A) c) Encrypted text B) d) Decrypted text C) a) Plain text D) b) Parallel text
A) b) Procedure B) d) Module C) c) Cipher D) a) Algorithm
A) a) Authentication B) b) Identification C) d) Access control D) c) Validation
A) c) Functional authorization B) a) General access C) d) Auto verification D) b) Functional authentication
A) c) Validation B) b) Identification C) a) Authentication D) d) Verification
A) c) OTP B) b) Password C) a) UserID D) d) fingerprint
A) c) Access control B) a) Identification C) d) Lock D) b) Authentication
A) d) IT B) a) Artificial Intelligence C) c) Network Security D) b) ML
A) d) A single network B) a) A network of interconnected local area networks C) b) A collection of unrelated computers D) c) Interconnection of wide area networks
A) b) Transmission link B) a) Exchange of Packets/Data C) c) Data Assembly D) d) Routing of data
A) b) A collection of interconnected computers and devices that can communicate and share resources B) c) A type of software used to create documents and presentations C) a) A device used to display information on a computer screen D) d) The physical casing that protects a computer’s internal components
A) c) local area network B) a) wide area network C) b) virtual private network D) d) personal area network
A) d) all of the mentioned B) a) the computer that routes the data C) b) the computer that terminates the data D) c) the computer that originates the data
A) d) inter-networking B) b) error control C) a) congestion control D) c) routing
A) a) optical service implementation B) c) open system interconnection C) d) operating system interface D) b) open service Internet
A) c) 4 B) a) 7 C) d) 6 D) b) 5
A) d) router B) a) firewall C) c) hub D) b) bridge
A) b) application layer B) c) network layer C) d) physical layer D) a) transport layer
A) a) Switch B) c) Smartphones C) b) PC D) d) Servers
A) c) CNNET B) a) ASAPNET C) d) NSFNET D) b) ARPANET
A) b) file transfer protocol B) a) hypertext transfer protocol C) d) internet protocol D) c) ethernet
A) b) Network B) c) Communication server C) a) File server D) d) Print server
A) b) presentation layer B) d) application layer C) a) physical layer D) c) session layer
A) a) firewall B) b) Intrusion detection C) c) Virus scanner D) d) Buffer overflow detection
A) b) Intrusion detection B) c) Virus scanner C) d) Buffer overflow detection D) a) firewall
A) b) integrity B) c) availability C) a) confidentiality D) d) reliability
A) d) To evaluate what level of security is necessary/appropriate. B) c) Sometimes the best security is to make sure you are not the easiest target for an attacker. C) a) The goal is usually to make the system as secure as possible. D) b) To make the system as secure as possible within certain constraints.
A) d) All that mentioned. B) b) Cost of damages from an attack vs. cost of defending against the attack C) c) Likelihood of a particular attack D) a) Cost of mounting a particular attack vs. value of attack to an adversary
A) a) Security of a system is only as good as the security at its weakest point… B) c) Security is a process, not a product C) d) All that mentioned. D) b) Security is not a “magic bullet”
A) c) Firewalls B) a) Workload security C) b) Network security D) d) Access control
A) b) Network security B) c) Firewalls C) a) Workload security D) d) Access control
A) b) Email-security B) d) Mobile device security C) c) Industrial network security D) a) Data loss prevention
A) d) Mobile device security B) c) Industrial network security C) b) Email-security D) a) Data loss prevention
A) a) Data loss prevention B) c) Industrial network security C) b) Email-security D) d) Mobile device security
A) c) Industrial network security B) b) Email-security C) d) Security information and event management D) a) Data loss prevention
A) d) Mobile device security B) a) Web security C) b) Email-security D) c) Industrial network security
A) d) Authentication B) a) Enciphering C) b) Cryptography D) c) Security
A) b) Ciphertext B) c) Information C) a) Plaintext D) d) Decryption
A) b) Ciphertext B) c) Information C) d) Decryption D) a) Plaintext
A) b) Integrity B) a) Confidentiality C) c) Non-repudiation D) d) Authentication
A) c) Non-repudiation B) d) Authentication C) b) Integrity D) a) Confidentiality
A) b) Integrity B) a) Confidentiality C) c) Non-repudiation D) d) Authentication
A) a) Cryptosystems B) c) Cryptanalysis C) b) Cryptology D) d) Cryptons
A) b) symmetric-key encryption algorithm B) a) asymmetric-key encryption algorithm C) c) private key D) d) Authentication Key
A) c) public key B) a) asymmetric-key encryption algorithm C) b) symmetric-key encryption algorithm D) d) Authentication Key
A) b) Decryption B) a) Encryption C) c) Translation D) d) encipher
A) c) 1960s B) b) 1980s C) d) 1950s D) a) 1970s
A) d) All that mentioned. B) c) kept secret from the attacker. C) a) shared to both of them. D) b) completely randomized.
