A) a) Plain text B) d) Decrypted text C) c) Encrypted text D) b) Parallel text
A) b) Procedure B) c) Cipher C) a) Algorithm D) d) Module
A) c) Validation B) b) Identification C) d) Access control D) a) Authentication
A) c) Functional authorization B) b) Functional authentication C) a) General access D) d) Auto verification
A) b) Identification B) a) Authentication C) c) Validation D) d) Verification
A) b) Password B) c) OTP C) a) UserID D) d) fingerprint
A) d) Lock B) b) Authentication C) a) Identification D) c) Access control
A) a) Artificial Intelligence B) c) Network Security C) d) IT D) b) ML
A) b) A collection of unrelated computers B) a) A network of interconnected local area networks C) c) Interconnection of wide area networks D) d) A single network
A) a) Exchange of Packets/Data B) b) Transmission link C) d) Routing of data D) c) Data Assembly
A) c) A type of software used to create documents and presentations B) d) The physical casing that protects a computer’s internal components C) a) A device used to display information on a computer screen D) b) A collection of interconnected computers and devices that can communicate and share resources
A) b) virtual private network B) a) wide area network C) d) personal area network D) c) local area network
A) b) the computer that terminates the data B) a) the computer that routes the data C) c) the computer that originates the data D) d) all of the mentioned
A) d) inter-networking B) c) routing C) a) congestion control D) b) error control
A) c) open system interconnection B) b) open service Internet C) a) optical service implementation D) d) operating system interface
A) b) 5 B) a) 7 C) c) 4 D) d) 6
A) a) firewall B) b) bridge C) c) hub D) d) router
A) d) physical layer B) b) application layer C) c) network layer D) a) transport layer
A) d) Servers B) b) PC C) c) Smartphones D) a) Switch
A) b) ARPANET B) c) CNNET C) d) NSFNET D) a) ASAPNET
A) d) internet protocol B) c) ethernet C) b) file transfer protocol D) a) hypertext transfer protocol
A) d) Print server B) c) Communication server C) b) Network D) a) File server
A) a) physical layer B) b) presentation layer C) c) session layer D) d) application layer
A) d) Buffer overflow detection B) b) Intrusion detection C) c) Virus scanner D) a) firewall
A) d) Buffer overflow detection B) b) Intrusion detection C) c) Virus scanner D) a) firewall
A) d) reliability B) b) integrity C) a) confidentiality D) c) availability
A) c) Sometimes the best security is to make sure you are not the easiest target for an attacker. B) a) The goal is usually to make the system as secure as possible. C) d) To evaluate what level of security is necessary/appropriate. D) b) To make the system as secure as possible within certain constraints.
A) b) Cost of damages from an attack vs. cost of defending against the attack B) d) All that mentioned. C) a) Cost of mounting a particular attack vs. value of attack to an adversary D) c) Likelihood of a particular attack
A) d) All that mentioned. B) b) Security is not a “magic bullet” C) c) Security is a process, not a product D) a) Security of a system is only as good as the security at its weakest point…
A) a) Workload security B) c) Firewalls C) d) Access control D) b) Network security
A) a) Workload security B) d) Access control C) c) Firewalls D) b) Network security
A) a) Data loss prevention B) b) Email-security C) c) Industrial network security D) d) Mobile device security
A) a) Data loss prevention B) c) Industrial network security C) d) Mobile device security D) b) Email-security
A) d) Mobile device security B) b) Email-security C) a) Data loss prevention D) c) Industrial network security
A) d) Security information and event management B) a) Data loss prevention C) b) Email-security D) c) Industrial network security
A) d) Mobile device security B) c) Industrial network security C) a) Web security D) b) Email-security
A) a) Enciphering B) c) Security C) b) Cryptography D) d) Authentication
A) b) Ciphertext B) c) Information C) d) Decryption D) a) Plaintext
A) d) Decryption B) c) Information C) b) Ciphertext D) a) Plaintext
A) a) Confidentiality B) c) Non-repudiation C) b) Integrity D) d) Authentication
A) b) Integrity B) d) Authentication C) a) Confidentiality D) c) Non-repudiation
A) b) Integrity B) a) Confidentiality C) c) Non-repudiation D) d) Authentication
A) d) Cryptons B) b) Cryptology C) a) Cryptosystems D) c) Cryptanalysis
A) d) Authentication Key B) a) asymmetric-key encryption algorithm C) c) private key D) b) symmetric-key encryption algorithm
A) b) symmetric-key encryption algorithm B) d) Authentication Key C) a) asymmetric-key encryption algorithm D) c) public key
A) d) encipher B) b) Decryption C) a) Encryption D) c) Translation
A) d) 1950s B) b) 1980s C) a) 1970s D) c) 1960s
A) c) kept secret from the attacker. B) b) completely randomized. C) a) shared to both of them. D) d) All that mentioned.
