ThatQuiz Test Library Take this test now
NETSEC
Contributed by: Sherwin
  • 1. The information that gets transformed in encryption is ____________
A) c) Encrypted text
B) d) Decrypted text
C) b) Parallel text
D) a) Plain text
  • 2. An algorithm in encryption is called _____________
A) b) Procedure
B) a) Algorithm
C) c) Cipher
D) d) Module
  • 3. Security features that control that can access resources in the OS.
A) d) Access control
B) c) Validation
C) a) Authentication
D) b) Identification
  • 4. A concern of authentication that deals with user rights.
A) b) Functional authentication
B) a) General access
C) d) Auto verification
D) c) Functional authorization
  • 5. 5. The process of verifying the identity of a user.
A) b) Identification
B) a) Authentication
C) c) Validation
D) d) Verification
  • 6. Which of these is a part of network identification?
A) d) fingerprint
B) b) Password
C) a) UserID
D) c) OTP
  • 7. Which is not an objective of network security?
A) c) Access control
B) b) Authentication
C) d) Lock
D) a) Identification
  • 8. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
A) d) IT
B) c) Network Security
C) b) ML
D) a) Artificial Intelligence
  • 9. What is internet?
A) b) A collection of unrelated computers
B) d) A single network
C) a) A network of interconnected local area networks
D) c) Interconnection of wide area networks
  • 10. Data communication means,
A) c) Data Assembly
B) a) Exchange of Packets/Data
C) d) Routing of data
D) b) Transmission link
  • 11. What is a computer network?
A) d) The physical casing that protects a computer’s internal components
B) c) A type of software used to create documents and presentations
C) a) A device used to display information on a computer screen
D) b) A collection of interconnected computers and devices that can communicate and share resources
  • 12. Which of the following is an example of Bluetooth?
A) b) virtual private network
B) c) local area network
C) d) personal area network
D) a) wide area network
  • 13. What are nodes in a computer network?
A) b) the computer that terminates the data
B) c) the computer that originates the data
C) a) the computer that routes the data
D) d) all of the mentioned
  • 14. Which one of the following is not a function of network layer?
A) a) congestion control
B) c) routing
C) b) error control
D) d) inter-networking
  • 15. What is the full form of OSI?
A) b) open service Internet
B) a) optical service implementation
C) d) operating system interface
D) c) open system interconnection
  • 16. 16. How many layers are there in the ISO OSI reference model?
A) c) 4
B) d) 6
C) b) 5
D) a) 7
  • 17. Which of the following devices forwards packets between networks by processing the routing information included in the packet?
A) d) router
B) b) bridge
C) a) firewall
D) c) hub
  • 18. Which layer does the data link layer take packets from and encapsulate them into frames for transmission?
A) c) network layer
B) d) physical layer
C) a) transport layer
D) b) application layer
  • 19. . Which of this is not a network edge device or DTE?
A) a) Switch
B) c) Smartphones
C) b) PC
D) d) Servers
  • 20. What was the name of the first network?
A) b) ARPANET
B) a) ASAPNET
C) d) NSFNET
D) c) CNNET
  • 21. Which of the following is the network layer protocol for the internet?
A) a) hypertext transfer protocol
B) d) internet protocol
C) b) file transfer protocol
D) c) ethernet
  • 22. Which of the following allows LAN users to share computer programs and data?
A) a) File server
B) b) Network
C) d) Print server
D) c) Communication server
  • 23. Which layer provides the services to user?
A) d) application layer
B) b) presentation layer
C) c) session layer
D) a) physical layer
  • 24. A ____________ is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, like the internet, preventing unauthorized access and protecting against malicious activity.
A) d) Buffer overflow detection
B) c) Virus scanner
C) a) firewall
D) b) Intrusion detection
  • 25. 25._________________ Is a program that identifies, quarantines, and/or removes viruses and other malware from a computer or device. It works by checking files and system memory for known malware signatures, which are unique digital fingerprints of malicious software.
A) a) firewall
B) b) Intrusion detection
C) c) Virus scanner
D) d) Buffer overflow detection
  • 26. Which is not considered part of about Computer security?
A) b) integrity
B) a) confidentiality
C) c) availability
D) d) reliability
  • 27. Which statement below is not security as trade-off?
A) a) The goal is usually to make the system as secure as possible.
B) d) To evaluate what level of security is necessary/appropriate.
C) b) To make the system as secure as possible within certain constraints.
D) c) Sometimes the best security is to make sure you are not the easiest target for an attacker.
  • 28. Which of following is/are Important to evaluate what level of security is necessary/appropriate?
A) d) All that mentioned.
