0% found this document useful (0 votes)
208 views53 pages

This Sheet Is For 1 Mark Questions S.R No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

This document contains questions about information security concepts and technologies. It includes questions about topics like confidentiality, integrity, availability, attacks like man-in-the-middle attacks, encryption algorithms and protocols like AES, RSA, Diffie-Hellman, PGP, SSL, IPSec, VPNs and digital signatures. The questions are multiple choice or fill-in-the-blank format with one mark being awarded for each correct answer.

Uploaded by

DEEPTI RANA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
208 views53 pages

This Sheet Is For 1 Mark Questions S.R No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

This document contains questions about information security concepts and technologies. It includes questions about topics like confidentiality, integrity, availability, attacks like man-in-the-middle attacks, encryption algorithms and protocols like AES, RSA, Diffie-Hellman, PGP, SSL, IPSec, VPNs and digital signatures. The questions are multiple choice or fill-in-the-blank format with one mark being awarded for each correct answer.

Uploaded by

DEEPTI RANA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 53

This sheet is for 1 Mark questions

S.r No Question

1 _______ is the practice and precautions taken to protect valuable information from unauthorized
access, recording, disclosure or destruction.
2
_______ platforms are used for safety and protection of information in the cloud.
3 Compromising confidential information comes under _________
4 An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
5 The CIA triad is often represented by which of the following?
6 Related to information security, confidentiality is the opposite of which of the following?
7 When you use the word ______it means you are protecting your data from getting disclosed.
8 _______ means the protection of data from modification by unknown users.
9 _______ of information means, only authorized users are capable of accessing the information.
10 This helps in identifying the origin of information and authentic user. This referred to here as
__________
11 Data ___________ is used to ensure confidentiality.
12
What does OSI stand for in the OSI Security Architecure?
13 A company requires its users to change passwords every month. This improves the ________ of the
network.
14
Release of message contents and Traffic analysis are two types of _________ attacks.
15 The ________ is encrypted text.
16 What type of attack uses a fraudulent server with a relay address?
17
Which of the following Algorithms not belong to symmetric encryption
18 Which is the largest disadvantage of the symmetric Encryption?
19 In cryptography, what is cipher?

20 In asymmetric key cryptography, the private key is kept by __________


21 Which one of the following algorithm is not used in asymmetric-key cryptography?
22 In cryptography, the order of the letters in a message is rearranged by __________

23 What is data encryption standard (DES)?


24 A asymmetric-key (or public key ) cipher uses
25 In asymmetric key cryptography, the two keys e and d, have special relationship to
26 _________________ is the process or mechanism used for converting ordinary plain text into
garbled non-human readable text & vice-versa.
27 ______________ is a means of storing & transmitting information in a specific format so that only
those for whom it is planned can understand or process it.
28 4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use
___________ for a secure transformation of data.
29 Conventional cryptography is also known as _____________ or symmetric-key encryption.
30 The procedure to add bits to the last block is termed as _________________
31 How many rounds does the AES-192 perform?
32
ECC encryption system is __________
33 ________function creates a message digest out of a message.

34 Extensions to the X.509 certificates were added in version ____


35 A digital signature needs ____ system
36 “Elliptic curve cryptography follows the associative property.”
37 ECC stands for
When a hash function is used to provide message authentication, the hash function value is referred
38 to as

39 Message authentication code is also known as

40 The main difference in MACs and digital signatures is that, in digital signatures the hash value of the
message is encrypted with a user’s public key.
41 The DSS signature uses which hash algorithm?
42 What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
43 In the handshake protocol which is the message type first sent between client and server ?
44 One commonly used public-key cryptography method is the ______ algorithm.
45 he ________ method provides a one-time session key for two parties.
46 The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not
authenticated to each other.
47 In the handshake protocol which is the message type first sent between client and server ?
48 1. VPN is abbreviated as __________

49 __________ provides an isolated tunnel across a public network for sending and receiving data
privately as if the computing devices were directly connected to the private network.
50 Which of the statements are not true to classify VPN systems?

51 What types of protocols are used in VPNs?

52 VPNs uses encryption techniques to maintain security and privacy which communicating remotely
via public network.
53 There are _________ types of VPNs.

54 _________ type of VPNs are used for home private and secure connectivity.
55 Which types of VPNs are used for corporate connectivity across companies residing in different
geographical location?
56 Site-to-Site VPN architecture is also known as _________

57 There are ________ types of VPN protocols.

58 IPSec is designed to provide security at the _________


59 In tunnel mode, IPSec protects the ______
60 Pretty good privacy (PGP) is used in ______

61
PGP encrypts data by using a block cipher called ______
62 IKE creates SAs for _____.
63 ______ provides either authentication or encryption, or both, for packets at the IP level.
64 A _______network is used inside an organization.
65 SSL provides _________.
66 IKE uses _______
67 In ______, there is a single path from the fully trusted authority to any certificate.
68 A ______ provides privacy for LANs that must communicate through the global Internet.
69 _______ uses the idea of certificate trust levels.
70 ________ provides privacy, integrity, and authentication in e-mail.
71 In _____, there can be multiple paths from fully or partially trusted authorities.
72 ______ provides authentication at the IP level.
73 In _______, the cryptographic algorithms and secrets are sent with the message.
74 ______ was invented by Phil Zimmerman.

75
ISAKMP stands for ______
76 PGP makes use of which cryptographic algorithm?
77 What is the key size allowed in PGP?

78
In SSL, what is used for authenticating a message?

79
S/MIME is abbreviated as __________________
80 Security Measures Needed to protect ________ during their transmission
81 __________ means knowledge obtained from investigation, study , intelligence new ,facts .
82 Prevention of the unauthorised used of Resources refers too?
83 Protection against Denial by one of these parties in a communication refers to?
84
Which One of them is Passive attack?
85 What is lying of IP address called as?
86
What is full form of DDoS?
87 A hacker guessing suggested password to a program is call as?
88
Symmetric key encryption is also called as?
89 Conversion of Cypher text to plain text?
90 __is used to create the organisation's overall security program.
91 An act of protecting information from unauthorised disclouser to an entity.-
92 A way to ensure that the entity is indeed what it claims to be.-
93 The__model is 7 layer architecture where each layer is having some specific functionality to perform.
94
The full form of OSI is OSI model__.
95 The technique in which when one character is replaced by another Character is called as?
96 Conversion of plain text into Cipher text is called as________.
97 In Symmetric schemes requires both parties to share how many secret key?
98 Blum Blum Shub Generator is based on which Algorithm?
99 In DES step both LPT and RPT undergoes in how much key Rounds?
100 What is the 4th step in DES Algorithm?
101 In AES in which Round Subkeys are Generated from Original key for each round?
102
AES stands for?
103 Which of them is type of Cipher?
104 The message which is not understandable is called as?
105 The__is a polygraphic substitution cipher based on linear algebra.
106 __is the practice of concealing a message within another message,image or file.
107 In asymmetric key cryptography, the private key is kept by __________
108 What is data encryption standard (DES)?
109 In cryptography the original message before being transform is called
110 An asymmetric-key (or public-key) cipher uses
111 In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual
messages, it is very slow if the message is
112 The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties
are not
113 In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
114 For RSA to work, the value of P must be less than the value of
115 In RSA, Ф(n) = _______ in terms of p and q.
116 In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).
117 RSA is also a stream cipher like Merkel-Hellman.
118
USENET falls under which category of public key sharing?
119 PGP makes use of which cryptographic algorithm?
120
Public key cryptography also called as________
121
ECC stands for
122
Diffie-Hellman algorithm is widely known as_________
123 Hash function is used for________
124
RSA algorithm is best example of_______
125 IPSec is designed to provide security at the _________
126 In tunnel mode, IPSec protects the ______

