1 Ftytu

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 23

1.

In symmetric-key cryptography, the key locks and unlocks the box is


A. same
B. shared
C. private
D. public
Answer» A. same
discuss
2.
The keys used in cryptography are
A. secret key
B. private key
C. public key
D. all of them
Answer» D. all of them
discuss
3.
Cryptography, a word with Greek origins, means
A. corrupting data
B. secret writing
C. open writing
D. closed writing
Answer» B. secret writing
discuss
4.
A transposition cipher reorders (permutes) symbols in a
A. block of packets
B. block of slots
C. block of signals
D. block of symbols
Answer» D. block of symbols
discuss
5.
Network Security provides authentication and access control for resources.
A. true
B. false
Answer» A. true
discuss
6.
Which is not an objective of network security?
A. identification
B. authentication
C. access control
D. lock
Answer» D. lock
discuss
7.
The process of verifying the identity of a user.
A. authentication
B. identification
C. validation
D. verification
Answer» A. authentication
discuss
8.
Which of these is a part of network identification?
A. user id
B. password
C. otp
D. fingerprint
Answer» A. user id
discuss
9.
The process of transforming plain text into unreadable text.
A. decryption
B. encryption
C. network security
D. information hiding
Answer» B. encryption
discuss
10.
An algorithm used in encryption is referred to as cipher.
A. true
B. false
Answer» A. true
discuss
11.
A process of making the encrypted text readable again.
A. decryption
B. encryption
C. network security
D. information hiding
Answer» A. decryption
discuss
12.
A person who enjoys learning details about computers and how to enhance their
capabilities.
A. cracker
B. hacker
C. app controller
D. site controller
Answer» B. hacker
discuss
13.
A small program that changes the way a computer operates.
A. worm
B. trojan
C. bomb
D. virus
Answer» D. virus
discuss
14.
An asymmetric-key (or public-key) cipher uses
A. 1 key
B. 2 key
C. 3 key
D. 4 key
Answer» B. 2 key
discuss
15.
We use cryptofraphy term to transform messages to make them secure and immune to
A. change
B. idle
C. attacks
D. defend
Answer» C. attacks
discuss (2)
16.
In cryptography , the original message before being transformmed , is called
A. simple text
B. plain text
C. empty text
D. filled text
Answer» B. plain text
discuss
17.
A straight permutation cipher or a straight p-box has the same number of input as
A. cipher
B. frames
C. outputs
D. bits
Answer» C. outputs
discuss
18.
The man-in-the-middle attack can endanger the security of the diffie-hellman if two
parties are not
A. authenticated
B. joined
C. submit
D. separate
Answer» A. authenticated
discuss
19.
Which of the following is not a transport layer vulnerability?
A. mishandling of undefined , poorly defined
B. the vulnerability that allows fingerprinting & other enumeration of host
information
C. overloading of transporting layer mechanisms
D. unauthorized network access
Answer» D. unauthorized network access
discuss
20.
Transmission mechanisms can be subject to spoofing & attacks based on skilled
modified packets.
A. true
B. false
Answer» A. true
discuss
21.
TCP/IP model does not have layer but OSI model have this layer.
A. session layer
B. transport layer
C. application layer
D. network layer
Answer» A. session layer
discuss (1)
22.
In cryptography, what is cipher?
A. algorithm for performing encrption and decryption
B. encrypted message
C. both algorith for performing encrption and decryption and encrypted message
D. decrypted message
Answer» A. algorithm for performing encrption and decryption
discuss
23.
In cryptography, the order of the letters in a message is rearranged by
A. transpositional ciphers
B. substitution ciphers
C. both
D. quadratic ciphers
Answer» A. transpositional ciphers
discuss
24.
What is data encryption standard (DES)?
A. block cipher
B. stream cipher
C. bit cipher
D. byte cipher
Answer» A. block cipher
discuss
25.
Cryptanalysis is used
A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers
Answer» A. to find some insecurity in a cryptographic scheme
discuss
26.
Choose from among the following cipher systems, from best to the worst, with
respect to ease of decryption using frequency analysis.
