Practice Test: Question Set - 01
1. _______is purpose of a Denial of Service attack
- (A) Exploit
a weakness in the TCP/IP stack
- (B) To
execute a Trojan on a system
- (C) To
overload a system so it is no longer operational
- (D) To
shutdown services by turning them off
2. The ________ is encrypted text.
- (A) Cipher
script
- (B) Cipher
text
- (C) Secret
text
- (D) Secret
script
3. The full form of Malware is ________
- (A) Malfunctioned
Software
- (B) Multipurpose
Software
- (C) Malicious
Software
- (D) Malfunctioning
of Security
4. _________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
- (A) Malware
Analysis
- (B) Exploit
writing
- (C) Reverse
engineering
- (D) Cryptography
5. In which way does the Combined Encryption combine symmetric and asymmetric encryption?
- (A) First,
the message is encrypted with symmetric encryption and afterwards it is
encrypted asymmetrically together with the key.
- (B) The
secret key is symmetrically transmitted, the message itself asymmetrically.
- (C) First,
the message is encrypted with asymmetric encryption and afterwards it is
encrypted symmetrically together with the key.
- (D) The
secret key is asymmetrically transmitted, the message itself symmetrically.
6. The procedure to add bits to the last block is termed as __________
- (A) Decryption
- (B) Hashing
- (C) Tuning
- (D) Padding
7. In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user?
- (A) 3031
- (B) 2412
- (C) 2432
- (D) 1023
8. Data ___________ is used to ensure confidentiality.
- (A) Encryption
- (B) Locking
- (C) Decryption
- (D) Backup
9. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
- (A) S
can launch a birthday attack to replace m with a fraudulent message
- (B) A
third party attacker can launch a birthday attack to replace m with a
fraudulent message
- (C) R
can launch a birthday attack to replace m with a fraudulent message
- (D) R
can launch a birthday attack
10. IPSec is designed to provide security at the _________
- (A) Transport
layer
- (B) Network
layer
- (C) Application
layer
- (D) Presentation
layer
11. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
- (A) 216
- (B) 232
- (C) 214
- (D) 212
12. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
- (A) 42
bytes
- (B) 32
bytes
- (C) 36
bytes
- (D) 48
bytes
13. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
- (A) Secret
key
- (B) External
programs
- (C) Add-ons
- (D) Secondary
key
14. What does OSI stand for in the OSI Security Architecture?
- (A) Open
System Interface
- (B) Open
Systems Interconnections
- (C) Open
Source Initiative
- (D) Open
Standard Interconnections
15. In _______, there can be multiple paths from fully or partially trusted authorities.
- (A) X509
- (B) PGP
- (C) KDC
- (D) None
of the above
Next Tests:
Blogger Comment
Facebook Comment