127
HTTPS is abbreviated as _________
128 An attempt to make a computer resource unavailable to its intended users is called ______
129
SSL primarily focuses on _______
130 Pretty good privacy (PGP) is used in ______
131 __________ is used for encrypting data at network level
132 WPA2 is used for security in _______
133 Which of the following is not a strong security protocol
134 TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based
connection.
135 IPSec operates in..... different modes
136 length of the IPv4 address is ....
137 Internet Key Exchange has .... phases and modes of operations
138 PGP is abbreviated as
139
SET stands for
140 Transport layer Protocol consists of ... main components
141 length of the IPv6 acddress is ....
142 SSL provides _________.
143 IPSec provides ....protocols for network layer
144 length of the IPv6 header is....
Image a b c

a) Network Security b) Database Security c) Information Security


a) Cloud workload b) Cloud security
protection platforms protocols c) AWS
a) Bug b) Threat c) Vulnerability
a) Cyber-crime b) Cyber Attack c) System hijacking
a) Triangle b) Diagonal c) Ellipse
a) Closure b) Disclosure c) Disaster
a) Confidentiality b) Integrity c) Authentication
a) Confidentiality b) Integrity c) Authentication
a) Confidentiality b) Integrity c) Non-repudiation

a) Confidentiality b) Integrity c) Authenticity


a) Encryption b) Locking c) Decryption
b) Open Systems
a) Open System Interface Interconnections c) Open Source Initiative

a) Performance b) Reliability c) Security


b) Modification of
a) Active Attack Attack c) Passive attack
a) Cipher scricpt b) Cipher text c) Secret text
NTLM MITM NetBIOS
3DES (TripleDES)
RSA RC5
More complex and therefore
Problem of the secureLess secure encryption functi

algorithm for performing e encrypted message both algorithm for performin


sender receiver sender and receiver
rsa algorithm diffie-hellman algori electronic code book algorit

transpositional ciphers substitution ciphers both transpositional ciphers a


block cipher stream cipher bit cipher
1 key 2 key 3 key
others data keys

Malware Analysis Exploit writing Reverse engineering

Malware Analysis Cryptography Reverse engineering

secret key external programs add-ons


secret-key public key protected key
decryption hashing tuning
10 12 14
symmetric key encryption
algorithm asymmetric key encrnot an encryption algorithm

encryption decryption hash


1 2 3
symmetric-key asymmetric-key either (a) or (b)
1 0
Elliptic curve cryptography Enhanced curve cryptElliptic cone cryptography

Message Field Message Digest Message Score

key code hash code keyed hash function

1 0
MD5 SHA-2 SHA-1
42 bytes 32 bytes 36 bytes
server_hello client_hello hello_request
RSS RAS RSA
Diffie-Hellman RSA DES

man-in-the-middle ciphertext attack plaintext attack


server_hello client_hello hello_request

Visual Private Network Virtual Protocol NetwVirtual Private Network

Visual Private Network Virtual Protocol NetwVirtual Protocol Networking

Protocols used for tunnelling


Whether VPNs are prov
Securing the network from b

Application level protocols Tunnelling protocols Network protocols

1 False

3 2 5
Remote access VPNs Site-to-site VPNs Peer-to-Peer VPNs

Remote access VPNs Site-to-site VPNs Peer-to-Peer VPNs

Remote connection based Peer-to-Peer VPNs Extranet based VPN

3 4 5
Transport layer Network layer Application layer
Entire IP packet IP header IP payload
Browser security Email security FTP security
Private data
International data encryption Internet data encryption
encryption algorithm algorithm algorithm
SSL PGP IPSec
AH ESP PGP
private public semi-private
message integrity confidentiality compression
Oakley SKEME ISAKMP
X509 PGP KDC
VPP VNP VNN
X509 PGP KDC
IPSec SSL PGP
X509 PGP KDC
AH ESP PGP
IPSec SSL TLS
IPSec SSL PGP
Internet Security
Internet system Association and Key
Association and Key Management Interchange System And
Management Packet Protocol Key Modeling Protocol
DES AES RSA
1024-1056 1024-4056 1024-4096
MAC (Message
MAC (Message Access Authentication MAC (Machine
Code) Code) Authentication Code)

Secure/Multimedia Secure/Multipurpos
Internet Mailing e Internet Mailing Secure/Multimedia Internet
Extensions Extensions Mail Extensions
file Data packet
Security Data Information
Data Integrity Data confidentiality Acess Control
Non-Repudiation Data integrity Authentication
modify message in
Denial of Service transit Replay previous message
IP Spoofing IP Scamming IP Lying
Distributed Denial of
Derived Denial of service service Denial of service
Password Guessing Dictionary Attack Default password attack
Private Key
public key Encryption Encryption Both of these
Encryption Decryption Simple text
program policy purpose security
intergrity avability confidentiality
Authentication Accountability identification
TCP OSI OIS
open systems open software
interconnection interconnection open connection
Transposition Substitution Combinational
Encryption Decryption Hidden Text
one two three
Private key Public key both a & b
8 16 32
key transformation S-box Substitution P-box Permutation
Key Expansion Initial Round Finale Round
Authorized Encryption Advance Encryption
Standard Standard Advance Encryption Strategy
Stream Cipher Block Cipher both of Them
Cipher Text plain text Hidden text
Hill cipher playfair cipher Affine cipher
steganography cryptography cipher
sender receiver sender and receiver
block cipher stream cipher bit cipher
simple text plain text empty text
1 key 2 key 3 key

