This Sheet Is For 1 Mark Questions S.R No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
This Sheet Is For 1 Mark Questions S.R No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
S.r No Question
1 _______ is the practice and precautions taken to protect valuable information from unauthorized
access, recording, disclosure or destruction.
2
_______ platforms are used for safety and protection of information in the cloud.
3 Compromising confidential information comes under _________
4 An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
5 The CIA triad is often represented by which of the following?
6 Related to information security, confidentiality is the opposite of which of the following?
7 When you use the word ______it means you are protecting your data from getting disclosed.
8 _______ means the protection of data from modification by unknown users.
9 _______ of information means, only authorized users are capable of accessing the information.
10 This helps in identifying the origin of information and authentic user. This referred to here as
__________
11 Data ___________ is used to ensure confidentiality.
12
What does OSI stand for in the OSI Security Architecure?
13 A company requires its users to change passwords every month. This improves the ________ of the
network.
14
Release of message contents and Traffic analysis are two types of _________ attacks.
15 The ________ is encrypted text.
16 What type of attack uses a fraudulent server with a relay address?
17
Which of the following Algorithms not belong to symmetric encryption
18 Which is the largest disadvantage of the symmetric Encryption?
19 In cryptography, what is cipher?
40 The main difference in MACs and digital signatures is that, in digital signatures the hash value of the
message is encrypted with a user’s public key.
41 The DSS signature uses which hash algorithm?
42 What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
43 In the handshake protocol which is the message type first sent between client and server ?
44 One commonly used public-key cryptography method is the ______ algorithm.
45 he ________ method provides a one-time session key for two parties.
46 The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not
authenticated to each other.
47 In the handshake protocol which is the message type first sent between client and server ?
48 1. VPN is abbreviated as __________
49 __________ provides an isolated tunnel across a public network for sending and receiving data
privately as if the computing devices were directly connected to the private network.
50 Which of the statements are not true to classify VPN systems?
52 VPNs uses encryption techniques to maintain security and privacy which communicating remotely
via public network.
53 There are _________ types of VPNs.
54 _________ type of VPNs are used for home private and secure connectivity.
55 Which types of VPNs are used for corporate connectivity across companies residing in different
geographical location?
56 Site-to-Site VPN architecture is also known as _________
61
PGP encrypts data by using a block cipher called ______
62 IKE creates SAs for _____.
63 ______ provides either authentication or encryption, or both, for packets at the IP level.
64 A _______network is used inside an organization.
65 SSL provides _________.
66 IKE uses _______
67 In ______, there is a single path from the fully trusted authority to any certificate.
68 A ______ provides privacy for LANs that must communicate through the global Internet.
69 _______ uses the idea of certificate trust levels.
70 ________ provides privacy, integrity, and authentication in e-mail.
71 In _____, there can be multiple paths from fully or partially trusted authorities.
72 ______ provides authentication at the IP level.
73 In _______, the cryptographic algorithms and secrets are sent with the message.
74 ______ was invented by Phil Zimmerman.
75
ISAKMP stands for ______
76 PGP makes use of which cryptographic algorithm?
77 What is the key size allowed in PGP?
78
In SSL, what is used for authenticating a message?
79
S/MIME is abbreviated as __________________
80 Security Measures Needed to protect ________ during their transmission
81 __________ means knowledge obtained from investigation, study , intelligence new ,facts .
82 Prevention of the unauthorised used of Resources refers too?
83 Protection against Denial by one of these parties in a communication refers to?
84
Which One of them is Passive attack?
85 What is lying of IP address called as?
86
What is full form of DDoS?
87 A hacker guessing suggested password to a program is call as?
88
Symmetric key encryption is also called as?
89 Conversion of Cypher text to plain text?
90 __is used to create the organisation's overall security program.
91 An act of protecting information from unauthorised disclouser to an entity.-
92 A way to ensure that the entity is indeed what it claims to be.-
93 The__model is 7 layer architecture where each layer is having some specific functionality to perform.
94
The full form of OSI is OSI model__.
95 The technique in which when one character is replaced by another Character is called as?
96 Conversion of plain text into Cipher text is called as________.
97 In Symmetric schemes requires both parties to share how many secret key?
98 Blum Blum Shub Generator is based on which Algorithm?
99 In DES step both LPT and RPT undergoes in how much key Rounds?
100 What is the 4th step in DES Algorithm?
101 In AES in which Round Subkeys are Generated from Original key for each round?
102
AES stands for?
103 Which of them is type of Cipher?
104 The message which is not understandable is called as?
105 The__is a polygraphic substitution cipher based on linear algebra.
106 __is the practice of concealing a message within another message,image or file.