A. random polyalphabetic , plaintext , playfair
B. random polyalphabetic , playfair , vignere
C. random polyalphabetic , vignere , playfair , plaintext
D. random polyalphabetic , plaintext , beaufort , playfair
Answer» C. random polyalphabetic , vignere , playfair , plaintext
discuss
27.
On Encrypting “thepepsi`isintherefrigerator” using Vignere Cipher System using the
keyword “HUMOR” we get cipher text-
A. abqdnwewuwjphfvrrtrfzn sdokvl
B. abqdvmwuwjphfvvyyrf znydokvl
C. tbqyrvmwuwjphfvvyy rfznydokvl
D. baiuvmwuwjphfoeiyrf znydokvl
Answer» B. abqdvmwuwjphfvvyyrf znydokvl
discuss
28.
. Rail Fence Technique is an example of
A. substitution
B. transposition
C. product cipher
D. ceaser cipher
Answer» B. transposition
discuss
29.
Public key encryption is advantageous over Symmetric key Cryptography because of
A. speed
B. space
C. key exchange
D. key length
Answer» C. key exchange
discuss
30.
The sub key length at each round of DES is
A. 32
B. 56
C. 48
D. 64
Answer» B. 56
discuss
31.
Which one is the strong attack mechanism?
A. chosen plaintext attack
B. chosen cipher text
C. brute force attack
D. man in the middle attack
Answer» C. brute force attack
discuss
32.
Interception is an attack on
A. availability
B. confidentiality
C. integrity
D. authenticity
Answer» B. confidentiality
discuss
33.
Chosen cipher text attack is based on
A. cryptanalysis
B. cryptography
C. encryption
D. decryption
Answer» A. cryptanalysis
discuss
34.
The process of writing the text as rows and read it as columns is known as
A. vernam cipher
B. ceaser cipher
C. transposition columnar cipher
D. homophonic substitution cipher
Answer» C. transposition columnar cipher
discuss
35.
Biometric authentication works on the basis of
A. human characteristics
B. passwords
C. smart cards
D. pin
Answer» A. human characteristics
discuss
36.
Which layer filters the proxy firewall?
A. application
B. network
C. transport
D. none of the above
Answer» A. application
discuss
37.
Encryption Strength is based on
A. strength of algorithm
B. secrecy of key
C. length of key
D. all of the above
Answer» D. all of the above
discuss
38.
GCD(a,b) = GCD(b,a mod b)
A. true
B. false
C. cannot be determined
D. none
Answer» A. true
discuss
39.
All groups satisfy properties
A. g-i to g-v
B. g-i to g-iv
C. g-i to r-v
D. r-i to r-v
Answer» C. g-i to r-v
discuss
40.
An Abelian Group satisfies the properties
A. g-i to g-v
B. g-i to g-iv
C. g-i to r-v
D. r-i to r-v
Answer» A. g-i to g-v
discuss
41.
A Ring satisfies the properties
A. r-i to r-v
B. g-i to g-iv
C. g-i to r-v
D. g-i to r-iii
Answer» D. g-i to r-iii
discuss
42.
A Ring is said to be commutative if it also satisfies the property
A. r-vi
B. r-v
C. r-vii
D. r-iv
Answer» D. r-iv
discuss
43.
An ‘Integral Domain’ satisfies the properties
A. g-i to g-iii
B. g-i to r-v
C. g-i to r-vi
D. g-i to r-iii
Answer» C. g-i to r-vi
discuss
44.
Does the set of residue classes (mod 3) form a group with respect to modular
addition?
A. yes
B. no
C. can\t say
D. insufficient data
Answer» A. yes
discuss
45.
For the group Sn of all permutations of n distinct symbols, what is the number of
elements in Sn?
A. n
B. n-1
C. 2n
D. n!
Answer» D. n!
discuss
46.
a(b+c) = ac+bc is the representation for which property?
A. g-ii
B. g-iii
C. r-ii
D. r-iii
Answer» D. r-iii
discuss
47.
a.(b.c) = (a.b).c is the representation for which property?
A. g-ii
B. g-iii
C. r-ii
D. r-iii
Answer» A. g-ii
discuss
48.
AES uses a bit block size and a key size of
bits.