Short Flat Long

Authenticated Joined Submit


other Data Keys
p q n
 (p)/(q)  (p)(q) (p-1)(q-1)
1 0
1 0
publicly available
public announcement directory public key authority
RSA AES DES
Asymmetric key Symmetric key
cryptography cryptography Both a and b
Elliptic Curve Elliptic Cryptography
Cryptography Curve Error Correcting Code
key agreement
Key exchange algorithm algorithm only a
Message authentication Digital Signature Both a and b
Asymmetric key Symmetric key
cryptography cryptography Elliptic Curve Cryptography
Transport layer Network layer Application layer
Entire IP packet IP header IP payload
Secured Hyper
Hypertexts Transfer Text Transfer Hyperlinked Text Transfer
Protocol Secured Protocol Protocol Secured
Denial-of-service attack Virus attack Worms attack
integrity and non-
integrity and authenticity repudiation authenticity and privacy
Browser security Email security WiFi security
IPSec HTTPS SMTP
Ethernet Wi-Fi Bluetooth
SSL HTTPL SMTP
1 0
3 2 4
32 bits 64 bits 16 bits
4 3 2
Pretty Good Privacy Pretty Good Policy Policy Good Privacy
Secure Electronic Simple Electronic
Set Electronic Transaction Transaction Transaction
2 1 3
32 bits 64 bits 16 bits
message integrity confidentiality compression
7 3 1
64 bits 16 bits 32 bits
Correct
d
Answer

c
d) Physical Security

d) One Drive a
d) Attack b
d) Digital crime b
d) Circle a
d) Disposal b
d) Availability a
d) Non-repudiation b
d) Availability d

d) Availability c
d) Backup a
d) Open Standard
Interconnections b

d) None of the above c

d) DoS Attack c
d) Secret script b
SMB b

IDEA b
Isn't used any more. b

decrypted message a
all the connected devices b
dsa algorithm c

quadratic ciphers a
byte cipher a
4 key b
each other d

Cryptography d

Exploit writing b

secondary key a
primary key a
padding d
16 b
block cipher method b

none of the above c


4 c
neither (a) nor (b) b
a
Eclipse curve cryptograph a

Message Leap d

message key hash functi b

b
Does not use hash algori c
48 bytes c
certificate_request b
RAA c
AES a

none of the above a


certificate_request b

Virtual Protocol Networki c

Virtual Private Network d

Levels of security provid c

Mailing protocols a

4 b
Router-to-router VPNs a

Country-to-country VPNs b

Country-to-country VPNs c

6 d
Session layer b
IP trailer a
WiFi security b

Local data encryption


algorithm a
VP c
SSL b
semi-public a
all of the above d
all of the above d
none of the above a
VPN d
none of the above b
none of the above c
none of the above b
SSL a
PGP d
none of the above c

Internet Security
Association and Key
Modeling Protocol b
Rabin c
1024-2048 c

MAC (Machine Access


Code) b

Secure/Multipurpose
Internet Mail Extensions d
All of above b
None of These c
None of these c
None of these a

obtain message contain d


None Of theses a

None of these b
None of these c

None of these b
none of these b
none of these a
none of these c
security a
none of these b

open system internet a


None of these b
none of above a
four a
none of these b
64 b
Expansion permutation c
none of these a

none of these b
none of these c
both a & c a
none of these a
receiver a
none of these b
byte cipher a
filled text b
4 key a

Thin c

Separate a
Each other d
r c
 (p+1)(q+1) c
b
a

public key certificate a


ROBIN a

None of the above a

None of the above a

Both a and b d
only a c

All of the above a


Session layer b
IP trailer a

Hyper Text Transfer


Protocol Secure d
Botnet process a
confidentiality and
integrity a
FTP security b
S/MIME a
E-mail b
SFTP c
a
5b
128 bit a
5c
Pretty Good Protection a

none of the above b


4a
128 bit b
all of the above d
4a
8 bits c
This sheet is for 2 Mark questions
S.r No Questions

According to the CIA Triad, which of the below-mentioned element is not considered in
1 the triad?
2 When integrity is lacking in a security system, _________ occurs.

3 Data integrity gets compromised when _____ and _____ are taken control off.

4 Which of the following type of attack can actively modify Communications or data?

5 Which of the following is a form of DoS attack?

6 A digital signature is
________is a term used in cryptography that refers to a message before encryption or
7 after decryption.

8 What is the role of Key Distribution Center?


9 All the following are examples of real security and privacy threats except:

10 From the options below, which of them is not a vulnerability to information security?

11 From the options below, which of them is not a threat to information security?
_________is the art as well as science of secret writing of information / message and
makes them non-readable. The process of studying methods of breaking cipher text
12 message called as________

13 ___________ is a weakness that can be exploited by attackers.

14 Which of the following is not the External Security Threats?


If a security mechanism offers availability, then it offers a high level of assurance that
15 the data, objects, and resources are _______________ by authorized subjects.

Assymmetric Encryption: Why can a message encrypted with the Public Key only be
16 decrypted with the receiver's appropriate Private Key?
In which way does the Combined Encryption combine symmetric and assymmetric
encryption?
17

18 When __________ is converted to unreadable format, it is termed as _____________


____________ is a mono-alphabetic encryption code wherein each & every letter of
19 plain-text is replaced by another letter in creating the cipher-text.
________________ is a cipher formed out of substitution where for a given key-value
the cipher alphabet for every plain text remains fixed all through the encryption
20 procedure.
______________ employs a text string as a key that is implemented to do a series of
21 shifts on the plain-text.
In _____________ a sequence of actions is carried out on this block after a block of
22 plain-text bits is chosen for generating a block of cipher-text bits.
In _______________ the plain-text is processed 1-bit at a time & a series of actions is
23 carried out on it for generating one bit of cipher-text.
24 Which of the following is not an example of a block cipher?
_________ is implemented using the Feistel Cipher which employs 16 round of Feistel
25 structure.
____________ carries out all its calculations on bytes rather than using bits and is at
least 6-times faster than 3-DES.
26
27 The 4×4 byte matrices in the AES algorithm are called
28 In AES the 4×4 bytes matrix key is transformed into a keys of size __________

29 DES follows
The DES Algorithm Cipher System consists of ____________rounds (iterations) each
30 with a round key and The DES algorithm has a key length of______
31 Digital signature provides_____
How many real and imaginary roots does the equation y2=x3-1 have
32
How many real and imaginary roots does the equation y2=x3-4x have
33
The main difference in MACs and digital signatures is that, in digital signatures the hash
34 value of the message is encrypted with a user’s
The RSA signature uses which hash algorithm?
35
To implement Diffie-Hellman, the two end users Alice and Bob, while communicating
over a channel they know to be private, mutually agree on positive whole numbers p
36 and q, such that p is a _______ and q is a ______ of p.
Kerberos builds on ______ cryptography and requires a _____, and optionally may use
37 public cryptography during certain phases of authentication
For kerberose authentication first step, the client authenticates itself to the ____which
38 forwards the username to a_____.

