Practice Test: Question Set - 03
1. A company requires its users to change passwords every month. This improves the ________ of the network.
- (A) Performance
- (B) Reliability
- (C) Security
- (D) None
of the above
2. What is the length of the cryptographic key used in the Data Encryption Standard (DES) cryptosystem?
- (A) 56
bits
- (B) 128
bits
- (C) 192
bits
- (D) 256
bits
3. What is a one-way password file?
- (A) A
scheme in which the password is jumbled and stored
- (B) A
scheme in which the password is XOR with a key and stored
- (C) A
scheme in which the hash of the password is stored
- (D) A
scheme in which the password is passed through a PRF, which is then stored
4. Using public key cryptography, X adds a digital signature σ to message M, encrypts <m, σ=””>, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?</m,>
- (A) Encryption:
X’s private key followed by Y’s private key; Decryption: X’s public key
followed by Y’s public key
- (B) Encryption:
X’s private key followed by Y’s public key; Decryption: X’s public key followed
by Y’s private key
- (C) Encryption:
X’s public key followed by Y’s private key; Decryption: Y’s public key followed
by X’s private key
- (D) Encryption:
X’s private key followed by Y’s public key; Decryption: Y’s private key
followed by X’s public key
5. PGP encrypts data by using a block cipher called ________
- (A) International
data encryption algorithm
- (B) Private
data encryption algorithm
- (C) Internet
data encryption algorithm
- (D) Local
data encryption algorithm
6. What is data encryption standard (DES)?
- (A) Block
cipher
- (B) Stream
cipher
- (C) Bit
cipher
- (D) Byte
cipher
7. IPsec services are available in ______ Layer.
- (A) Application
- (B) Data
Link
- (C) Network
- (D) Transport
8. Which of the statements are not true to classify VPN systems?
- (A) Protocols
used for tunnelling the traffic
- (B) Whether
VPNs are providing site-to-site or remote access connection
- (C) Securing
the network from bots and malwares
- (D) Levels
of security provided for sending and receiving data privately
9. In SSL, what is used for authenticating a message?
- (A) MAC
(Message Access Code)
- (B) MAC
(Message Authentication Code)
- (C) MAC
(Machine Authentication Code)
- (D) MAC
(Machine Access Code)
10. Release of message contents and Traffic analysis are two types of _________ attacks.
- (A) Active
Attack
- (B) Modification
of Attack
- (C) Passive
attack
- (D) DoS
Attack
11. In cryptography, what is cipher?
- (A) Algorithm
for performing encryption and decryption
- (B) Encrypted
message
- (C) Both
algorithm for performing encryption and decryption and encrypted message
- (D) Decrypted
message
Next Tests:
Blogger Comment
Facebook Comment