B) c) Likelihood of a particular attack
C) a) Cost of mounting a particular attack vs. value of attack to an adversary
D) b) Cost of damages from an attack vs. cost of defending against the attack
  • 29. Which of the following is/are considered when security is primarily prioritized?
A) c) Security is a process, not a product
B) b) Security is not a “magic bullet”
C) a) Security of a system is only as good as the security at its weakest point…
D) d) All that mentioned.
  • 30. It protects workloads moving across different cloud and hybrid environments. These distributed workloads have larger attack surfaces, which must be secured without affecting the agility of the business.
A) b) Network security
B) a) Workload security
C) c) Firewalls
D) d) Access control
  • 31. Not every user should have access to your network. To keep out potential attackers, you need to recognize each user and each device. Then you can enforce your security policies. You can block noncompliant endpoint devices or give them only limited access.
A) c) Firewalls
B) b) Network security
C) a) Workload security
D) d) Access control
  • 32. Organizations must make sure that their staff does not send sensitive information outside the network. These technologies can stop people from uploading, forwarding, or even printing critical information in an unsafe manner.
A) b) Email-security
B) d) Mobile device security
C) c) Industrial network security
D) a) Data loss prevention
  • 33. Cybercriminals are increasingly targeting mobile devices and apps. Within the next three years, 90 percent of IT organizations may support corporate applications of course, you need to control which devices can access your network.
A) d) Mobile device security
B) a) Data loss prevention
C) c) Industrial network security
D) b) Email-security
  • 34. As you are digitizing your industrial operations, the deeper integration between IT, cloud, and industrial networks is exposing your Industrial Control Systems (ICS) to cyberthreats.
A) b) Email-security
B) d) Mobile device security
C) a) Data loss prevention
D) c) Industrial network security
  • 35. It pull together the information that your security staff needs to identify and respond to threats. These products come in various forms, including physical and virtual appliances and server software.
A) c) Industrial network security
B) a) Data loss prevention
C) d) Security information and event management
D) b) Email-security
  • 36. This security solution will control your staff's web use, block web-based threats, and deny access to malicious websites. It will protect your web gateway on site or in the cloud, also refers to the steps you take to protect your own website.
A) b) Email-security
B) c) Industrial network security
C) a) Web security
D) d) Mobile device security
  • 37. The process of hiding or coding information so that only the person a message was intended for can read it.
A) c) Security
B) a) Enciphering
C) b) Cryptography
D) d) Authentication
  • 38. ______________________ is usually ordinary readable text before it is encrypted into.
A) a) Plaintext
B) c) Information
C) b) Ciphertext
D) d) Decryption
  • 39. _____________________ encrypted text transformed from plaintext using an encryption algorithm.
A) b) Ciphertext
B) d) Decryption
C) c) Information
D) a) Plaintext
  • 40. The information cannot be understood by anyone for whom it was unintended.
A) b) Integrity
B) a) Confidentiality
C) d) Authentication
D) c) Non-repudiation
  • 41. The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected.
A) d) Authentication
B) a) Confidentiality
C) c) Non-repudiation
D) b) Integrity
  • 42. The sender and receiver can confirm each other's identity and the origin/destination of the information.
A) d) Authentication
B) a) Confidentiality
C) c) Non-repudiation
D) b) Integrity
  • 43. Use/s a set of procedures known as cryptographic algorithms, or ciphers, to encrypt and decrypt messages to secure communications among computer systems, devices and applications.
A) c) Cryptanalysis
B) d) Cryptons
C) a) Cryptosystems
D) b) Cryptology
  • 44. It uses a pair of keys, a public key associated with the creator/sender for encrypting messages and a private key that only the originator knows (unless it is exposed or they decide to share it) for decrypting that information.
A) c) private key
B) d) Authentication Key
C) b) symmetric-key encryption algorithm
D) a) asymmetric-key encryption algorithm
  • 45. create a fixed length of bits known as a block cipher with a secret key that the creator/sender uses to encipher data (encryption) and the receiver uses to decipher it.
A) c) public key
B) d) Authentication Key
C) a) asymmetric-key encryption algorithm
D) b) symmetric-key encryption algorithm
  • 46. The process of converting encrypted or coded data back into its original, readable format.
A) a) Encryption
B) b) Decryption
C) c) Translation
D) d) encipher
  • 47. The public-key setting dated back to the __________.
A) b) 1980s
B) a) 1970s
C) c) 1960s
D) d) 1950s
  • 48. If two nodes are communicating, then the key they will use is,are ___________________.
A) a) shared to both of them.
B) c) kept secret from the attacker.
C) b) completely randomized.
D) d) All that mentioned.
  • 49. What do call when Two (or more) distinct parties are communicating over an insecure network.
