A) a) Plain text B) d) Decrypted text C) b) Parallel text D) c) Encrypted text
A) b) Procedure B) d) Module C) a) Algorithm D) c) Cipher
A) d) Access control B) a) Authentication C) c) Validation D) b) Identification
A) c) Functional authorization B) a) General access C) b) Functional authentication D) d) Auto verification
A) b) Identification B) a) Authentication C) c) Validation D) d) Verification
A) b) Password B) d) fingerprint C) c) OTP D) a) UserID
A) b) Authentication B) d) Lock C) a) Identification D) c) Access control
A) b) ML B) c) Network Security C) a) Artificial Intelligence D) d) IT
A) a) A network of interconnected local area networks B) c) Interconnection of wide area networks C) b) A collection of unrelated computers D) d) A single network
A) a) Exchange of Packets/Data B) c) Data Assembly C) b) Transmission link D) d) Routing of data
A) c) A type of software used to create documents and presentations B) d) The physical casing that protects a computer’s internal components C) a) A device used to display information on a computer screen D) b) A collection of interconnected computers and devices that can communicate and share resources
A) a) wide area network B) c) local area network C) b) virtual private network D) d) personal area network
A) c) the computer that originates the data B) d) all of the mentioned C) b) the computer that terminates the data D) a) the computer that routes the data
A) c) routing B) b) error control C) d) inter-networking D) a) congestion control
A) b) open service Internet B) c) open system interconnection C) a) optical service implementation D) d) operating system interface
A) a) 7 B) c) 4 C) d) 6 D) b) 5
A) d) router B) b) bridge C) a) firewall D) c) hub
A) c) network layer B) a) transport layer C) d) physical layer D) b) application layer
A) d) Servers B) c) Smartphones C) a) Switch D) b) PC
A) b) ARPANET B) c) CNNET C) a) ASAPNET D) d) NSFNET
A) d) internet protocol B) c) ethernet C) b) file transfer protocol D) a) hypertext transfer protocol
A) d) Print server B) c) Communication server C) a) File server D) b) Network
A) c) session layer B) b) presentation layer C) d) application layer D) a) physical layer
A) b) Intrusion detection B) a) firewall C) d) Buffer overflow detection D) c) Virus scanner
A) c) Virus scanner B) d) Buffer overflow detection C) b) Intrusion detection D) a) firewall
A) d) reliability B) b) integrity C) a) confidentiality D) c) availability
A) a) The goal is usually to make the system as secure as possible. B) d) To evaluate what level of security is necessary/appropriate. C) b) To make the system as secure as possible within certain constraints. D) c) Sometimes the best security is to make sure you are not the easiest target for an attacker.
A) c) Likelihood of a particular attack B) b) Cost of damages from an attack vs. cost of defending against the attack C) d) All that mentioned. D) a) Cost of mounting a particular attack vs. value of attack to an adversary
A) b) Security is not a “magic bullet” B) d) All that mentioned. C) a) Security of a system is only as good as the security at its weakest point… D) c) Security is a process, not a product
A) c) Firewalls B) d) Access control C) b) Network security D) a) Workload security
A) a) Workload security B) c) Firewalls C) d) Access control D) b) Network security
A) d) Mobile device security B) b) Email-security C) c) Industrial network security D) a) Data loss prevention
A) d) Mobile device security B) b) Email-security C) a) Data loss prevention D) c) Industrial network security
A) c) Industrial network security B) a) Data loss prevention C) d) Mobile device security D) b) Email-security
A) c) Industrial network security B) a) Data loss prevention C) d) Security information and event management D) b) Email-security
A) a) Web security B) c) Industrial network security C) d) Mobile device security D) b) Email-security
A) c) Security B) a) Enciphering C) d) Authentication D) b) Cryptography
A) b) Ciphertext B) a) Plaintext C) c) Information D) d) Decryption
A) a) Plaintext B) c) Information C) b) Ciphertext D) d) Decryption
A) b) Integrity B) d) Authentication C) c) Non-repudiation D) a) Confidentiality
A) b) Integrity B) a) Confidentiality C) c) Non-repudiation D) d) Authentication
A) d) Authentication B) b) Integrity C) a) Confidentiality D) c) Non-repudiation
A) b) Cryptology B) c) Cryptanalysis C) a) Cryptosystems D) d) Cryptons
A) d) Authentication Key B) c) private key C) b) symmetric-key encryption algorithm D) a) asymmetric-key encryption algorithm
A) a) asymmetric-key encryption algorithm B) d) Authentication Key C) c) public key D) b) symmetric-key encryption algorithm
A) c) Translation B) b) Decryption C) a) Encryption D) d) encipher
A) d) 1950s B) c) 1960s C) a) 1970s D) b) 1980s
A) c) kept secret from the attacker. B) d) All that mentioned. C) a) shared to both of them. D) b) completely randomized.