A. 128; 128 or 256
B. 64; 128 or 192
C. 256; 128, 192, or 256
D. 128; 128, 192, or 256
Answer» D. 128; 128, 192, or 256
discuss
49.
Like DES, AES also uses Feistel Structure.
A. true
B. false
C. cannot be determined
D. none
Answer» B. false
discuss
50.
Which one of the following is not a cryptographic algorithm?
A. jupiter
B. blowfish
C. serpent
D. none
Answer» A. jupiter
discuss
51.
If the key is 110100001, the output of the SP network for the plaintext: 101110001
is
A. 110100011
B. 110101110
C. 10110111
D. 11111010
Answer» B. 110101110
discuss
52.
What is the number of possible 3 x 3 affine cipher transformations
A. 168
B. 840
C. 1024
D. 1344
Answer» D. 1344
discuss
53.
What is the expanded key size of AES-192?
A. 44 words
B. 60 words
C. 52 words
D. 36 words
Answer» C. 52 words
discuss
54.
In affine block cipher systems if f(m)=Am + t, what is f(m1+m2+m3) ?
A. f(m1) + f(m2) + f(m3) + t
B. f(m1) + f(m2) + f(m3) +2t
C. f(m1) + f(m2) + f(m3)
D. 2(f(m1) + f(m2) + f(m3))
Answer» C. f(m1) + f(m2) + f(m3)
discuss
55.
The 4×4 byte matrices in the AES algorithm are called
A. states
B. words
C. transitions
D. permutations
Answer» A. states
discuss
56.
If the block size is ‘s’, how many affine transformations are possible ?
A. 2s (2s-1)(2s-1)(2s-12) ………(2s-1(s-1))
B. 2s (2s-1)(2s-2)(2s-22) ………(2s-2(s-2))
C. 2ss (2s-1)(2s-2)(2s-22) ………(2s-2(s-1))
D. 2s (2s-1)(2s-2)(2s-22) ………(2s-2(s-3))
Answer» C. 2ss (2s-1)(2s-2)(2s-22) ………(2s-2(s-1))
discuss
57.
For the AES-128 algorithm there are similar rounds and
round is different.
A. 2 pair of 5 similar rounds ; every alternate
B. 9 ; the last
C. 8 ; the first and last
D. 10 ; no
Answer» B. 9 ; the last
discuss
58.
The DES Algorithm Cipher System consists of rounds
(iterations) each with a round key
A. 9
B. 12
C. 18
D. 16
Answer» D. 16
discuss
59.
DES follows
A. hash algorithm
B. caesars cipher
C. feistel cipher structure
D. sp networks
Answer» C. feistel cipher structure
discuss
60.
Every cyclic group is .
A. a group with finite order
B. a group with prime order
C. a non abelian group
D. an abelian group
Answer» D. an abelian group
discuss

61.
In the DES algorithm the round key is bit and the Round
Input is bits
A. 48, 32
B. 64,32
C. 56, 24
D. 32, 32
Answer» A. 48, 32
discuss
62.
is not a binary operation on the set of natural numbers.
A. addition
B. product
C. difference
D. none
Answer» C. difference
discuss
63.
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via
A. scaling of the existing bits
B. duplication of the existing bits
C. addition of zeros
D. addition of ones
Answer» A. scaling of the existing bits
discuss
64.
Which of the following is group under multiplication?
A. q
B. q-{0}
C. q-{1}
D. q-{0,1}
Answer» B. q-{0}
discuss
65.
The Initial Permutation table/matrix is of size
A. 16×8
B. 4×8
C. 12×8
D. 8×8
Answer» D. 8×8
discuss
66.
The number of unique substitution boxes in DES after the 48 bit XOR operation are
A. 8
B. 4
C. 6
D. 12
Answer» A. 8
discuss
67.
The DES algorithm has a key length of
A. 128 bits
B. 32 bits
C. 64 bits
D. 16 bits
Answer» C. 64 bits
discuss
68.
What is the size of the key in the SDES algorithm?
A. 24 bits
B. 16 bits
C. 20 bits
D. 10 bits
Answer» D. 10 bits
discuss
69.