39 AS stands for ______ and KDC stands for ______ .


40 SHA-l has a message digest of____
A hash function guarantees ______ of a message. It guarantees that message has not
41 be__________
A digital signature needs a____ and verifying the _____of digital messages or
42 documents

A digital signature scheme typically consists of three algorithms;

43

44 MD5 algorithm used to produce ___ and ____


45 MD5 produces __________ bits hash data and SHA-1 produces __________ bit of hash.

46 A digital signature is

5. Which of the following statements are correct?


1. PGP uses assymmetric encryption.
2. In the world wide web, primarly symmetric Encryption is used.
3. Symmetric encryption is require only one key for encryption
4. PGP uses combined encryption.
47
48 For secure connection, Remote access VPNs rely on ___________ and ____________

Security protocol for the e-mail system is _________


i)IPSec
ii) SSL
iii) PGP
49 iv)none of the above
Typically, ______ can receive application data from any application layer protocol, but
50 the protocol is normally HTTP.
51 IPSec defines two protocols: _______ and ________.
In the ______ mode, IPSec protects information delivered from the transport layer to
52 the network layer.
53 IPSec in the ______ mode does not protect the IP header.
______ is designed to provide security and compression services to data generated from
54 the application layer.
55 _______ provide security at the transport layer.

56 SSL primarily focuses on _______


57 Pretty good privacy (PGP) security system uses
58 In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
59 In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
In the _______ mode, IPSec protects the whole IP packet, including the original IP
60 header.
The _______ mode is normally used when we need host-to-host (end-to-end) protection
61 of data.

62 Using VPN, we can access _______________


__________ masks your IP address and _________ are also used for hides user’s
63 physical location.
In _______, the cryptographic algorithms and secrets are sent with the message. ______
64 was invented by Phil Zimmerman.

_________ is used for encrypting data at network level.


i)IPSec
ii) HTTPS
iii)SMTP
65 iv)S/MIME
What types of protocols are used in VPNs?
66

67 Which of them is active attack?


68 The act of sending false information to a resource is called as?
69 Asymmetric
When attackerKeycreates
Encryption
fake iswebsite,
also called as?
which is same as original / real website is called
70 as?
Instructions that are put into a computer program in order to stop it working properly and
71 destroy information
72 An ________ is a network exploit in which hacker attempt to make changes on Data
73 A malware which misleads users of it's true intent is called as?
74 Conversion of plain text into Cypher text is called as?
75 Vernam Cipher is also called as?
76 In which Encryption method 2 separate key for Encryption and Decryption?

77 which of the following is not vulnerability of the network layer?


__details out the security practices explicitly for a particular issue or function as relevant
78 to the organisation.
__is the most granular form of policy that provide information and direction for particular
79 system.
when there is an excessive amount of data flow, which the system cannot handle, _____
80 attack takes place.
__is a network attack in which a system is monitored and sometimes scanned for open
81 ports and vulnerabilities.
82 In the Encryption of 64 bits of data in block and produces _____ of Cipher text
83 In Expansion permutation ,RPT is Expanded From 32 bits to ?
84 In AES key Size is?
85 Link Encryption can occurs at which layer?
86 Blum Blum Shub Generator is best for?
87 In S- Box Substitution key transform from 56 bit to?
88 In AES how many Permutation are performed?
89 In AES how many Substitution are performed?

90 DES stands for?


91 Key must be at least of how many bits?
The__is a symmetric-key based encryption technique that uses digraph substitution
92 cipher.
A__is an electro-mechanical stream cipher device used for encrypting and decrypting
93 secret messages.
In the DES algorithm, although the key size is 64 bits only 48bits are used for the
94 encryption procedure, the rest are parity bits.

95 Major attributes of AES-

96 Asymmetic keys based cryptography is also called as__.


97 In an asymmetric-key cipher, the sender uses the__________ key.
98 The _______ is a number or a set of numbers on which the cipher operates.
99 The ________ method provides a one-time session key for two parties.
In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not
100 needed for which of the following cipher systems?

101 Which systems use a timestamp?


102 p = 7; q = 11; M = 8 find C

103 Which of these systems use timestamps as an expiration date?


In an RSA system the public key of a given user is e = 31, n = 3599. What is the private
104 key of this user?
105 Set {1, 2, 3, 9, 10, and 24} is superincreasing
106 The relationship between a character in the plaintext to a character is
107 Elliptic Curve Cryptography uses smaller key size than RSA algorithm
Which of the following authentication method(s) are used in public cryptography.
108 a) Hash Function. b) Message Encryption. c) Message Authentication Code

109 Process of transforming input message m into a fixed size string is called as
Which of the following is true
a) MD5 uses a 128 bit message digest
110 b) MD5 is vulnerable against crytanalysis
111 The concept of ticket (digital documents that stores session key) as token is used by
When a DNS server accepts and uses incorrect information from a host that has no
112 authority giving that information, then it is called _________
113 Which of the following is not a secured mail transferring methodology?

114 SFTP is abbreviated as ________


______ provides either authentication or encryption, or both, for packets at the IP
115 level.
116 One security protocol for the e-mail system is _________.
117 A _______network is used inside an organization
118 SSL provides _________.
119 An _________ is a network that allows authorized access from outside users.
_________ is a collection of protocols designed by the IETF (Internet
120 Engineering Task Force) to provide security for a packet at the network level.
121 IPSec uses a set of SAs called the ________.
122 Transport layer Protocol components are...

123 IPSec provides which protocols for network layer


124 In Handshake protocol, Handshaking is done in how many phases
125 To protect credit card transactions over internet which protocol is used
126 Internet Key Exchange has which of the following modes of operations
127 ___ is a suite of protocol that protects IP traffic.
128 What type of protocols are used in VPNs?

A remote-access VPN typically depends on either ____ or ____ for a secure


129 connection over public network.

