Cyber Security Multiple Choice Questions - Set 01 - ObjectiveBooks

Cyber Security Multiple Choice Questions - Set 01

Practice Test: Question Set - 01


1. _______is purpose of a Denial of Service attack
    (A) Exploit a weakness in the TCP/IP stack
    (B) To execute a Trojan on a system
    (C) To overload a system so it is no longer operational
    (D) To shutdown services by turning them off

2. The ________ is encrypted text.
    (A) Cipher script
    (B) Cipher text
    (C) Secret text
    (D) Secret script

3. The full form of Malware is ________
    (A) Malfunctioned Software
    (B) Multipurpose Software
    (C) Malicious Software
    (D) Malfunctioning of Security

4. _________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
    (A) Malware Analysis
    (B) Exploit writing
    (C) Reverse engineering
    (D) Cryptography

5. In which way does the Combined Encryption combine symmetric and asymmetric encryption?
    (A) First, the message is encrypted with symmetric encryption and afterwards it is encrypted asymmetrically together with the key.
    (B) The secret key is symmetrically transmitted, the message itself asymmetrically.
    (C) First, the message is encrypted with asymmetric encryption and afterwards it is encrypted symmetrically together with the key.
    (D) The secret key is asymmetrically transmitted, the message itself symmetrically.

6. The procedure to add bits to the last block is termed as __________
    (A) Decryption
    (B) Hashing
    (C) Tuning
    (D) Padding

7. In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user?
    (A) 3031
    (B) 2412
    (C) 2432
    (D) 1023

8. Data ___________ is used to ensure confidentiality.
    (A) Encryption
    (B) Locking
    (C) Decryption
    (D) Backup

9. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
    (A) S can launch a birthday attack to replace m with a fraudulent message
    (B) A third party attacker can launch a birthday attack to replace m with a fraudulent message
    (C) R can launch a birthday attack to replace m with a fraudulent message
    (D) R can launch a birthday attack

10. IPSec is designed to provide security at the _________
    (A) Transport layer
    (B) Network layer
    (C) Application layer
    (D) Presentation layer

11. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
    (A) 216
    (B) 232
    (C) 214
    (D) 212

12. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
    (A) 42 bytes
    (B) 32 bytes
    (C) 36 bytes
    (D) 48 bytes

13. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
    (A) Secret key
    (B) External programs
    (C) Add-ons
    (D) Secondary key

14. What does OSI stand for in the OSI Security Architecture?
    (A) Open System Interface
    (B) Open Systems Interconnections
    (C) Open Source Initiative
    (D) Open Standard Interconnections

15. In _______, there can be multiple paths from fully or partially trusted authorities.
    (A) X509
    (B) PGP
    (C) KDC
    (D) None of the above

Show and hide multiple DIV using JavaScript View All Answers

 Next Tests:

    Blogger Comment
    Facebook Comment
adplus-dvertising