107 In asymmetric key cryptography, the private key is kept by __________
108 What is data encryption standard (DES)?
109 In cryptography the original message before being transform is called
110 An asymmetric-key (or public-key) cipher uses
111 In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual
messages, it is very slow if the message is
112 The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties
are not
113 In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
114 For RSA to work, the value of P must be less than the value of
115 In RSA, Ф(n) = _______ in terms of p and q.
116 In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).
117 RSA is also a stream cipher like Merkel-Hellman.
118
USENET falls under which category of public key sharing?
119 PGP makes use of which cryptographic algorithm?
120
Public key cryptography also called as________
121
ECC stands for
122
Diffie-Hellman algorithm is widely known as_________
123 Hash function is used for________
124
RSA algorithm is best example of_______
125 IPSec is designed to provide security at the _________
126 In tunnel mode, IPSec protects the ______
127
HTTPS is abbreviated as _________
128 An attempt to make a computer resource unavailable to its intended users is called ______
129
SSL primarily focuses on _______
130 Pretty good privacy (PGP) is used in ______
131 __________ is used for encrypting data at network level
132 WPA2 is used for security in _______
133 Which of the following is not a strong security protocol
134 TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based
connection.
135 IPSec operates in..... different modes
136 length of the IPv4 address is ....
137 Internet Key Exchange has .... phases and modes of operations
138 PGP is abbreviated as
139
SET stands for
140 Transport layer Protocol consists of ... main components
141 length of the IPv6 acddress is ....
142 SSL provides _________.
143 IPSec provides ....protocols for network layer
144 length of the IPv6 header is....
Image a b c
1 0
MD5 SHA-2 SHA-1
42 bytes 32 bytes 36 bytes
server_hello client_hello hello_request
RSS RAS RSA
Diffie-Hellman RSA DES
1 False
3 2 5
Remote access VPNs Site-to-site VPNs Peer-to-Peer VPNs
3 4 5
Transport layer Network layer Application layer
Entire IP packet IP header IP payload
Browser security Email security FTP security
Private data
International data encryption Internet data encryption
encryption algorithm algorithm algorithm
SSL PGP IPSec
AH ESP PGP
private public semi-private
message integrity confidentiality compression
Oakley SKEME ISAKMP
X509 PGP KDC
VPP VNP VNN
X509 PGP KDC
IPSec SSL PGP
X509 PGP KDC
AH ESP PGP
IPSec SSL TLS
IPSec SSL PGP
Internet Security
Internet system Association and Key
Association and Key Management Interchange System And
Management Packet Protocol Key Modeling Protocol
DES AES RSA
1024-1056 1024-4056 1024-4096
MAC (Message
MAC (Message Access Authentication MAC (Machine
Code) Code) Authentication Code)
Secure/Multimedia Secure/Multipurpos
Internet Mailing e Internet Mailing Secure/Multimedia Internet
Extensions Extensions Mail Extensions
file Data packet
Security Data Information
Data Integrity Data confidentiality Acess Control
Non-Repudiation Data integrity Authentication
modify message in
Denial of Service transit Replay previous message
IP Spoofing IP Scamming IP Lying
Distributed Denial of
Derived Denial of service service Denial of service
Password Guessing Dictionary Attack Default password attack
Private Key
public key Encryption Encryption Both of these
Encryption Decryption Simple text
program policy purpose security
intergrity avability confidentiality
Authentication Accountability identification
TCP OSI OIS
open systems open software
interconnection interconnection open connection
Transposition Substitution Combinational
Encryption Decryption Hidden Text
one two three
Private key Public key both a & b
8 16 32
key transformation S-box Substitution P-box Permutation
Key Expansion Initial Round Finale Round
Authorized Encryption Advance Encryption
Standard Standard Advance Encryption Strategy
Stream Cipher Block Cipher both of Them
Cipher Text plain text Hidden text
Hill cipher playfair cipher Affine cipher
steganography cryptography cipher
sender receiver sender and receiver
block cipher stream cipher bit cipher
simple text plain text empty text
1 key 2 key 3 key
c
d) Physical Security
d) One Drive a
d) Attack b
d) Digital crime b
d) Circle a
d) Disposal b
d) Availability a
d) Non-repudiation b
d) Availability d
d) Availability c
d) Backup a
d) Open Standard
Interconnections b
d) DoS Attack c
d) Secret script b
SMB b
IDEA b
Isn't used any more. b
decrypted message a
all the connected devices b
dsa algorithm c
quadratic ciphers a
byte cipher a
4 key b
each other d
Cryptography d
Exploit writing b
secondary key a
primary key a
padding d
16 b
block cipher method b
Message Leap d
b
Does not use hash algori c
48 bytes c
certificate_request b
RAA c
AES a
Mailing protocols a
4 b
Router-to-router VPNs a
Country-to-country VPNs b
Country-to-country VPNs c
6 d
Session layer b
IP trailer a
WiFi security b
Internet Security
Association and Key
Modeling Protocol b
Rabin c
1024-2048 c
Secure/Multipurpose
Internet Mail Extensions d
All of above b
None of These c
None of these c
None of these a
None of these b
None of these c
None of these b
none of these b
none of these a
none of these c
security a
none of these b
none of these b
none of these c
both a & c a
none of these a
receiver a
none of these b
byte cipher a
filled text b
4 key a
Thin c
Separate a
Each other d
r c
(p+1)(q+1) c
b
a
Both a and b d
only a c
According to the CIA Triad, which of the below-mentioned element is not considered in
1 the triad?