The Plaintext for the Ciphertext 10100101, given that the key is 0010010111 is
A. 1100111
B. 110110
C. 1001000
D. 1001100
Answer» B. 110110
discuss
70.
Assume input 10-bit key, K: 1010000010 for the SDES algorithm. What is K1?
A. 10100100
B. 1011011
C. 1101000
D. 10100111
Answer» A. 10100100
discuss

71.
Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K2?
A. 11101010
B. 11011011
C. 1101000
D. 10101111
Answer» A. 11101010
discuss
72.
Which of the following is a mode of operation for the Block ciphers in
cryptography?
A. a. electronic code book (ecb)
B. cipher block chaining (cbc)
C. counter (ctr) mode
D. all of the above
Answer» D. all of the above
discuss
73.
Which of the following modes of operations can be followed for both stream ciphers
as well as block ciphers?
A. a. cbc (cipher block chaining)
B. ecb (electronic code book)
C. a. cfb (cipher text feed back)
D. all of the above
Answer» C. a. cfb (cipher text feed back)
discuss
74.
The Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is
A. 1100111
B. 1010
C. 11111111
D. 1101101
Answer» C. 11111111
discuss
75.
Which one of the following RC4 algorithm not used in?
A. ssl
B. tls
C. ftp
D. wep
Answer» C. ftp
discuss
76.
Till when was the RC4 algorithm kept a secret?
A. 1990
B. 1992
C. 1996
D. 1994
Answer» D. 1994
discuss
77.
The Plaintext for the Ciphertext 00100010, given that the key is 1111111111 is
A. 1100111
B. 1010
C. 1001000
D. 1001100
Answer» D. 1001100
discuss
78.
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method
if two parties are not
A. authenticated
B. joined
C. submit
D. separate
Answer» A. authenticated
discuss
79.
RSA is also a stream cipher like Merkel-Hellman
A. true
B. false
Answer» A. true
discuss
80.
Rabin Cryptosystem is a variant of the Elgamal Cryptosystem
A. true
B. false
Answer» B. false
discuss
81.
In RSA, Ф(n) = in terms of p and q
A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)
Answer» C. (p-1)(q-1)
discuss
82.
In Asymmetric Key Cryptography, the two key, e and d, have a special relationship
to
A. others
B. data
C. keys
D. each other
Answer» D. each other
discuss
83.
Using Rabin cryptosystem with p=23 and q=7 ,Encrypt P=24 to find ciphertext. The
Cipher text is
A. 42
B. 93
C. 74
D. 12
Answer» D. 12
discuss (1)
84.
For RSA to work, the value of P must be less than the value of
A. p
B. quy
C. n
D. f
Answer» C. n
discuss
85.
Session keys are transmitted after being encrypted by
A. make-shift keys
B. temporary keys
C. master keys
D. section
Answer» C. master keys
discuss
86.
Which Cryptographic system uses C1 = (e1r) mod p and C1 = (e2r x P) mod p at the
encryption side?
A. elgamal
B. rsa
C. rabin
D. whirlpool
Answer» A. elgamal
discuss
87.
The certificate message is required for any agreed-on key exchange method except
A. ephemeral diffie- hellman
B. anonymous diffie- hellmanc
C. fixed diffie- hellmand.
D. rsa
Answer» B. anonymous diffie- hellmanc
discuss098
88.
Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the
plaintext to be transmitted if the ciphertext is (28,9)
A. 45
B. 76
C. 66
D. 13
Answer» C. 66
discuss
89.
In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt
actual messages, it is very slow if the message is
A. short
B. long
C. flat
D. thin
Answer» B. long
discuss
90.
Which of the following is not a type of symmetric-key cryptography technique?
A. caesar cipher
B. data encryption standard (des)
C. diffie hellman cipher
D. playfair cipher
Answer» C. diffie hellman cipher
discuss

91.
In Elgamal cryptosystem, given the prime p=31,Choose e1= first primitive root of p
and d=10, calculate e2
A. 24
B. 36
C. 25
D. 62
Answer» C. 25
discuss
92.
How many bytes of the secret key is generated using Diffie-Hellman
encryption/decryption scheme?
A. 256
B. 871
C. 1024
D. 962
Answer» A. 256
discuss
93.