A) c) Translation
B) d) Fault tolerance
C) b) Data exchange
D) a) Canonical application
  • 50. The process of analyzing software or hardware to understand its functionality, architecture, and potentially identify vulnerabilities.
A) c) Insider attacks
B) a) Reverse engineering
C) b) Social engineering
D) d) Not mentioned
  • 51. In cybersecurity is a technique where attackers manipulate individuals into revealing sensitive information or taking actions that compromise security.
A) c) Insider attacks
B) b) Social engineering
C) a) Reverse engineering
D) d) Not mentioned
  • 52. IT attacks often begin with an attacker gathering information about their target, like potential weaknesses or trust levels, to craft a more effective deception.
A) b) Social engineering
B) a) Reverse engineering
C) d) Not mentioned
D) c) Insider attacks
  • 53. It relies on psychological manipulation and deception, rather than technical hacking, to exploit human trust and error.
A) d) Not mentioned
B) c) Insider attacks
C) b) Social engineering
D) a) Reverse engineering
  • 54. Researchers use reverse engineering to understand how malware functions, its behavior, and how it attacks systems.
A) d) Security research
B) b) Vulnerability assessment
C) a) Malware Analysis
D) c) Ethical hacking
  • 55. By analyzing software, security professionals can identify vulnerabilities before attackers exploit them.
A) d) Security research
B) a) Malware Analysis
C) c) Ethical hacking
D) b) Vulnerability assessment
  • 56. Reverse engineering is a key tool in ethical hacking, helping to simulate attacks and strengthen defenses.
A) b) Vulnerability assessment
B) c) Ethical hacking
C) a) Malware Analysis
D) d) Security research
  • 57. It helps in understanding the inner workings of various systems, including software, hardware, and even biological processes.
A) d) Security research
B) a) Malware Analysis
C) b) Vulnerability assessment
D) c) Ethical hacking
  • 58. Reverse engineering may be considered unethical, which one should not be involved?
A) a) Violating intellectual property rights by illegally copying or distributing proprietary software or technology.
B) d) All that mentioned.
C) c) Breaching confidentiality or privacy laws by accessing or reverse engineering protected information without authorization.
D) b) Using reverse engineering techniques for malicious purposes, such as developing malware or exploiting vulnerabilities for illicit gain.
  • 59. Takes a key and a message (plaintext), and outputs a ciphertext.
A) c) Security
B) b) Decryption algorithm
C) a) Encryption algorithm
D) d) Cyber security
  • 60. Takes a key and a ciphertext, and outputs a message (or perhaps an error).
A) d) Cyber security
B) a) Encryption algorithm
C) b) Decryption algorithm
D) c) Security
  • 61. Which of the following that we need to consider the threat model?
A) c) Chosen-plaintext attacks.
B) b) Passive/active adversary.
C) a) Multiple messages or a single message.
D) d) All that mentioned.
  • 62. In cryptography, what is cipher?
A) d) decrypted message
B) c) both algorithm for performing encryption and decryption and encrypted message
C) a) algorithm for performing encryption and decryption
D) b) encrypted message
  • 63. In asymmetric key cryptography, the private key is kept by __________
A) b) receiver
B) a) sender
C) d) all the connected devices to the network
D) c) sender and receiver
  • 64. Which one of the following algorithm is not used in asymmetric-key cryptography?
A) c) electronic code book algorithm
B) a) rsa algorithm
C) b) diffie-hellman algorithm
D) d) dsa algorithm
  • 65. In cryptography, the order of the letters in a message is rearranged by __________
A) c) both transpositional ciphers and substitution ciphers
B) b) substitution ciphers
C) a) transpositional ciphers
D) d) quadratic ciphers
  • 66. What is data encryption standard (DES)?
A) d) byte cipher
B) c) bit cipher
C) a) block cipher
D) b) stream cipher
  • 67. Cryptanalysis is used __________



    d)
A) b) to increase the speed
B) a) to find some insecurity in a cryptographic scheme
C) c) to encrypt the data
  • 68. Which one of the following is a cryptographic protocol used to secure HTTP connection?
A) c) explicit congestion notification (ECN)
B) a) stream control transmission protocol (SCTP)
C) b) transport layer security (TLS)
D) d) resource reservation protocol
  • 69. Voice privacy in GSM cellular telephone protocol is provided by _______
A) d) b5/8 cipher
B) b) b5/4 cipher
C) c) b5/6 cipher
D) a) A5/2 cipher
  • 70. ElGamal encryption system is __________



    d)
A) c) not an encryption algorithm
B) b) asymmetric key encryption algorithm
C) a) symmetric key encryption algorithm
  • 71. Cryptographic hash function takes an arbitrary block of data and returns _________
A) d) variable sized byte string
B) b) variable size bit string
C) c) both fixed size bit string and variable size bit string
D) a) fixed size bit string
  • 72. To encrypt a message _______ is used on the character’s positions.
