriate. C) b) To make the system as secure as possible within certain constraints. D) a) The goal is usually to make the system as secure as possible.
A) b) Cost of damages from an attack vs. cost of defending against the attack B) a) Cost of mounting a particular attack vs. value of attack to an adversary C) c) Likelihood of a particular attack D) d) All that mentioned.
A) a) Security of a system is only as good as the security at its weakest point… B) c) Security is a process, not a product C) b) Security is not a “magic bullet” D) d) All that mentioned.
A) c) Firewalls B) a) Workload security C) b) Network security D) d) Access control
A) b) Network security B) c) Firewalls C) a) Workload security D) d) Access control
A) a) Data loss prevention B) b) Email-security C) d) Mobile device security D) c) Industrial network security
A) c) Industrial network security B) b) Email-security C) d) Mobile device security D) a) Data loss prevention
A) a) Data loss prevention B) b) Email-security C) c) Industrial network security D) d) Mobile device security
A) b) Email-security B) c) Industrial network security C) d) Security information and event management D) a) Data loss prevention
A) a) Web security B) d) Mobile device security C) b) Email-security D) c) Industrial network security
A) d) Authentication B) b) Cryptography C) a) Enciphering D) c) Security
A) c) Information B) b) Ciphertext C) a) Plaintext D) d) Decryption
A) c) Information B) b) Ciphertext C) d) Decryption D) a) Plaintext
A) a) Confidentiality B) c) Non-repudiation C) d) Authentication D) b) Integrity
A) d) Authentication B) b) Integrity C) a) Confidentiality D) c) Non-repudiation
A) a) Confidentiality B) b) Integrity C) c) Non-repudiation D) d) Authentication
A) a) Cryptosystems B) d) Cryptons C) c) Cryptanalysis D) b) Cryptology
A) c) private key B) a) asymmetric-key encryption algorithm C) d) Authentication Key D) b) symmetric-key encryption algorithm
A) a) asymmetric-key encryption algorithm B) b) symmetric-key encryption algorithm C) c) public key D) d) Authentication Key
A) a) Encryption B) d) encipher C) b) Decryption D) c) Translation
A) d) 1950s B) a) 1970s C) c) 1960s D) b) 1980s
A) a) shared to both of them. B) d) All that mentioned. C) c) kept secret from the attacker. D) b) completely randomized.
A) b) Data exchange B) d) Fault tolerance C) c) Translation D) a) Canonical application
A) c) Insider attacks B) d) Not mentioned C) b) Social engineering D) a) Reverse engineering
A) a) Reverse engineering B) b) Social engineering C) d) Not mentioned D) c) Insider attacks
A) b) Social engineering B) a) Reverse engineering C) c) Insider attacks D) d) Not mentioned
A) d) Not mentioned B) b) Social engineering C) c) Insider attacks D) a) Reverse engineering
A) c) Ethical hacking B) d) Security research C) b) Vulnerability assessment D) a) Malware Analysis
A) a) Malware Analysis B) c) Ethical hacking C) b) Vulnerability assessment D) d) Security research
A) d) Security research B) c) Ethical hacking C) a) Malware Analysis D) b) Vulnerability assessment
A) a) Malware Analysis B) c) Ethical hacking C) d) Security research D) b) Vulnerability assessment
A) b) Using reverse engineering techniques for malicious purposes, such as developing malware or exploiting vulnerabilities for illicit gain. B) a) Violating intellectual property rights by illegally copying or distributing proprietary software or technology. C) c) Breaching confidentiality or privacy laws by accessing or reverse engineering protected information without authorization. D) d) All that mentioned.
A) a) Encryption algorithm B) b) Decryption algorithm C) d) Cyber security D) c) Security
A) a) Encryption algorithm B) b) Decryption algorithm C) d) Cyber security D) c) Security
A) c) Chosen-plaintext attacks. B) d) All that mentioned. C) a) Multiple messages or a single message. D) b) Passive/active adversary.