Computation of the discrete logarithm is the basis of the cryptographic system
A. symmetric cryptography
B. asymmetric cryptography
C. diffie-hellman key exchange
D. secret key cryptography
Answer» C. diffie-hellman key exchange
discuss
94.
In Elgamal cryptosystem, given the prime p=31,Encrypt the message “HELLO”; use 00
to 25 for encoding. The value of C2 for character ‘O’ is
A. 9
B. 7
C. 23
D. 27
Answer» A. 9
discuss
95.
What is the block size of RC6 Feistel block cipher?
A. 5013 bits
B. 128 bits
C. 596 bits
D. 1768 bits
Answer» B. 128 bits
discuss
96.
What is the general equation for elliptic curve systems
A. y3+b_1 xy+b_2 y=x33+a_1 x2+a_2 x+a_3
B. y3+b_1 x+b_2 y=x2+a_1 x2+a_2 x+a_3
C. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2
D. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3
Answer» D. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3
discuss
97.
USENET falls under which category of public key sharing?
A. public announcement
B. publicly available directory
C. public-key authority
D. public-key certificates
Answer» A. public announcement
discuss
98.
In Singular elliptic curve, the equation x^3+ax+b=0 does roots
A. does not have three distinct
B. has three distinct
C. has three unique
D. has three distinct unique
Answer» A. does not have three distinct
discuss
99.
The value of 52003 mod 7 is(use fermat's theorem)
A. 3
B. 4
C. 8
D. 9
Answer» A. 3
discuss
100.
Elliptic curve cryptography follows the associative property
A. true
B. false
Answer» A. true
101.
In Elgamal cryptosystem, given the prime p=31,What is the respective plaintext
character for C = (27, 20)?
A. h
B. l
C. o
D. m
Answer» A. h
discuss
102.
How many real and imaginary roots does the equation y2=x3-1 have
A. 2 real, 1 imaginary
B. all real
C. all imaginary
D. 2 imaginary, 1 real
Answer» D. 2 imaginary, 1 real
discuss
103.
“In ECC, the inverse of point P =(x1, y1) is Q = (-x1, y1). “
A. true
B. false
Answer» B. false
discuss
104.
In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is
P + Q if P = (0,-4) and Q = (1, 0)?
A. (15, -56)
B. (-23, -43)
C. (69, 26)
D. (12, -86)
Answer» A. (15, -56)
discuss
105.
How many real and imaginary roots does the equation y2=x3-4x have
A. 2 real, 1 imaginary
B. all real
C. all imaginary
D. 2 imaginary, 1 real
Answer» B. all real
discuss
106.
In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is
2P if P = (4, 3.464)
A. (12.022, -39.362)
B. (32.022, 42.249)
C. (11.694, -43.723)
D. (43.022, 39.362)
Answer» A. (12.022, -39.362)
discuss
107.
In public key cryptosystem keys are used for encryption and decryption.
A. same
B. different
C. encryption keys
D. none of the mentioned
Answer» B. different
discuss
108.
PGP system uses
A. private key system
B. public key system
C. private & public key system
D. none of the mentioned
Answer» C. private & public key system
discuss
109.
Knapsack problem can be solved by
A. public key cryptosystem
B. public key system
C. private & public key system
D. none of the mentioned
Answer» A. public key cryptosystem
discuss
110.
Merkle hellman is a symmetric cryptosystem.
A. true
B. false
Answer» B. false
discuss
111.
In public key cryptosystem which is kept as public?
A. encryption keys
B. decryption keys
C. encryption & decryption keys
D. none of the mentioned
Answer» A. encryption keys
discuss
112.
A cryptographic hash function has variable output length.
A. true
B. false
Answer» B. false
discuss
113.
In a trapdoor function, the functions are easy to go in
A. one direction
B. two directions
C. all directions
D. none of the mentioned
Answer» A. one direction
discuss
114.
Which algorithm can be used to sign a message?
A. public key algorithm
B. private key algorith
C. public & private key algorithm
D. none of the mentioned
Answer» A. public key algorithm
discuss
115.
In this Merkle Hellman method same key is used for encryption and decryption.
A. true
B. false
Answer» B. false
discuss
116.
