Firewall and Intrusion Detection System MCQ Practice Test - ObjectiveBooks

Firewall and Intrusion Detection System MCQ Practice Test

Practice Test: Question Set - 01


1. In cryptography the original message before being transform is called
    (A) Simple text
    (B) Plain text
    (C) Empty text
    (D) Filled text

2. The message which is not understandable is called as?
    (A) Cipher Text
    (B) Plain text
    (C) Hidden text
    (D) Both (a) & (c)

3. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
    (A) Authenticated
    (B) Joined
    (C) Submit
    (D) Separate

4. The ________ is a polygraphic substitution cipher based on linear algebra
    (A) Hill cipher
    (B) Playfair cipher
    (C) Affine cipher
    (D) None of these

5. What is data encryption standard (DES)?
    (A) Block cipher
    (B) Stream cipher
    (C) Bit cipher
    (D) Byte cipher

6. AES stands for?
    (A) Authorized Encryption Standard
    (B) Advance Encryption Standard
    (C) Advance Encryption Strategy
    (D) None of these

7. In AES in which Round Sub-keys are generated from Original key for each round?
    (A) Key Expansion
    (B) Initial Round
    (C) Finale Round
    (D) None of these

8. ________is the practice of concealing a message within another message, image or file.
    (A) Steganography
    (B) Cryptography
    (C) Cipher
    (D) Receiver

9. An asymmetric-key (or public-key) cipher uses
    (A) 1 key
    (B) 2 key
    (C) 3 key
    (D) 4 key

10. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
    (A) Short
    (B) Flat
    (C) Long
    (D) Thin

11. Which of them is type of Cipher?
    (A) Stream Cipher
    (B) Block Cipher
    (C) Both of them
    (D) None of these

Show and hide multiple DIV using JavaScript View All Answers

    Blogger Comment
    Facebook Comment
adplus-dvertising