A) c) Encrypted text B) d) Decrypted text C) b) Parallel text D) a) Plain text
A) b) Procedure B) a) Algorithm C) c) Cipher D) d) Module
A) d) Access control B) c) Validation C) a) Authentication D) b) Identification
A) b) Functional authentication B) a) General access C) d) Auto verification D) c) Functional authorization
A) b) Identification B) a) Authentication C) c) Validation D) d) Verification
A) d) fingerprint B) b) Password C) a) UserID D) c) OTP
A) c) Access control B) b) Authentication C) d) Lock D) a) Identification
A) d) IT B) c) Network Security C) b) ML D) a) Artificial Intelligence
A) b) A collection of unrelated computers B) d) A single network C) a) A network of interconnected local area networks D) c) Interconnection of wide area networks
A) c) Data Assembly B) a) Exchange of Packets/Data C) d) Routing of data D) b) Transmission link
A) d) The physical casing that protects a computer’s internal components B) c) A type of software used to create documents and presentations C) a) A device used to display information on a computer screen D) b) A collection of interconnected computers and devices that can communicate and share resources
A) b) virtual private network B) c) local area network C) d) personal area network D) a) wide area network
A) b) the computer that terminates the data B) c) the computer that originates the data C) a) the computer that routes the data D) d) all of the mentioned
A) a) congestion control B) c) routing C) b) error control D) d) inter-networking
A) b) open service Internet B) a) optical service implementation C) d) operating system interface D) c) open system interconnection
A) c) 4 B) d) 6 C) b) 5 D) a) 7
A) d) router B) b) bridge C) a) firewall D) c) hub
A) c) network layer B) d) physical layer C) a) transport layer D) b) application layer
A) a) Switch B) c) Smartphones C) b) PC D) d) Servers
A) b) ARPANET B) a) ASAPNET C) d) NSFNET D) c) CNNET
A) a) hypertext transfer protocol B) d) internet protocol C) b) file transfer protocol D) c) ethernet
A) a) File server B) b) Network C) d) Print server D) c) Communication server
A) d) application layer B) b) presentation layer C) c) session layer D) a) physical layer
A) d) Buffer overflow detection B) c) Virus scanner C) a) firewall D) b) Intrusion detection
A) a) firewall B) b) Intrusion detection C) c) Virus scanner D) d) Buffer overflow detection
A) b) integrity B) a) confidentiality C) c) availability D) d) reliability
A) a) The goal is usually to make the system as secure as possible. B) d) To evaluate what level of security is necessary/appropriate. C) b) To make the system as secure as possible within certain constraints. D) c) Sometimes the best security is to make sure you are not the easiest target for an attacker.
A) d) All that mentioned. B) c) Likelihood of a particular attack C) a) Cost of mounting a particular attack vs. value of attack to an adversary D) b) Cost of damages from an attack vs. cost of defending against the attack
A) c) Security is a process, not a product B) b) Security is not a “magic bullet” C) a) Security of a system is only as good as the security at its weakest point… D) d) All that mentioned.
A) b) Network security B) a) Workload security C) c) Firewalls D) d) Access control
A) c) Firewalls B) b) Network security C) a) Workload security D) d) Access control
A) b) Email-security B) d) Mobile device security C) c) Industrial network security D) a) Data loss prevention
A) d) Mobile device security B) a) Data loss prevention C) c) Industrial network security D) b) Email-security
A) b) Email-security B) d) Mobile device security C) a) Data loss prevention D) c) Industrial network security
A) c) Industrial network security B) a) Data loss prevention C) d) Security information and event management D) b) Email-security
A) b) Email-security B) c) Industrial network security C) a) Web security D) d) Mobile device security
A) c) Security B) a) Enciphering C) b) Cryptography D) d) Authentication
A) a) Plaintext B) c) Information C) b) Ciphertext D) d) Decryption
A) b) Ciphertext B) d) Decryption C) c) Information D) a) Plaintext
A) b) Integrity B) a) Confidentiality C) d) Authentication D) c) Non-repudiation
A) d) Authentication B) a) Confidentiality C) c) Non-repudiation D) b) Integrity
A) d) Authentication B) a) Confidentiality C) c) Non-repudiation D) b) Integrity
A) c) Cryptanalysis B) d) Cryptons C) a) Cryptosystems D) b) Cryptology
A) c) private key B) d) Authentication Key C) b) symmetric-key encryption algorithm D) a) asymmetric-key encryption algorithm
A) c) public key B) d) Authentication Key C) a) asymmetric-key encryption algorithm D) b) symmetric-key encryption algorithm
A) a) Encryption B) b) Decryption C) c) Translation D) d) encipher
A) b) 1980s B) a) 1970s C) c) 1960s D) d) 1950s
A) a) shared to both of them. B) c) kept secret from the attacker. C) b) completely randomized. D) d) All that mentioned.