130 Site- to- site VPNs are also known as___.

131 Which protocol consists of only 1 bit?


Image a b c d

a) Confidentiality b) Integrity c) Authenticity d) Availability


a) Database hacking b) Data deletion c) Data tampering d) Data leakage
a) Access control, file b) Network, file c) Access control, file
deletion permission permission d) Network, system
a) Both Active and Passive b) Neither Active nor d) Passive Attack
attack Passive Attack c) Active Attack Only Only
b) Bandwidth c) Connection d) All of the
a) Vulnerability attack flooding flooding mentioned

c) an authentication
of an electronic
b) a unique record by tying it
a) a bit string giving identity identification of a uniquely to a key d) an encrypted
of a correspondent sender only a sender knows signature of a sender

a) Cipher text b) Plain text c) Plain script d) Original text


b) It intended to
reduce the risks
a) It is used to distribute inherent in c) All of the d) None of the
keys to everyone in world exchanging keys mentioned mentioned
a) Hackers b) Virus c) Spam d) Worm
b) without deleting
data, disposal of c) unchanged default d) latest patches and
a) flood storage media password updates not done
c) Information d) Unchanged
a) Disaster b) Eavesdropping leakage default password

b) Cryptanalyst, c) Cryptography, d) Decryption,


a) Cryptanalyst, Cryptology Confidentiality Cryptanalyst Cryptology
b) System without c) System with d) System with a
a) System with Virus firewall vulnerabilities strong password
c) Underground d) Denial of Service
a) Front-door Threats b) Back-door Threats Threats (DoS)

a) Controlled b) Audited c) Accessible d) Repudiated

The Public Key


contains a special
function which is The encrypted
used to encrypt the message contains
A so called "one way message and which the function for
Not true, the message can function with back can only be reversed decryption which
also be decrypted with the door" is applyed for by the appropriate identifies the Private
Public Key. the encryption. Private Key. Key.
First, the message
is encrypted with
assymmetric
encryption and
First, the message is The secret key is aferwards it is The secret key is
encrypted with symmetric symmetrically encrypted assymmetrically
encryption and aferwards it transmitted, the symmetrically transmitted, the
is encrypted assymmetrically message itself together with the message itself
together with the key. assymmetrically. key symmetrically.
plain text, cipher- ciphen-text, plain
plain text, rotten text raw text, cipher-text text text
Monoalphabetic
Polyalphabetic Cipher Caesar Cipher Playfair Cipher Cipher

Monoalphabetic
Polyalphabetic Cipher Caesar Cipher Playfair Cipher Cipher

Vigenere Cipher Shift Cipher Playfair Cipher Block Cipher

Block Cipher One-time pad Hash functions Vigenere Cipher

Block Cipher One-time pad Stream cipher Vigenere Cipher


DES IDEA Caesar cipher Twofish

DES IDEA Caesar cipher Twofish

DES AES Caesar cipher Twofish


States Words Transitions Permutations
32 words 64 words 54 words 44 words
Feistel Cipher
Hash Algorithm Caesars Cipher Structure SP Networks

12; 128 Bits 18; 32 Bits 9 ; 16 Bits 16 ; 64 Bits


authentication nonrepudiation both (a) and (b) neither (a) nor (b)

2 real, 1 imaginary all real all imaginary 2 imaginary, 1 real

2 real, 1 imaginary all real all imaginary 2 imaginary, 1 real


private key, as well as public
key private key. public key none of above
None of the
MD5 SHA-1 MD5 and SHA-1 mentioned.

prime number; odd number;


prime number; square generator generator odd number; square
symmetric key; trusted third asymmetric key; symmetric key; asymmetric
party trusted third party unnown key;unkown party;
Authentication
Authentication Server ; key Central Server ; key client Server ; key Server ; ticket-
distribution center distribution center distribution center granting server
Authentication Authorization Authentication
Authentication Server; key system; key divide Server; key dual Server; key
distribution center center center distribution center
160 bits 512 bits 628 bits 820 bits
Authentication; Over
Authentication; Replaced. view. integrity; Changed integrity;Left.
private-key system; shared-key system.; public-key system.;
authenticity integrity authenticity All of them

1 A key generation 1 A key generation 1 A key exchange


1 A key generation algorithm. algorithm. algorithm.
algorithm. 2 A signing 2 A signing 2 Encryption
2 Integity algorithm, algorithm, algorithm, algorithm,
3 A signature verifying 3 A signature 3 encryption 3 A signature
algorithm verifying algorithm algorithm verifying algorithm
Digest of string, Name of Digest of string, Signature of string ,
string Signature of string Name of string All of them
128;160 150; 128 160; 112 112; 160

an authentication of
an electronic record
a unique by tying it uniquely
a bit string giving identity of identification of a to a key only a an encrypted
a correspondent sender sender knows signature of a sender

1,2 1,3 3,4 2,3


IPSec, SSL L2TP, SSL IPSec, SSH SSH, SSL

(i) correct but (ii) incorrect only (ii) correct only (iii) correct (i) and (ii) correct

SSL TLS either (a) or (b) both (a) and (b)


AH; SSL PGP; ESP AH; ESP all of the above

transport tunnel either (a) or (b) neither (a) nor (b)


transport tunnel either (a) or (b) neither (a) nor (b)

SSL TLS either (a) or (b) both (a) and (b)


SSL TLS either (a) or (b) both (a) and (b)
integrity and non- authenticity and confidentiality and
integrity and authenticity repudiation privacy integrity
Private key Public & Private key None of the
Public key cryptosystem cryptosystem cryptosystem mentioned
secret public either (a) or (b) both (a) and (b)
secret public either (a) or (b) both (a) and (b)

transport tunnel either (a) or (b) neither (a) nor (b)

transport tunnel either (a) or (b) neither (a) nor (b)


Encrypts our local
Access sites that are blocked Compromise other’s Hide our personal drive files while
geographically system remotely data in the cloud transferring

Antivirus ; Incognito mode Firewall ; VPN Firewall ; Firewall VPN ; VPN

IPSec,PGP SSL, PGP TLS ; PGP PGP, PGP

(i) correct but (ii)


only (i) correct incorrect only (ii) correct (i) and (ii) correct

Application level protocols Tunnelling protocols Network protocols Mailing protocols


modify message in Replay previous
Denial of Service transit message All of them
Spoofing Worm Virus None of these
Private key Public key local key none of these
Spoofing virus Phishing none of these

Worms Virus Spoofing phishing


Passive attack Active attack both of them none of these
phishing Spoofing Worms Trojan attack
Encryption Decryption Cryptography none of these
Permutation one time pad play fair none of these
Symmetric Asymmetric Both of these none of these
identity and resource weak or non existent
route spoofing ID vulnerability IP Address spoofing authentication
system specific
Issue-Specific Policy program policy policy none of these
system specific
Issue-Specific Policy program policy policy none of these
DoS (Denial of Buffer Overflow
Database crash attack Service) attack Data overflow Attack attack