A) d) Fault tolerance B) b) Data exchange C) a) Canonical application D) c) Translation
A) c) Insider attacks B) d) Not mentioned C) a) Reverse engineering D) b) Social engineering
A) a) Reverse engineering B) b) Social engineering C) c) Insider attacks D) d) Not mentioned
A) d) Not mentioned B) a) Reverse engineering C) c) Insider attacks D) b) Social engineering
A) a) Reverse engineering B) c) Insider attacks C) d) Not mentioned D) b) Social engineering
A) b) Vulnerability assessment B) d) Security research C) c) Ethical hacking D) a) Malware Analysis
A) d) Security research B) a) Malware Analysis C) b) Vulnerability assessment D) c) Ethical hacking
A) b) Vulnerability assessment B) a) Malware Analysis C) d) Security research D) c) Ethical hacking
A) a) Malware Analysis B) d) Security research C) b) Vulnerability assessment D) c) Ethical hacking
A) b) Using reverse engineering techniques for malicious purposes, such as developing malware or exploiting vulnerabilities for illicit gain. B) d) All that mentioned. C) a) Violating intellectual property rights by illegally copying or distributing proprietary software or technology. D) c) Breaching confidentiality or privacy laws by accessing or reverse engineering protected information without authorization.
A) c) Security B) d) Cyber security C) b) Decryption algorithm D) a) Encryption algorithm
A) d) Cyber security B) a) Encryption algorithm C) c) Security D) b) Decryption algorithm
A) c) Chosen-plaintext attacks. B) a) Multiple messages or a single message. C) d) All that mentioned. D) b) Passive/active adversary.
A) b) encrypted message B) c) both algorithm for performing encryption and decryption and encrypted message C) a) algorithm for performing encryption and decryption D) d) decrypted message
A) d) all the connected devices to the network B) c) sender and receiver C) b) receiver D) a) sender
A) c) electronic code book algorithm B) b) diffie-hellman algorithm C) d) dsa algorithm D) a) rsa algorithm
A) b) substitution ciphers B) a) transpositional ciphers C) c) both transpositional ciphers and substitution ciphers D) d) quadratic ciphers
A) a) block cipher B) c) bit cipher C) b) stream cipher D) d) byte cipher
A) b) to increase the speed B) c) to encrypt the data C) a) to find some insecurity in a cryptographic scheme
A) c) explicit congestion notification (ECN) B) b) transport layer security (TLS) C) a) stream control transmission protocol (SCTP) D) d) resource reservation protocol
A) d) b5/8 cipher B) c) b5/6 cipher C) a) A5/2 cipher D) b) b5/4 cipher
A) c) not an encryption algorithm B) a) symmetric key encryption algorithm C) b) asymmetric key encryption algorithm
A) a) fixed size bit string B) d) variable sized byte string C) b) variable size bit string D) c) both fixed size bit string and variable size bit string
A) c) inverse function B) d) surjective function C) a) boolean algebra D) b) bijective function
A) b) combination B) d) series C) c) sequence D) a) permutation
A) d) Advanced cryptology B) c) AES encryption C) b) RSA encryption D) a) Block cipher
A) b) Asymmetric ciphers B) c) RSA encryption C) d) Alpha-numeric cryptography D) a) Symmetric ciphers
A) Authentication B) Privacy C) None of the mentioned D) Privacy & Authentication
A) Ciphertext B) Plaintext & Ciphertext C) None of the mentioned D) Plaintext
A) One-time pad B) Unconditionally secure C) None of the mentioned D) One-time pad & Unconditionally secure
A) Can be either necessary or not B) Feedback is necessary C) Feedback is not necessary D) None of the mentioned
A) None of the mentioned B) Feedback C) Priming key & Feedback D) Priming key
A) Posteriori probability is equal to priori probability B) Posteriori probability is greater than priori probability C) Posteriori probability is less than priori probability D) None of the mentioned
A) Only one key transforming message should exist B) None of the mentioned C) All keys should be equally likely D) One key transforming message to each cipher text & all keys should be equally likely
A) Greater, greater B) Greater, lesser C) Lesser, lesser D) Lesser, greater
A) None of the mentioned B) Conditional probability of X given Y C) Conditional probability of Y given X D) Joint probability of X and Y
A) Optimum rate B) True rate C) None of the mentioned D) Absolute rate
A) Infinity B) Unity C) Zero D) None of the mentioned
A) None of the mentioned B) When unique solution is not available C) All of the mentioned D) When unique solution is available
A) Caesar & Trithemius cipher B) None of the mentioned C) Caesar cipher D) Trithemius cipher
A) True B) False
A) 48 bit B) 32 bit C) 64 bit D) 128 bit
A) 16 B) 6 C) 8 D) 4
A) Random key B) All of the mentioned C) Can be used only once D) Unconditional security
A) Finite & Infinite number of messages B) None of the mentioned C) Infinite number of messages D) Finite number of messages
A) ANDing B) Modulo 2 addition C) ORing D) Addition
A) Self synchronous encryption method B) Synchronous encryption method C) None of the mentioned D) All of the mentioned
A) Self synchronous encryption method B) All of the mentioned C) None of the mentioned D) Synchronous encryption method
A) None of the mentioned B) One after the other C) All of the mentioned D) Simultaneously
A) Synchronously & Asynchronously B) None of the mentioned C) Synchronously D) Asynchronously
A) All of the mentioned B) ) Refraction C) Atmospheric reflections D) Reflections from buildings
A) Above noise level B) Below noise level C) None of the mentioned D) All of the mentioned |