A) b) encrypted message B) c) both algorithm for performing encryption and decryption and encrypted message C) d) decrypted message D) a) algorithm for performing encryption and decryption
A) b) receiver B) c) sender and receiver C) a) sender D) d) all the connected devices to the network
A) a) rsa algorithm B) d) dsa algorithm C) c) electronic code book algorithm D) b) diffie-hellman algorithm
A) d) quadratic ciphers B) c) both transpositional ciphers and substitution ciphers C) a) transpositional ciphers D) b) substitution ciphers
A) d) byte cipher B) a) block cipher C) c) bit cipher D) b) stream cipher
A) c) to encrypt the data B) b) to increase the speed C) a) to find some insecurity in a cryptographic scheme
A) a) stream control transmission protocol (SCTP) B) b) transport layer security (TLS) C) d) resource reservation protocol D) c) explicit congestion notification (ECN)
A) a) A5/2 cipher B) d) b5/8 cipher C) b) b5/4 cipher D) c) b5/6 cipher
A) c) not an encryption algorithm B) a) symmetric key encryption algorithm C) b) asymmetric key encryption algorithm
A) b) variable size bit string B) a) fixed size bit string C) c) both fixed size bit string and variable size bit string D) d) variable sized byte string
A) a) boolean algebra B) b) bijective function C) d) surjective function D) c) inverse function
A) a) permutation B) c) sequence C) b) combination D) d) series
A) c) AES encryption B) d) Advanced cryptology C) a) Block cipher D) b) RSA encryption
A) d) Alpha-numeric cryptography B) b) Asymmetric ciphers C) a) Symmetric ciphers D) c) RSA encryption
A) Authentication B) None of the mentioned C) Privacy & Authentication D) Privacy
A) Plaintext & Ciphertext B) None of the mentioned C) Ciphertext D) Plaintext
A) None of the mentioned B) One-time pad C) One-time pad & Unconditionally secure D) Unconditionally secure
A) None of the mentioned B) Can be either necessary or not C) Feedback is not necessary D) Feedback is necessary
A) Priming key & Feedback B) Priming key C) None of the mentioned D) Feedback
A) None of the mentioned B) Posteriori probability is greater than priori probability C) Posteriori probability is equal to priori probability D) Posteriori probability is less than priori probability
A) None of the mentioned B) All keys should be equally likely C) One key transforming message to each cipher text & all keys should be equally likely D) Only one key transforming message should exist
A) Lesser, greater B) Lesser, lesser C) Greater, greater D) Greater, lesser
A) Joint probability of X and Y B) Conditional probability of Y given X C) Conditional probability of X given Y D) None of the mentioned
A) Optimum rate B) None of the mentioned C) True rate D) Absolute rate
A) Unity B) Infinity C) Zero D) None of the mentioned
A) When unique solution is available B) None of the mentioned C) When unique solution is not available D) All of the mentioned
A) Trithemius cipher B) Caesar cipher C) Caesar & Trithemius cipher D) None of the mentioned
A) False B) True
A) 128 bit B) 48 bit C) 32 bit D) 64 bit
A) 6 B) 16 C) 4 D) 8
A) Unconditional security B) Random key C) All of the mentioned D) Can be used only once
A) Finite number of messages B) None of the mentioned C) Infinite number of messages D) Finite & Infinite number of messages
A) ORing B) Addition C) ANDing D) Modulo 2 addition
A) None of the mentioned B) Self synchronous encryption method C) All of the mentioned D) Synchronous encryption method
A) Synchronous encryption method B) All of the mentioned C) None of the mentioned D) Self synchronous encryption method
A) One after the other B) All of the mentioned C) Simultaneously D) None of the mentioned
A) Synchronously & Asynchronously B) Asynchronously C) Synchronously D) None of the mentioned
A) Reflections from buildings B) ) Refraction C) All of the mentioned D) Atmospheric reflections
A) None of the mentioned B) Below noise level C) Above noise level D) All of the mentioned |