A) b) Parallel text B) a) Plain text C) d) Decrypted text D) c) Encrypted text
A) c) Cipher B) a) Algorithm C) d) Module D) b) Procedure
A) b) Identification B) c) Validation C) a) Authentication D) d) Access control
A) a) General access B) c) Functional authorization C) d) Auto verification D) b) Functional authentication
A) c) Validation B) b) Identification C) d) Verification D) a) Authentication
A) d) fingerprint B) a) UserID C) c) OTP D) b) Password
A) a) Identification B) d) Lock C) b) Authentication D) c) Access control
A) a) Artificial Intelligence B) d) IT C) c) Network Security D) b) ML
A) b) A collection of unrelated computers B) a) A network of interconnected local area networks C) d) A single network D) c) Interconnection of wide area networks
A) a) Exchange of Packets/Data B) b) Transmission link C) c) Data Assembly D) d) Routing of data
A) a) A device used to display information on a computer screen B) b) A collection of interconnected computers and devices that can communicate and share resources C) c) A type of software used to create documents and presentations D) d) The physical casing that protects a computer’s internal components
A) d) personal area network B) b) virtual private network C) c) local area network D) a) wide area network
A) d) all of the mentioned B) c) the computer that originates the data C) b) the computer that terminates the data D) a) the computer that routes the data
A) a) congestion control B) c) routing C) d) inter-networking D) b) error control
A) a) optical service implementation B) c) open system interconnection C) d) operating system interface D) b) open service Internet
A) c) 4 B) a) 7 C) d) 6 D) b) 5
A) d) router B) b) bridge C) c) hub D) a) firewall
A) a) transport layer B) c) network layer C) d) physical layer D) b) application layer
A) a) Switch B) c) Smartphones C) d) Servers D) b) PC
A) d) NSFNET B) c) CNNET C) b) ARPANET D) a) ASAPNET
A) c) ethernet B) a) hypertext transfer protocol C) d) internet protocol D) b) file transfer protocol
A) c) Communication server B) a) File server C) b) Network D) d) Print server
A) c) session layer B) a) physical layer C) b) presentation layer D) d) application layer
A) d) Buffer overflow detection B) c) Virus scanner C) b) Intrusion detection D) a) firewall
A) c) Virus scanner B) b) Intrusion detection C) a) firewall D) d) Buffer overflow detection
A) d) reliability B) c) availability C) b) integrity D) a) confidentiality
A) c) Sometimes the best security is to make sure you are not the easiest target for an attacker. B) d) To evaluate what level of security is necessary/appropriate. C) a) The goal is usually to make the system as secure as possible. D) b) To make the system as secure as possible within certain constraints.
A) d) All that mentioned. B) a) Cost of mounting a particular attack vs. value of attack to an adversary C) b) Cost of damages from an attack vs. cost of defending against the attack D) c) Likelihood of a particular attack
A) a) Security of a system is only as good as the security at its weakest point… B) b) Security is not a “magic bullet” C) d) All that mentioned. D) c) Security is a process, not a product
A) b) Network security B) d) Access control C) a) Workload security D) c) Firewalls
A) a) Workload security B) c) Firewalls C) d) Access control D) b) Network security
A) b) Email-security B) d) Mobile device security C) a) Data loss prevention D) c) Industrial network security
A) d) Mobile device security B) c) Industrial network security C) a) Data loss prevention D) b) Email-security
A) a) Data loss prevention B) b) Email-security C) c) Industrial network security D) d) Mobile device security
A) b) Email-security B) d) Security information and event management C) c) Industrial network security D) a) Data loss prevention
A) b) Email-security B) c) Industrial network security C) a) Web security D) d) Mobile device security
A) d) Authentication B) c) Security C) b) Cryptography D) a) Enciphering
A) d) Decryption B) c) Information C) a) Plaintext D) b) Ciphertext
A) a) Plaintext B) b) Ciphertext C) c) Information D) d) Decryption
A) b) Integrity B) c) Non-repudiation C) d) Authentication D) a) Confidentiality
A) c) Non-repudiation B) b) Integrity C) a) Confidentiality D) d) Authentication
A) d) Authentication B) a) Confidentiality C) b) Integrity D) c) Non-repudiation
A) c) Cryptanalysis B) b) Cryptology C) d) Cryptons D) a) Cryptosystems
A) c) private key B) b) symmetric-key encryption algorithm C) d) Authentication Key D) a) asymmetric-key encryption algorithm
A) c) public key B) d) Authentication Key C) a) asymmetric-key encryption algorithm D) b) symmetric-key encryption algorithm
A) a) Encryption B) d) encipher C) c) Translation D) b) Decryption
A) b) 1980s B) a) 1970s C) d) 1950s D) c) 1960s
A) b) completely randomized. B) a) shared to both of them. C) c) kept secret from the attacker. D) d) All that mentioned.