Active attack passive attack none of these dos attack


32 bits 64 bits 128 bits 56 bits
32 bits 56 bits 48 bits 64 bits
32 bits 64 bits 96 bits 128 bits
1 2 Both a & b none of these
Cipher text Key Generation both a & n none of these
16 bits 32 bits 48 bits 64 bits
1 2 3 4
1 2 3 4
Data Encryption Data Encryption
Decryption Standards Standard Strategy None of these
8 16 32 56

playfair cipher vignere cipher hill cipher affine cipher

Rotor machine cipher all of these none of the above

1 0 maybe can't say


symmetric key based it works as block it uses 128 bit
algorithm cipher blocks. all of the above
private key
Public Key Cryptography cryptography a and b none of the above
1 key 2 key 3 key 4 key
Short Flat Long Thin

Diffie-Hellman fixed Diffie-Hellman RSA None of above


Public
Public-Key Certificate announcements Public-Key Directory All of the above
19 57 64 55
Public
Public-Key Certificate announcements Public-Key Directory All of the above

3031 3130 2930 3029


1 0
many-to-one one-to-many one-to-one none of the above
1 0

a and b b and c a and c All of the above


Message
Hash Function Message Encryption Authentication Code None of the above

only a only b both true both false


Kerberos Digital Signature Digital Certificate ElGamal Scheme

DNS lookup DNS hijacking DNS spoofing DNS authorizing


POP3 SSMTP Mail using PGP S/MIME
Secure File Transfer Secured File Secure Folder Secure File
Protocol Transfer Protocol Transfer Protocol Transferring Protocol

AH ESP SSL PGP


SSL PGP IPSec None of the above
Private Public Semi-private Semi-public
message integrity confidentiality compression all of the above
intranet internet extranet None of the above
SSL IPSec PGP None of the above
SAD SAB SADB None of the above
Handshake protocol Record Protocol Both above None of the above
Encapsulating
Authentication Header Security Payload Both a and b None of the above
2 3 4 5
SET PGP HTTP Alert protocol
Aggressive mode Quick mode Both a and b None of the above
Ip address Ip header Ip sec ip Identification
Application level protocols Tunnelling protocols Mailing protocols Network protocols
IPSec(IP
Security),SSL(secure socket
layer) L2TP,SSL IPSec,SSH SSH,SSL
Switch-to switch Router-to-router
Peer-to-peer VPNs VPNs Peer-to-peer VPNs VPNs
Handshake Upper-Layer Change Cipher
Alert Protocol Protocol Protocol Spec Protocol
Correct
Answer

c
c

b
c

b
d

c
c

b
a
d

d
c

a
a

a
a

b
a

b
a

d
c

c
a

d
d

a
c
b
b

d
a
b
c

b
b
d
a
b
b

b
b
c
d
c
b
c
a
c

b
d

a
a
c

a
b

a
b
b
a

c
a

c
a

b
b
a
d
c
b
c

c
c
a
c
c
a

d
This sheet is for 3 Mark questions
S.r No
1
2

4
5
6

8
9

10
11

12
13
14
15
16

17

18

19
20
21

22

23

24
25

26

27

28

29

30
31

32

33

34

35

36

37

38

39

40

41

42

43

44
45

46

47

48

49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82

83

84
85
86
87

88

89

90
91
92
93
94
95
96
97

98

99

100
This sheet is for 3 Mark questions
Question
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered the main goals of informat
Physical threats to companies include:
i) Theft ii) Accidents iii) Cybercrimes iv) Fraud

Match the following with elements of information security


.

1. Physical elements A. The software is updated on a regular basis with license copy of antivirus
2. System Elements B. Any information stored accessible to authorized user only
3. Process Elements C. one can put security such as security guard and surveillance cameras which observe the
. confidential zone 24 x 7

1 2 3
a) B C A
b) B A C
c) C A B
d) C B A .
.
What are the types of security policies?
OSI Security Architecture focuses mainly on following aspects of information security.
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the targ

Consider the following statements:


i. Masquerade Attack – It takes place when an attacker pretends to be authentic user.
ii. Replay Attack – the newly generated malicious code retransmitted again and again to receiver
iii. DoS Attack – making the network unavailable for the user to communicate securely

_____________ is a special type of vulnerability that doesn’t possess risk.


______ is the state of personal freedom or being free from potential threats, whereas ______ refers to the state of be

Match the following pairs


1. Known Plaintext Attack A. Cryptanalyst has only access to cipher text but doesn't have access to
corresponding corresponding plain text

2) Ciphertext only Attack B. Cryptanalyst chooses a cipher text and attempts to find a matching plaintext

3) Chosen Plaintext Attack C. Cryptanalyst try to access plain text and its corresponding cipher text

4) Chosen Ciphertext Attack D. Cryptanalyst can encrypt plain text of his own choice (guess) and later on
find ... ciphertext obtained from corresponding plain text

1 2 3 4

a) D C B A
b) B D A C
c) D B C A
d) C A D B
.
Which is the principle of the encryption using a key?

AES stands for ________________ and DES stand for __________


________ is implemented using the Feistel Cipher which employs ______ round of Feistel structure.
10. Which of all the following are an example of a block cipher?
AES uses a ____________ bit block size and a key size of __________ bits.
______ rounds does the AES-192 perform and ______ rounds does the AES-256 perform and _______ is the
expanded key size of AES-192

For the AES-_____ algorithm there are __________ similar rounds and _________ round is different.

Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key

In the DES stand for ________ algorithm the round key is __________ bit and the Round Input is ____________bits.
In triple DES, the key size is ___ and meet in the middle attack takes ___ tests to break the key.

What is the general equation for elliptic curve systems?


In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0)?

Which one of the following algorithm are example of asymmetric-key cryptography?


Digital signature can provide ____,______,_____ all for the message
Which of the all following are an elements/fields of the X.509 certificates?

Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority
from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in
the correct order as –

X.509 certificate recommends which cryptographic algorithm _____ and The issuer unique identifier of the X.509
certificates was added in which version _____?
Kerberos is a computer-network_____ protocol that works on the basis of _____ to allow nodes communicating
over a non-secure network to prove their _____to one another in a secure manner.
Kerberos builds on ______ cryptography and requires a _____, and optionally may use _____cryptography during
certain phases of authentication

A digital signature is required


(i) to tie an electronic message to the sender’s identity
(ii)for non repudiation of communication by a sender
(iii) to prove that a message was sent by the sender in a court of law
(iv) in all e-mail transactions
IPSec is not designed to provide security at the
i)Transport layer
ii) Application layer
iii)Session layer
iv)Network layer

Which component is included in IP security?