A) c) Translation B) d) Fault tolerance C) b) Data exchange D) a) Canonical application
A) c) Insider attacks B) a) Reverse engineering C) b) Social engineering D) d) Not mentioned
A) c) Insider attacks B) b) Social engineering C) a) Reverse engineering D) d) Not mentioned
A) b) Social engineering B) a) Reverse engineering C) d) Not mentioned D) c) Insider attacks
A) d) Not mentioned B) c) Insider attacks C) b) Social engineering D) a) Reverse engineering
A) d) Security research B) b) Vulnerability assessment C) a) Malware Analysis D) c) Ethical hacking
A) d) Security research B) a) Malware Analysis C) c) Ethical hacking D) b) Vulnerability assessment
A) b) Vulnerability assessment B) c) Ethical hacking C) a) Malware Analysis D) d) Security research
A) d) Security research B) a) Malware Analysis C) b) Vulnerability assessment D) c) Ethical hacking
A) a) Violating intellectual property rights by illegally copying or distributing proprietary software or technology. B) d) All that mentioned. C) c) Breaching confidentiality or privacy laws by accessing or reverse engineering protected information without authorization. D) b) Using reverse engineering techniques for malicious purposes, such as developing malware or exploiting vulnerabilities for illicit gain.
A) c) Security B) b) Decryption algorithm C) a) Encryption algorithm D) d) Cyber security
A) d) Cyber security B) a) Encryption algorithm C) b) Decryption algorithm D) c) Security
A) c) Chosen-plaintext attacks. B) b) Passive/active adversary. C) a) Multiple messages or a single message. D) d) All that mentioned.
A) d) decrypted message B) c) both algorithm for performing encryption and decryption and encrypted message C) a) algorithm for performing encryption and decryption D) b) encrypted message
A) b) receiver B) a) sender C) d) all the connected devices to the network D) c) sender and receiver
A) c) electronic code book algorithm B) a) rsa algorithm C) b) diffie-hellman algorithm D) d) dsa algorithm
A) c) both transpositional ciphers and substitution ciphers B) b) substitution ciphers C) a) transpositional ciphers D) d) quadratic ciphers
A) d) byte cipher B) c) bit cipher C) a) block cipher D) b) stream cipher
A) b) to increase the speed B) a) to find some insecurity in a cryptographic scheme C) c) to encrypt the data
A) c) explicit congestion notification (ECN) B) a) stream control transmission protocol (SCTP) C) b) transport layer security (TLS) D) d) resource reservation protocol
A) d) b5/8 cipher B) b) b5/4 cipher C) c) b5/6 cipher D) a) A5/2 cipher
A) c) not an encryption algorithm B) b) asymmetric key encryption algorithm C) a) symmetric key encryption algorithm
A) d) variable sized byte string B) b) variable size bit string C) c) both fixed size bit string and variable size bit string D) a) fixed size bit string
A) b) bijective function B) d) surjective function C) c) inverse function D) a) boolean algebra
A) b) combination B) a) permutation C) c) sequence D) d) series
A) c) AES encryption B) d) Advanced cryptology C) b) RSA encryption D) a) Block cipher
A) b) Asymmetric ciphers B) c) RSA encryption C) d) Alpha-numeric cryptography D) a) Symmetric ciphers
A) Privacy & Authentication B) None of the mentioned C) Privacy D) Authentication
A) Plaintext & Ciphertext B) Ciphertext C) None of the mentioned D) Plaintext
A) None of the mentioned B) One-time pad C) One-time pad & Unconditionally secure D) Unconditionally secure
A) Can be either necessary or not B) None of the mentioned C) Feedback is necessary D) Feedback is not necessary
A) Feedback B) Priming key & Feedback C) None of the mentioned D) Priming key
A) Posteriori probability is less than priori probability B) Posteriori probability is equal to priori probability C) Posteriori probability is greater than priori probability D) None of the mentioned
A) All keys should be equally likely B) Only one key transforming message should exist C) None of the mentioned D) One key transforming message to each cipher text & all keys should be equally likely
A) Lesser, lesser B) Greater, lesser C) Greater, greater D) Lesser, greater
A) Conditional probability of Y given X B) None of the mentioned C) Joint probability of X and Y D) Conditional probability of X given Y
A) True rate B) Optimum rate C) Absolute rate D) None of the mentioned
A) Zero B) None of the mentioned C) Unity D) Infinity
A) When unique solution is not available B) When unique solution is available C) All of the mentioned D) None of the mentioned
A) Caesar cipher B) None of the mentioned C) Trithemius cipher D) Caesar & Trithemius cipher
A) True B) False
A) 64 bit B) 48 bit C) 128 bit D) 32 bit
A) 4 B) 8 C) 16 D) 6
A) Random key B) All of the mentioned C) Unconditional security D) Can be used only once
A) Finite number of messages B) Infinite number of messages C) Finite & Infinite number of messages D) None of the mentioned
A) Addition B) ANDing C) ORing D) Modulo 2 addition
A) Self synchronous encryption method B) All of the mentioned C) Synchronous encryption method D) None of the mentioned
A) Synchronous encryption method B) None of the mentioned C) Self synchronous encryption method D) All of the mentioned
A) All of the mentioned B) One after the other C) Simultaneously D) None of the mentioned
A) Asynchronously B) Synchronously & Asynchronously C) Synchronously D) None of the mentioned
A) All of the mentioned B) ) Refraction C) Reflections from buildings D) Atmospheric reflections
A) Above noise level B) All of the mentioned C) None of the mentioned D) Below noise level |