A set of numbers is called as super increasing if
A. each element is greater than previous element
B. each element greater than sum of all the previous elements
C. each element greater than the average of all elements
D. each element lesser than the sum of all the elements
Answer» B. each element greater than sum of all the previous elements
discuss
117.
There are major ways of stealing email information.
A. 2
B. 3
C. 4
D. 5
Answer» B. 3
discuss
118.
Which of them is not a major way of stealing email information?
A. stealing cookies
B. reverse engineering
C. password phishing
D. social engineering
Answer» B. reverse engineering
discuss
119.
is the method for keeping sensitive information in email communication &
accounts secure against unofficial access, loss, or compromise.
A. email security
B. email hacking
C. email protection
D. email safeguarding
Answer» A. email security
discuss
120.
is a famous technological medium for the spread of malware, facing
problems of spam, & phishing attacks.
A. cloud
B. pen drive
C. website
D. email
Answer» D. email
discuss
121.
Fraudulent email messages are some fake email messages that seem legitimate which
asks for your confidential bank details such as details and passwords.
A. credit card, antivirus name
B. credit card, login id
C. cell phone, antivirus name
D. car model, account id
Answer» B. credit card, login id
discuss
122.
Unsolicited Bulk E-mails (UBI) are called
A. sms
B. mms
C. spam emails
D. malicious emails
Answer» C. spam emails
discuss
123.
Using email hacking illicit hackers can send & spread virus
and spam emails.
A. trojans, redirected malicious urls
B. antivirus, patches
C. cracked software, redirected malicious urls
D. malware, security patches
Answer» A. trojans, redirected malicious urls
discuss
124.
is the technique used for tricking users to disclose their username and
passwords through fake pages.
A. social engineering
B. phishing
C. cookie stealing
D. banner grabbing
Answer» B. phishing
discuss
125.
Which of them is an example of grabbing email information?
A. cookie stealing
B. reverse engineering
C. port scanning
D. banner grabbing
Answer» A. cookie stealing
discuss
126.
Which of the following is a non-technical type of intrusion or attack technique?
A. reverse engineering
B. malware analysis
C. social engineering
D. malware writing
Answer» C. social engineering
discuss
127.
If the data stored in the is not encrypted, then after cookie stealing,
attackers can see information such as username and password stored by the cookie.
A. memory
B. quarantine
C. cookies
D. hard drive
Answer» C. cookies
discuss
128.
The stored cookie which contains all your personal data about that website can be
stolen away by using or trojans.
A. attackers, malware
B. hackers, antivirus
C. penetration testers, malware
D. penetration testers, virus
Answer» A. attackers, malware
discuss
129.
If a website uses a cookie, or a browser contains the cookie, then every time you
visit that website, the browser transfers the cookie to that website.
A. true
B. false
Answer» A. true
discuss
130.
Which of them is not a proper method for email security?
A. use strong password
B. use email encryption
C. spam filters and malware scanners
D. click on unknown links to explore
Answer» D. click on unknown links to explore
discuss
131.
What are email security services?
A. confidentiality
B. authentication
C. non-repudation of origin
D. all of the above
Answer» D. all of the above
discuss
132.
PGP security system uses
A. public key cryptosystem
B. private key cryptosystem
C. public & private key cryptosystem
D. none of the mentioned
Answer» C. public & private key cryptosystem
discuss
133.
What is the key size allowed in PGP?
A. 1024-1056
B. 1024-4056
C. 1024-4096
D. 1024-2048
Answer» C. 1024-4096
discuss
134.
Who created PGP?
A. phil zimmermann
B. tim berners-lee
C. marc andreessen
D. ken thompson
Answer» A. phil zimmermann
discuss
135.
What is the PGP stand for?
A. permuted gap permission
B. permuted great privacy
C. pretty good privacy
D. none of the mentioned
Answer» C. pretty good privacy
discuss
136.
PGP makes use of which cryptographic algorithm?
A. des
B. aes
C. rsa
D. rabin
Answer» C. rsa
discuss
137.
PGP offers block ciphers for message encryption?
A. triple-des
B. cast
C. idea
D. all of the above
Answer» D. all of the above
discuss
138.
S/MIME stands for .
