Information Technology Objective Questions and Answers - Set 03 - ObjectiveBooks

Information Technology Objective Questions and Answers - Set 03

Practice Test: Question Set - 03


1. A company requires its users to change passwords every month. This improves the ________ of the network.
    (A) Performance
    (B) Reliability
    (C) Security
    (D) None of the above

2. What is the length of the cryptographic key used in the Data Encryption Standard (DES) cryptosystem?
    (A) 56 bits
    (B) 128 bits
    (C) 192 bits
    (D) 256 bits

3. What is a one-way password file?
    (A) A scheme in which the password is jumbled and stored
    (B) A scheme in which the password is XOR with a key and stored
    (C) A scheme in which the hash of the password is stored
    (D) A scheme in which the password is passed through a PRF, which is then stored

4. Using public key cryptography, X adds a digital signature σ to message M, encrypts <m, σ=””>, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?</m,>
    (A) Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key
    (B) Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key
    (C) Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key
    (D) Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key

5. PGP encrypts data by using a block cipher called ________
    (A) International data encryption algorithm
    (B) Private data encryption algorithm
    (C) Internet data encryption algorithm
    (D) Local data encryption algorithm

6. What is data encryption standard (DES)?
    (A) Block cipher
    (B) Stream cipher
    (C) Bit cipher
    (D) Byte cipher

7. IPsec services are available in ______ Layer.
    (A) Application
    (B) Data Link
    (C) Network
    (D) Transport

8. Which of the statements are not true to classify VPN systems?
    (A) Protocols used for tunnelling the traffic
    (B) Whether VPNs are providing site-to-site or remote access connection
    (C) Securing the network from bots and malwares
    (D) Levels of security provided for sending and receiving data privately

9. In SSL, what is used for authenticating a message?
    (A) MAC (Message Access Code)
    (B) MAC (Message Authentication Code)
    (C) MAC (Machine Authentication Code)
    (D) MAC (Machine Access Code)

10. Release of message contents and Traffic analysis are two types of _________ attacks.
    (A) Active Attack
    (B) Modification of Attack
    (C) Passive attack
    (D) DoS Attack

11. In cryptography, what is cipher?
    (A) Algorithm for performing encryption and decryption
    (B) Encrypted message
    (C) Both algorithm for performing encryption and decryption and encrypted message
    (D) Decrypted message

Show and hide multiple DIV using JavaScript View All Answers

 Next Tests:

    Blogger Comment
    Facebook Comment
adplus-dvertising