Practice Test: Question Set - 01
1. The CIA triad is often represented by which of the following?
- (A) Triangle
- (B) Diagonal
- (C) Ellipse
- (D) Circle
2. What is called the collective terms of malicious software, such as viruses, worms and trojans?
- (A) Spam
- (B) Phishing
- (C) Malware
- (D) Harm
3. In general how many key elements constitute the entire security structure?
- (A) 1
- (B) 2
- (C) 3
- (D) 4
4. What is called a single point of access for several networking services?
- (A) Phishing
- (B) Web
service
- (C) Directory
service
- (D) Worms
5. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium
- (A) Malware
- (B) Remote
Access Trojans
- (C) Keyloggers
- (D) Spyware
6. What is called the unauthorized control/access over the computer system and destroys the data?
- (A) Defamation
- (B) Carding
- (C) Hacking
- (D) Cyber
- stalking
7. How many keys does the Triple DES algorithm use?
- (A) 2
- (B) 3
- (C) 2
or 3
- (D) 3
or 4
8. What is called protecting data from online attacks, deletions, malwares?
- (A) Physical
security
- (B) Cyber
security
- (C) Cyber
attack
- (D) Virus
9. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.
- (A) 23
- (B) 46
- (C) 11
- (D) 54
10. AES uses a ____________ bit block size and a key size of __________ bits.
- (A) 128;
128 or 256
- (B) 64;
128 or 192
- (C) 256;
128, 192, or 256
- (D) 128;
128, 192, or 256
11. What is the full form of LDAP?
- (A) Light
Weight Directory Access Provider
- (B) Light
Weight Directory Access Protocol
- (C) Light
Weight Directory Access Program
- (D) Light
Weight Directory Access Protection
12. Which crime involves the use of computer networks to create, distribute or access materials that sexually exploit underage persons?
- (A) Assault
by Threat
- (B) Cyber
squatting
- (C) Cyber
vandalism
- (D) Child
pornography
13. Which of the following modes does not implement chaining or “dependency on previous stage computations”?
- (A) CTR,
ECB
- (B) CTR,
CFB
- (C) CFB,
OFB
- (D) ECB,
OFB
Next Tests:
Blogger Comment
Facebook Comment