A. standard multipurpose internet mail extensions.
B. secure multipurpose internet mail extensions.
C. secure multipurpose international mail extensions
D. standard multipurpose international mail extensions.
Answer» B. secure multipurpose internet mail extensions.
discuss
139.
is used for hiding the payment information from the merchant.
A. set.
B. ssl.
C. shttp
D. tsp
Answer» A. set.
discuss
140.
The cryptography algorithms used in S/MIME are .
A. idea.
B. rc4
C. rsa,des-3
D. rc5
Answer» C. rsa,des-3
discuss
141.
In S/MIME,MLA stands for .
A. mailing list agent.
B. multipurpose list agent.
C. mail lock agent.
D. message link agen
Answer» A. mailing list agent.
discuss
142.
Which component is included in IP security?
A. authentication header (ah)
B. encapsulating security payload (esp)
C. internet key exchange (ike)
D. all of the mentioned
Answer» A. authentication header (ah)
discuss (1)
143.
WPA2 is used for security in
A. ethernet
B. bluetooth
C. wi-fi
D. email
Answer» C. wi-fi
discuss
144.
An attempt to make a computer resource unavailable to its intended users is called
A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process
Answer» A. denial-of-service attack
discuss
145.
PGP is used in
A. browser security
B. email security
C. ftp security
D. wifi security
Answer» B. email security
discuss
146.
In tunnel mode, IPSec protects the
A. entire ip packet
B. ip header
C. ip payload
D. ip trailer
Answer» A. entire ip packet
discuss
147.
IPSec is designed to provide security at the
A. transport layer
B. network layer
C. application layer
D. session layer
Answer» B. network layer
discuss
148.
Which of the following is not a strong security protocol?
A. https
B. ssl
C. smtp
D. sftp
Answer» C. smtp
discuss
149.
SSL primarily focuses on
A. integrity and authenticity
B. integrity and non-repudiation
C. authenticity and privacy
D. confidentiality and integrity
Answer» A. integrity and authenticity
discuss
150.
Why did SSL certificate require in HTTP?
A. for making security weak
B. for making information move faster
C. for encrypted data sent over http protocol
D. for sending and receiving emails unencrypted
Answer» C. for encrypted data sent over http protocol
discuss
151.
SFTP is abbreviated as
A. secure file transfer protocol
B. secured file transfer protocol
C. secure folder transfer protocol
D. secure file transferring protoco
Answer» A. secure file transfer protocol
discuss
152.
mointors user activity on internet and transmit that information in the
background to someone else
A. malware
B. spyware
C. adware
D. none of these
Answer» B. spyware
discuss
153.
Firewall is type of------
A. virus
B. security threat
C. worm
D. none of these
Answer» D. none of these
discuss
154.
The full form of Malware is
A. malfunctioned software
B. multipurpose software
C. malicious software
D. malfunctioning of security
Answer» C. malicious software
discuss
155.
There are types of computer virus.
A. 5
B. 7
C. 10
D. 12
Answer» C. 10
discuss
156.
A computer is a malicious code which self-replicates by copying itself to
other programs.
A. program
B. virus
C. application
D. worm
Answer» B. virus
discuss
157.
Which of them is not an ideal way of spreading the virus?
A. infected website
B. e-mails
C. official antivirus cds
D. usbs
Answer» C. official antivirus cds
discuss
158.
is the kind of firewall is connected between the device and the
network connecting to internet.
A. hardware firewall
B. software firewall
C. stateful inspection firewall
D. microsoft firewall
Answer» A. hardware firewall
discuss
159.
Which of the following is not a software firewall?
A. windows firewall
B. outpost firewall pro
C. endian firewall
D. linksys firewall
Answer» D. linksys firewall
discuss
160.
Firewall examines each that are entering or leaving the internal network
A. emails users
B. updates
C. connections
D. data packets
Answer» D. data packets
discuss
161.
A firewall protects which of the following attacks?
A. phishing
B. dumpster diving
C. denial of service
D. shoulder surfing
Answer» C. denial of service
discuss
162.
Packet filtering firewalls are deployed on
A. routers
B. switches
C. hubs
D. repeaters
Answer» A. routers

You might also like