A) d) Fault tolerance B) c) Translation C) a) Canonical application D) b) Data exchange
A) b) Social engineering B) c) Insider attacks C) a) Reverse engineering D) d) Not mentioned
A) a) Reverse engineering B) d) Not mentioned C) c) Insider attacks D) b) Social engineering
A) b) Social engineering B) d) Not mentioned C) a) Reverse engineering D) c) Insider attacks
A) b) Social engineering B) d) Not mentioned C) a) Reverse engineering D) c) Insider attacks
A) b) Vulnerability assessment B) a) Malware Analysis C) d) Security research D) c) Ethical hacking
A) a) Malware Analysis B) c) Ethical hacking C) b) Vulnerability assessment D) d) Security research
A) d) Security research B) a) Malware Analysis C) b) Vulnerability assessment D) c) Ethical hacking
A) b) Vulnerability assessment B) a) Malware Analysis C) c) Ethical hacking D) d) Security research
A) b) Using reverse engineering techniques for malicious purposes, such as developing malware or exploiting vulnerabilities for illicit gain. B) d) All that mentioned. C) a) Violating intellectual property rights by illegally copying or distributing proprietary software or technology. D) c) Breaching confidentiality or privacy laws by accessing or reverse engineering protected information without authorization.
A) b) Decryption algorithm B) c) Security C) a) Encryption algorithm D) d) Cyber security
A) d) Cyber security B) c) Security C) b) Decryption algorithm D) a) Encryption algorithm
A) b) Passive/active adversary. B) d) All that mentioned. C) a) Multiple messages or a single message. D) c) Chosen-plaintext attacks.
A) d) decrypted message B) c) both algorithm for performing encryption and decryption and encrypted message C) b) encrypted message D) a) algorithm for performing encryption and decryption
A) c) sender and receiver B) b) receiver C) a) sender D) d) all the connected devices to the network
A) c) electronic code book algorithm B) b) diffie-hellman algorithm C) a) rsa algorithm D) d) dsa algorithm
A) d) quadratic ciphers B) a) transpositional ciphers C) b) substitution ciphers D) c) both transpositional ciphers and substitution ciphers
A) d) byte cipher B) b) stream cipher C) a) block cipher D) c) bit cipher
A) a) to find some insecurity in a cryptographic scheme B) c) to encrypt the data C) b) to increase the speed
A) d) resource reservation protocol B) b) transport layer security (TLS) C) a) stream control transmission protocol (SCTP) D) c) explicit congestion notification (ECN)
A) b) b5/4 cipher B) c) b5/6 cipher C) a) A5/2 cipher D) d) b5/8 cipher
A) b) asymmetric key encryption algorithm B) c) not an encryption algorithm C) a) symmetric key encryption algorithm
A) c) both fixed size bit string and variable size bit string B) a) fixed size bit string C) b) variable size bit string D) d) variable sized byte string
A) b) bijective function B) d) surjective function C) c) inverse function D) a) boolean algebra
A) a) permutation B) d) series C) b) combination D) c) sequence
A) b) RSA encryption B) d) Advanced cryptology C) a) Block cipher D) c) AES encryption
A) c) RSA encryption B) a) Symmetric ciphers C) d) Alpha-numeric cryptography D) b) Asymmetric ciphers
A) Authentication B) Privacy & Authentication C) Privacy D) None of the mentioned
A) None of the mentioned B) Plaintext C) Plaintext & Ciphertext D) Ciphertext
A) Unconditionally secure B) None of the mentioned C) One-time pad D) One-time pad & Unconditionally secure
A) Feedback is not necessary B) None of the mentioned C) Can be either necessary or not D) Feedback is necessary
A) Feedback B) Priming key C) None of the mentioned D) Priming key & Feedback
A) Posteriori probability is equal to priori probability B) Posteriori probability is greater than priori probability C) None of the mentioned D) Posteriori probability is less than priori probability
A) One key transforming message to each cipher text & all keys should be equally likely B) None of the mentioned C) All keys should be equally likely D) Only one key transforming message should exist
A) Greater, greater B) Greater, lesser C) Lesser, greater D) Lesser, lesser
A) Conditional probability of X given Y B) Joint probability of X and Y C) None of the mentioned D) Conditional probability of Y given X
A) Optimum rate B) True rate C) Absolute rate D) None of the mentioned
A) Zero B) Unity C) Infinity D) None of the mentioned
A) All of the mentioned B) When unique solution is available C) None of the mentioned D) When unique solution is not available
A) Trithemius cipher B) None of the mentioned C) Caesar cipher D) Caesar & Trithemius cipher
A) False B) True
A) 128 bit B) 64 bit C) 48 bit D) 32 bit
A) 4 B) 6 C) 16 D) 8
A) Can be used only once B) Random key C) Unconditional security D) All of the mentioned
A) Infinite number of messages B) None of the mentioned C) Finite number of messages D) Finite & Infinite number of messages
A) Addition B) ANDing C) Modulo 2 addition D) ORing
A) Self synchronous encryption method B) Synchronous encryption method C) All of the mentioned D) None of the mentioned
A) Synchronous encryption method B) Self synchronous encryption method C) None of the mentioned D) All of the mentioned
A) None of the mentioned B) One after the other C) All of the mentioned D) Simultaneously
A) None of the mentioned B) Asynchronously C) Synchronously & Asynchronously D) Synchronously
A) All of the mentioned B) ) Refraction C) Reflections from buildings D) Atmospheric reflections
A) None of the mentioned B) All of the mentioned C) Below noise level D) Above noise level |