A) a) Canonical application B) c) Translation C) b) Data exchange D) d) Fault tolerance
A) d) Not mentioned B) a) Reverse engineering C) b) Social engineering D) c) Insider attacks
A) b) Social engineering B) d) Not mentioned C) c) Insider attacks D) a) Reverse engineering
A) a) Reverse engineering B) d) Not mentioned C) b) Social engineering D) c) Insider attacks
A) b) Social engineering B) a) Reverse engineering C) c) Insider attacks D) d) Not mentioned
A) c) Ethical hacking B) d) Security research C) a) Malware Analysis D) b) Vulnerability assessment
A) b) Vulnerability assessment B) a) Malware Analysis C) c) Ethical hacking D) d) Security research
A) d) Security research B) c) Ethical hacking C) b) Vulnerability assessment D) a) Malware Analysis
A) b) Vulnerability assessment B) c) Ethical hacking C) a) Malware Analysis D) d) Security research
A) b) Using reverse engineering techniques for malicious purposes, such as developing malware or exploiting vulnerabilities for illicit gain. B) c) Breaching confidentiality or privacy laws by accessing or reverse engineering protected information without authorization. C) d) All that mentioned. D) a) Violating intellectual property rights by illegally copying or distributing proprietary software or technology.
A) b) Decryption algorithm B) c) Security C) d) Cyber security D) a) Encryption algorithm
A) b) Decryption algorithm B) c) Security C) d) Cyber security D) a) Encryption algorithm
A) d) All that mentioned. B) c) Chosen-plaintext attacks. C) b) Passive/active adversary. D) a) Multiple messages or a single message.
A) b) encrypted message B) a) algorithm for performing encryption and decryption C) c) both algorithm for performing encryption and decryption and encrypted message D) d) decrypted message
A) d) all the connected devices to the network B) c) sender and receiver C) b) receiver D) a) sender
A) d) dsa algorithm B) a) rsa algorithm C) b) diffie-hellman algorithm D) c) electronic code book algorithm
A) a) transpositional ciphers B) d) quadratic ciphers C) c) both transpositional ciphers and substitution ciphers D) b) substitution ciphers
A) d) byte cipher B) b) stream cipher C) c) bit cipher D) a) block cipher
A) a) to find some insecurity in a cryptographic scheme B) b) to increase the speed C) c) to encrypt the data
A) d) resource reservation protocol B) a) stream control transmission protocol (SCTP) C) c) explicit congestion notification (ECN) D) b) transport layer security (TLS)
A) a) A5/2 cipher B) b) b5/4 cipher C) c) b5/6 cipher D) d) b5/8 cipher
A) c) not an encryption algorithm B) a) symmetric key encryption algorithm C) b) asymmetric key encryption algorithm
A) b) variable size bit string B) a) fixed size bit string C) d) variable sized byte string D) c) both fixed size bit string and variable size bit string
A) b) bijective function B) d) surjective function C) c) inverse function D) a) boolean algebra
A) c) sequence B) d) series C) b) combination D) a) permutation
A) b) RSA encryption B) c) AES encryption C) d) Advanced cryptology D) a) Block cipher
A) a) Symmetric ciphers B) b) Asymmetric ciphers C) c) RSA encryption D) d) Alpha-numeric cryptography
A) None of the mentioned B) Privacy C) Privacy & Authentication D) Authentication
A) Plaintext B) Ciphertext C) Plaintext & Ciphertext D) None of the mentioned
A) One-time pad B) One-time pad & Unconditionally secure C) Unconditionally secure D) None of the mentioned
A) Can be either necessary or not B) None of the mentioned C) Feedback is necessary D) Feedback is not necessary
A) Priming key & Feedback B) Feedback C) Priming key D) None of the mentioned
A) None of the mentioned B) Posteriori probability is equal to priori probability C) Posteriori probability is less than priori probability D) Posteriori probability is greater than priori probability
A) Only one key transforming message should exist B) All keys should be equally likely C) None of the mentioned D) One key transforming message to each cipher text & all keys should be equally likely
A) Greater, lesser B) Lesser, greater C) Lesser, lesser D) Greater, greater
A) None of the mentioned B) Conditional probability of X given Y C) Conditional probability of Y given X D) Joint probability of X and Y
A) None of the mentioned B) True rate C) Absolute rate D) Optimum rate
A) Unity B) Infinity C) Zero D) None of the mentioned
A) When unique solution is available B) None of the mentioned C) When unique solution is not available D) All of the mentioned
A) Trithemius cipher B) Caesar & Trithemius cipher C) Caesar cipher D) None of the mentioned
A) True B) False
A) 64 bit B) 128 bit C) 48 bit D) 32 bit
A) 8 B) 6 C) 4 D) 16
A) All of the mentioned B) Random key C) Unconditional security D) Can be used only once
A) Finite number of messages B) Infinite number of messages C) None of the mentioned D) Finite & Infinite number of messages
A) Addition B) Modulo 2 addition C) ORing D) ANDing
A) None of the mentioned B) Synchronous encryption method C) Self synchronous encryption method D) All of the mentioned
A) Self synchronous encryption method B) All of the mentioned C) None of the mentioned D) Synchronous encryption method
A) One after the other B) None of the mentioned C) Simultaneously D) All of the mentioned
A) Synchronously & Asynchronously B) None of the mentioned C) Synchronously D) Asynchronously
A) All of the mentioned B) Atmospheric reflections C) Reflections from buildings D) ) Refraction
A) None of the mentioned B) All of the mentioned C) Above noise level D) Below noise level |