Pretty good privacy (PGP) is not used in


i) Browser security
ii) Email security
iii)FTP security
iv)WiFi security

Which all are not operates in the transport mode or the tunnel mode.
i)SSL
ii) PGP
iii)IPSec
iv)ECC
_____defines two protocols: _______ and ________.
PGP offers _____ block ciphers for message encryption.
i)Triple-DES
ii) CAST
iii) IDEA
The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
i) list of protocols
ii) cipher suite
iii) list of keys

PGP provides ______ , _______ , ________ in e-mail.

Which of the following is not a secured mail transferring methodology?


i)POP3
ii) SSMTP
iii)Mail using PGP
iv)S/MIME

PGP have not used which cryptographic algorithms?


i)DES
ii) AES
iii)RSA
iv)Rabin
A ______ can hide a user’s browsing activity, __________ masks your IP address and _________ are also used for
hides user’s physical location.
_______ uses the idea of certificate trust levels. ________ provides privacy, integrity, and authentication in e-mail
and In _____, there can be multiple paths from fully or partially trusted authorities.
_______ uses the idea of certificate trust levels. In _______, the cryptographic algorithms and secrets are sent with
the message. ______ was invented by Phil Zimmerman.
_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a
packet at the _______level.
SSL provides _________.
i)message integrity
ii) confidentiality
iii)compression
iv) all of the above

IKE uses _______


i) Oakley
ii) SKEME
iii) ISAKMP
iv) all of the above

Which types of VPNs are not used for corporate connectivity across companies residing in different geographical
location?
i)Remote access VPNs
ii) Site-to-site VPNs
iii) Peer-to-Peer VPNs
iv)Country-to-country VPNs

Site-to-Site VPN architecture is also known as _________


i)Remote access VPNs
ii) Peer-to-Peer VPNs
iii)Extranet based VPN
iv)Country-to-country VPNs

Site-to-site VPNs are also known as ________


Which of the statements are not true to classify VPN systems?

Which of them is type of Password Guessing?


Play Fair Cipher was invented by whom?
Which of these is Type of virus?
In Cypher text conversion when each letter is replaced by it's next 3rd letter?
Hiding text by rearranging the letter order is called as?
Which of them are example of Symmetric key Encryption?
A Computer ________ is a Standalone malware Computer programthat replicates itself in order to spread to other
computer.
Message - "come home" Encrypt these message using Rail Fence Cypher text?
Convert the message into Cipher text using "Caesar Cypher" Plain text-"after the party"
The Attack in which multiple computer system attacks a single system is called as?
For Encryption of 64 bit code how much bit of key is required?
AES Cypher was Designed by whom?
End to End Encryption Can occurs at which levels?
In S- Box Substitution 48 bits of input generates how many bits of output block?
In AES a plain text of 128bits requires how many bit of key?
Final Round of AES consist of what?
In DES 5th steps consist of?
Which of them are example of Symmetric Key Encryption?
In which of the Encryption technique text is rearranged?
In Row Shift which of the row remains unchanged?
. n = 35; e = 5; C = 10. What is the plaintext (use RSA) ?
For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find the cipher text.
p = 3; q = 11; M = 5 find C
In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?
p = 5; q = 11; M = 9 find C
For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.
 p = 17; q = 31; M = 2 find C
Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the plaintext to be transmitted if the
ciphertext is (28,9).
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to
each other.
IPSec defines two protocols: _______ and ________
The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL
session.

PGP encrypts data by using a block cipher called ______


______ is designed to provide security and compression services to data generated from the application
layer.
In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
When the sender and the receiver of an email are on the same system, we need

In SSL, what is used for authenticating a message?

Why did SSL certificate require in HTTP?

S/MIME is abbreviated as __________________

Which component is included in IP security?


An HTTP connection uses port ___whereas HTTPS uses port___and invoke SSL.
In SSL Protocol,each upper layer message if fragmented into a maximum of___byte.
Types of SSL records--
In PGP, to exchange e-mail message a user needs a ring of ____keys.
Which protocol is used to convey SSL related alerts to the peer entity?
SSL primarily focuses on _______
_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide
security for a packet at the network level.
When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information, then it is called _________
Which internet protocol is used for securely exchanging the information between client's web browser and
the web server
Internet Key Exchange modes, Aggressive mode and Quick mode are used to negotiate IKE SA and
IPSec's SA respectively
Image a b
0 a) They help understanding hacking better b) They are key elements to a securi
0 a) i,ii,iv b) ii,iii,iv
0 a) b)

0 a) Regulatory, Availability, User Policies b) Confidentiality, Advisory, Integrity


0 a) Security Techniques / Mechanisms, Categorie
b) Security Attack, Security Techniqu
0 a) Vulnerability attack b) Bandwidth flooding
0 a) (i) & (ii) correct but (iii) incorrect b) (i) & (iii) correct but (ii) incorrect

0 a) Vulnerabilities without risk b) Vulnerabilities without attacker


0 a) Regularity, Privacy b) Security, Privacy
0 a) b)
The key indicates which funcion is used for The key contains the secret
encryption. Thereby it is more difficult to function for encryption including
decrypt a intercepted message as the parameters. Only a password can
function is unknown. activate the key.
Advanced Encryption Security, Data Advanced Encryption Standard,
Encryption Security Data Encryption Standard
DES, 16 IDEA,16
DES, IDEA, Caesar cipher IDEA, Caesar cipher, Twofish
128; 128 or 256 64; 128 or 192

10;14; 64 words 12; 14; 52 words


192; 2 pair of 5 similar rounds ; every
alternate 128; 9 ; the last

i) only ii) iii) and iv)

Data Encryption Security; 48; 32 Data Encrypted Standard; 64; 32


2192 ; 2112 2184;2111
unit3_1_3
m.jpg a b

(15, -56) (-23, -43)

rsa algorithm, dsa algorithm, diffie-hellman diffie-hellman algorithm, electronic


algorithm code book algorithm, dsa algorithm
integrity, confidentiality integrity, authentication, nonrepudi
Issuer Name, Serial Modifier, Issuer unique Serial Modifier, Issuer Name, Issuer
Identifier unique Identifier

X2 X1 X1 B X1 X1 X2 A

RSA; 2 DES; 2

Confedintiality ; tickets; identity Confedintiality ; tickets; session


symmetric key; trusted third party; public- asymmetric key; trusted third party;
key public-key

i and ii i, ii, iii


i), ii), iv) i), iii), iv)
Encapsulating Security Payload
Authentication Header (AH) (ESP)

i), ii), iv) i), iii), iv)

i), ii), iv) i), iii), iv)


IPSec ;AH; SSL IPSec ;PGP; ESP

(i) correct but (ii) incorrect (ii), (iii) correct

only (i) correct only (ii) correct


privacy, iAvailability, and attack-
Availability, integrity, and authentication resistant

only (i) only (ii)

i), ii), iv) i), iii), iv)