A) b) Data exchange B) a) Canonical application C) c) Translation D) d) Fault tolerance
A) d) Not mentioned B) a) Reverse engineering C) b) Social engineering D) c) Insider attacks
A) c) Insider attacks B) a) Reverse engineering C) d) Not mentioned D) b) Social engineering
A) c) Insider attacks B) d) Not mentioned C) a) Reverse engineering D) b) Social engineering
A) b) Social engineering B) c) Insider attacks C) a) Reverse engineering D) d) Not mentioned
A) b) Vulnerability assessment B) c) Ethical hacking C) a) Malware Analysis D) d) Security research
A) d) Security research B) a) Malware Analysis C) b) Vulnerability assessment D) c) Ethical hacking
A) b) Vulnerability assessment B) a) Malware Analysis C) d) Security research D) c) Ethical hacking
A) c) Ethical hacking B) d) Security research C) b) Vulnerability assessment D) a) Malware Analysis
A) a) Violating intellectual property rights by illegally copying or distributing proprietary software or technology. B) c) Breaching confidentiality or privacy laws by accessing or reverse engineering protected information without authorization. C) b) Using reverse engineering techniques for malicious purposes, such as developing malware or exploiting vulnerabilities for illicit gain. D) d) All that mentioned.
A) a) Encryption algorithm B) b) Decryption algorithm C) c) Security D) d) Cyber security
A) a) Encryption algorithm B) b) Decryption algorithm C) c) Security D) d) Cyber security
A) a) Multiple messages or a single message. B) c) Chosen-plaintext attacks. C) b) Passive/active adversary. D) d) All that mentioned.
A) b) encrypted message B) c) both algorithm for performing encryption and decryption and encrypted message C) d) decrypted message D) a) algorithm for performing encryption and decryption
A) a) sender B) d) all the connected devices to the network C) c) sender and receiver D) b) receiver
A) b) diffie-hellman algorithm B) a) rsa algorithm C) c) electronic code book algorithm D) d) dsa algorithm
A) d) quadratic ciphers B) c) both transpositional ciphers and substitution ciphers C) a) transpositional ciphers D) b) substitution ciphers
A) c) bit cipher B) a) block cipher C) d) byte cipher D) b) stream cipher
A) b) to increase the speed B) c) to encrypt the data C) a) to find some insecurity in a cryptographic scheme
A) b) transport layer security (TLS) B) a) stream control transmission protocol (SCTP) C) c) explicit congestion notification (ECN) D) d) resource reservation protocol
A) c) b5/6 cipher B) a) A5/2 cipher C) b) b5/4 cipher D) d) b5/8 cipher
A) b) asymmetric key encryption algorithm B) c) not an encryption algorithm C) a) symmetric key encryption algorithm
A) a) fixed size bit string B) b) variable size bit string C) c) both fixed size bit string and variable size bit string D) d) variable sized byte string
A) d) surjective function B) b) bijective function C) c) inverse function D) a) boolean algebra
A) c) sequence B) d) series C) b) combination D) a) permutation
A) c) AES encryption B) d) Advanced cryptology C) b) RSA encryption D) a) Block cipher
A) b) Asymmetric ciphers B) c) RSA encryption C) d) Alpha-numeric cryptography D) a) Symmetric ciphers
A) None of the mentioned B) Privacy & Authentication C) Privacy D) Authentication
A) Ciphertext B) None of the mentioned C) Plaintext D) Plaintext & Ciphertext
A) None of the mentioned B) One-time pad C) Unconditionally secure D) One-time pad & Unconditionally secure
A) Feedback is necessary B) None of the mentioned C) Can be either necessary or not D) Feedback is not necessary
A) Feedback B) Priming key C) None of the mentioned D) Priming key & Feedback
A) Posteriori probability is less than priori probability B) Posteriori probability is equal to priori probability C) None of the mentioned D) Posteriori probability is greater than priori probability
A) All keys should be equally likely B) One key transforming message to each cipher text & all keys should be equally likely C) Only one key transforming message should exist D) None of the mentioned
A) Lesser, greater B) Lesser, lesser C) Greater, greater D) Greater, lesser
A) None of the mentioned B) Joint probability of X and Y C) Conditional probability of X given Y D) Conditional probability of Y given X
A) True rate B) Absolute rate C) None of the mentioned D) Optimum rate
A) None of the mentioned B) Unity C) Infinity D) Zero
A) When unique solution is not available B) When unique solution is available C) None of the mentioned D) All of the mentioned
A) Caesar cipher B) Caesar & Trithemius cipher C) Trithemius cipher D) None of the mentioned
A) True B) False
A) 64 bit B) 48 bit C) 32 bit D) 128 bit
A) 8 B) 4 C) 6 D) 16
A) Can be used only once B) Random key C) Unconditional security D) All of the mentioned
A) Finite & Infinite number of messages B) None of the mentioned C) Finite number of messages D) Infinite number of messages
A) ANDing B) Addition C) Modulo 2 addition D) ORing
A) None of the mentioned B) Self synchronous encryption method C) Synchronous encryption method D) All of the mentioned
A) Synchronous encryption method B) Self synchronous encryption method C) None of the mentioned D) All of the mentioned
A) None of the mentioned B) One after the other C) Simultaneously D) All of the mentioned
A) Synchronously B) Synchronously & Asynchronously C) None of the mentioned D) Asynchronously
A) Reflections from buildings B) All of the mentioned C) ) Refraction D) Atmospheric reflections
A) None of the mentioned B) Above noise level C) Below noise level D) All of the mentioned |