A) b) bijective function
B) d) surjective function
C) c) inverse function
D) a) boolean algebra
  • 73. In a transposition cipher, the plaintext is constructed by the ________ of the ciphertext.
A) b) combination
B) a) permutation
C) c) sequence
D) d) series
  • 74. _______ is an example of asymmetric ciphers.
A) c) AES encryption
B) d) Advanced cryptology
C) b) RSA encryption
D) a) Block cipher
  • 75. There is no secret key in case of ____________
A) b) Asymmetric ciphers
B) c) RSA encryption
C) d) Alpha-numeric cryptography
D) a) Symmetric ciphers
  • 76. Cryptosystems are used for
A) Privacy & Authentication
B) None of the mentioned
C) Privacy
D) Authentication
  • 77. The key also contains a
A) Plaintext & Ciphertext
B) Ciphertext
C) None of the mentioned
D) Plaintext
  • 78. . The system which has insufficient information available to crypt-analyst is
A) None of the mentioned
B) One-time pad
C) One-time pad & Unconditionally secure
D) Unconditionally secure
  • 79. . In auto key method
A) Can be either necessary or not
B) None of the mentioned
C) Feedback is necessary
D) Feedback is not necessary
  • 80. In Vigenère method ______ is provided.
A) Feedback
B) Priming key & Feedback
C) None of the mentioned
D) Priming key
  • 81. A cipher system is said to have perfect secrecy if
A) Posteriori probability is less than priori probability
B) Posteriori probability is equal to priori probability
C) Posteriori probability is greater than priori probability
D) None of the mentioned
  • 82. The conditions for perfect secrecy are
A) All keys should be equally likely
B) Only one key transforming message should exist
C) None of the mentioned
D) One key transforming message to each cipher text & all keys should be equally likely
  • 83. Only one key transforming message should exist
A) Lesser, lesser
B) Greater, lesser
C) Greater, greater
D) Lesser, greater
  • 84. Equivocation is the
A) Conditional probability of Y given X
B) None of the mentioned
C) Joint probability of X and Y
D) Conditional probability of X given Y
  • 85. The maximum number of message bits contained in each character is called as
A) True rate
B) Optimum rate
C) Absolute rate
D) None of the mentioned
  • 86. When the key size is finite, equivocation approaches
A) Zero
B) None of the mentioned
C) Unity
D) Infinity
  • 87. When a system is called as unbreakable?
A) When unique solution is not available
B) When unique solution is available
C) All of the mentioned
D) None of the mentioned
  • 88. Which are called as substitution encryption techniques?
A) Caesar cipher
B) None of the mentioned
C) Trithemius cipher
D) Caesar & Trithemius cipher
  • 89. . In substitution technique encryption protection is more.
A) True
B) False
  • 90. The standard building block uses _______ of a key to transform 64-bit input into 64-bit output.
A) 64 bit
B) 48 bit
C) 128 bit
D) 32 bit
  • 91. The 64 bit block input key has _____ number of parity bits.
A) 4
B) 8
C) 16
D) 6
  • 92. One-time pad has
A) Random key
B) All of the mentioned
C) Unconditional security
D) Can be used only once
  • 93. Perfect secrecy can be achieved for
A) Finite number of messages
B) Infinite number of messages
C) Finite & Infinite number of messages
D) None of the mentioned
  • 94. The segment of the key-stream of plaintext is obtained by _____ of two sequences together.
A) Addition
B) ANDing
C) ORing
D) Modulo 2 addition
  • 95. In which method the key-stream is generated independently of the message?
A) Self synchronous encryption method
B) All of the mentioned
C) Synchronous encryption method
D) None of the mentioned
  • 96. . In which method cipher feedback is used?
A) Synchronous encryption method
B) None of the mentioned
C) Self synchronous encryption method
D) All of the mentioned
  • 97. Spread spectrum multiple access techniques allows the multiple signal to be transmitted
A) All of the mentioned
B) One after the other
C) Simultaneously
D) None of the mentioned
  • 98. In CDMA, the users share the bandwidth
A) Asynchronously
B) Synchronously & Asynchronously
C) Synchronously
D) None of the mentioned
  • 99. Multi paths may be because of
A) All of the mentioned
B) ) Refraction
C) Reflections from buildings
D) Atmospheric reflections
  • 100. Direct system allows detection of signals whose psd level is
A) Above noise level
B) All of the mentioned
C) None of the mentioned
D) Below noise level
Created with That Quiz — the site for test creation and grading in math and other subjects.