Firewall ; Antivirus ; Incognito mode Firewall ; Antivirus ; VPN

X509, PGP, PGP PGP, PGP, PGP

SSL; IPSec,PGP PGP; SSL, PGP

IPSec ; network SSL ; network


(i) correct but (ii) incorrect only (ii) correct

(i) correct but (ii) incorrect only (ii) correct

i), ii), iv) i), iiI), iv)

(i) correct but (ii) incorrect only (ii) correct


Switch-to-switch VPNs Peer-to-Peer VPNs

Protocols used for tunnelling the traffic Whether VPNs are providing site-to-s
Default password attack Dictionary Attack
Charles Wheatstone julius Caesar
Worms Trojan horses
Play fair Caesar Cipher
Transposition permutation
DES AES

Worm Trojan Horse


homecome hocomeme
DJXIU XKH REUXB DIWHU WKH SDUWB
Trojan Horse Worm
32 46
Rijndael-Daeman Charles Wheatstone
1,2,3,4 3,4,6,7
8bits 16bits
32 64
Byte Substitution Shift Row
P-box Permutation XOR & SWAP
DES AES
Substitution Transposition
1 2
5 6
80 92
28 26
 p and q should be divisible by Ф(n) p and q should be co-prime
42 14
54 43
342 423

66 65
11 23

man-in-the-middle ciphertext attack


AH; SSL PGP; ESP

list of protocols cipher suite

international data encryption algorithm private data encryption algorithm

SSL TLS
secret public
One Message Access Agent One message transfer agent
MAC (Message Authentication
MAC (Message Access Code) Code)

For making security weak For making information move faster


Secure/Multimedia Internet Mailing Secure/Multipurpose Internet
Extensions Mailing Extensions
Encapsulating Security Payload
Authentication Header (AH) (ESP)
40;80 60;620
2^16 2^32
Handshake records Alert records
Secret Public
Alert Protocol Handshake Protocol
confidentiality and integrity authenticity and privacy

SSL IPSec

DNS lookup DNS hijacking

SSL Handshake

1 0
c d Correct Answer
c) They help understands security d) They help to understand the cy c
c) i,ii,iii d) i,iii,iv a
c) d)

c) Regulatory, Advisory, User Policied) Confidentiality, Data Authentica c


c) Security Attack, Security Techn d) Security Techniques / Mechani b
c) Connection flooding d) UDP flooding c
c) (i),(ii), (iii) all incorrect d) (i),(ii),(iii) all correct

c) Vulnerabilities without action d) Vulnerabilities no one knows a


c) Regularity, Advisory d) Security, Advisory b
c) d)

d
All functions are public, only the The key prevents the user of
key is secret. It contains the having to reinstall the software c
parameters used for the at each change in technology or
encryption resp. decryption. in the functions for encryption.
Advanced Encrypted Standard, Active Encryption Standard, b
Device Encryption Standard Data Encrypted Standard
Caesar cipher, 2 Twofish, 5 a
Caesar cipher, wofish, IDEA wofish, DES, IDEA, b
256; 128, 192, or 256 128; 128, 192, or 256 d
b
14,16,60 words 16,16, 64 words
b
128; 8 ; the first and last 128; 10 ; no

ii) and iii) only iv)


Device Encryption Standard; 56; Data Encryption Standard ; 48; d
24 32
21682; 111 21682; 112 d
d
c d

a
(69, 26) (12, -86)
dsa algorithm, diffie-hellman
electronic code book algorithm, algorithm, electronic code book a
dsa algorithm, rsa algorithm algorithm
nonrepudiation,confidentiality, intauthentication,confidentiality, int b
Issuer unique Identifier, Serial Signature, Issuer Name, Issuer d
Modifier,Signature unique Identifier

c
X1 X2 X2 B X1 X2 X2 A
a
AES; 1 Rabin; 4
authentication; cryptography; c
authentication; tickets; identity identity
symmetric key; trusted third asymmetric key; trusted third a
party; private key party; private key

i, ii, iii, iv ii, iii, iv


d

ii), iii), iv) i), ii), iii)


d
Internet key Exchange (IKE) All of the mentioned

ii), iii), iv) i), ii), iii)

ii), iii), iv) i), ii), iii)


IPSec ;AH; ESP all of the above c

d
only (iii) correct All (i), (ii), (iii) correct

b
only (iii) correct All (i), (ii), (iii) correct
privacy, integrity, and c
authentication none of the above

ii), iii), iv) i), ii), iii)

ii), iii), iv) i), ii), iii)


d
Firewall ; Firewall ; Firewall VPN ; VPN ; VPN
b
KDC,KDC,KDC X509, PGP, SSL
d
TLS ; PGP PGP; PGP; PGP
a
PGP; transport none of the above
d

only (i) correct only (iv) correct

only (i) correct only (iv) correct

ii), iii), iv) i), ii), iii)

only (iii) correct (i) and (ii) correct


Point-to-point VPNs Router-to-router VPNs d
c
Securing the network from bots an Levels of security provided for s
Brute Force Attack All of these d
Alex Charles none of these a
logic Bomb All of them d
Monoalphabetic none of these b
Both of them none of these c
BLOWFISH All of them d

DDoS Logic Bomb a


cmoehmoe cmhmoeoe d
DIXHU WLH SEUXB none of these b
DDoS logic bomb c
56 64 c
Julius Caesar None of these a
3,4,5,6 4,5,6,7 b
32 bits 48 bits c
96 128 d
Add Subkey all of these d
S-box Substitution None of these b
BLOWFISH all of these d
Combinational none of these b
3 4a
7 8a
84 84 a
12 15 b
p and q should be prime p/q should give no remainder c
15 38 b
5 27 c
243 432 b

64 64 a
63 22 a

plaintext attack none of the above a


AH; ESP all of the above c

list of keys none of the above b


internet data encryption local data encryption
algorithm algorithm a

either (a) or (b) both (a) and (b) d


either (a) or (b) both (a) and (b) b
one User Agent Two User Agents d
MAC (Machine Authentication
Code) MAC (Machine Access Code) b
For encrypted data sent over For sending and receiving emails
HTTP protocol unencrypted c
Secure/Multimedia Internet Mail Secure/Multipurpose Internet
Extensions Mail Extensions d

Internet key Exchange (IKE) All of the mentioned d


80;443 620;80 c
2^14 2^12 c
Both a or b none of the above c
Either a or b Both a and b b
Upper-Layer Protocol Change Cipher Spec Protocol a
integrity and non-repudiation integrity and authenticity d

PGP SET b

DNS spoofing DNS authorizing c

PGP Alert Protocol a

You might also like