2 When integrity is lacking in a security system, _________ occurs.
3 Data integrity gets compromised when _____ and _____ are taken control off.
4 Which of the following type of attack can actively modify Communications or data?
6 A digital signature is
________is a term used in cryptography that refers to a message before encryption or
7 after decryption.
10 From the options below, which of them is not a vulnerability to information security?
11 From the options below, which of them is not a threat to information security?
_________is the art as well as science of secret writing of information / message and
makes them non-readable. The process of studying methods of breaking cipher text
12 message called as________
Assymmetric Encryption: Why can a message encrypted with the Public Key only be
16 decrypted with the receiver's appropriate Private Key?
In which way does the Combined Encryption combine symmetric and assymmetric
encryption?
17
29 DES follows
The DES Algorithm Cipher System consists of ____________rounds (iterations) each
30 with a round key and The DES algorithm has a key length of______
31 Digital signature provides_____
How many real and imaginary roots does the equation y2=x3-1 have
32
How many real and imaginary roots does the equation y2=x3-4x have
33
The main difference in MACs and digital signatures is that, in digital signatures the hash
34 value of the message is encrypted with a user’s
The RSA signature uses which hash algorithm?
35
To implement Diffie-Hellman, the two end users Alice and Bob, while communicating
over a channel they know to be private, mutually agree on positive whole numbers p
36 and q, such that p is a _______ and q is a ______ of p.
Kerberos builds on ______ cryptography and requires a _____, and optionally may use
37 public cryptography during certain phases of authentication
For kerberose authentication first step, the client authenticates itself to the ____which
38 forwards the username to a_____.
43
46 A digital signature is
109 Process of transforming input message m into a fixed size string is called as
Which of the following is true
a) MD5 uses a 128 bit message digest
110 b) MD5 is vulnerable against crytanalysis
111 The concept of ticket (digital documents that stores session key) as token is used by
When a DNS server accepts and uses incorrect information from a host that has no
112 authority giving that information, then it is called _________
113 Which of the following is not a secured mail transferring methodology?
c) an authentication
of an electronic
b) a unique record by tying it
a) a bit string giving identity identification of a uniquely to a key d) an encrypted
of a correspondent sender only a sender knows signature of a sender
Monoalphabetic
Polyalphabetic Cipher Caesar Cipher Playfair Cipher Cipher
an authentication of
an electronic record
a unique by tying it uniquely
a bit string giving identity of identification of a to a key only a an encrypted
a correspondent sender sender knows signature of a sender
(i) correct but (ii) incorrect only (ii) correct only (iii) correct (i) and (ii) correct
c
c
b
c
b
d
c
c
b
a
d
d
c
a
a
a
a
b
a
b
a
d
c
c
a
d
d
a
c
b
b
d
a
b
c
b
b
d
a
b
b
b
b
c
d
c
b
c
a
c
b
d
a
a
c
a
b
a
b
b
a
c
a
c
a
b
b
a
d
c
b
c
c
c
a
c
c
a
d
This sheet is for 3 Mark questions
S.r No
1
2
4
5
6
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
This sheet is for 3 Mark questions
Question
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered the main goals of informat
Physical threats to companies include:
i) Theft ii) Accidents iii) Cybercrimes iv) Fraud
1. Physical elements A. The software is updated on a regular basis with license copy of antivirus
2. System Elements B. Any information stored accessible to authorized user only
3. Process Elements C. one can put security such as security guard and surveillance cameras which observe the
. confidential zone 24 x 7
1 2 3
a) B C A
b) B A C
c) C A B
d) C B A .
.
What are the types of security policies?
OSI Security Architecture focuses mainly on following aspects of information security.
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the targ
2) Ciphertext only Attack B. Cryptanalyst chooses a cipher text and attempts to find a matching plaintext
3) Chosen Plaintext Attack C. Cryptanalyst try to access plain text and its corresponding cipher text
4) Chosen Ciphertext Attack D. Cryptanalyst can encrypt plain text of his own choice (guess) and later on
find ... ciphertext obtained from corresponding plain text
1 2 3 4
a) D C B A
b) B D A C
c) D B C A
d) C A D B
.
Which is the principle of the encryption using a key?
For the AES-_____ algorithm there are __________ similar rounds and _________ round is different.
Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key
In the DES stand for ________ algorithm the round key is __________ bit and the Round Input is ____________bits.
In triple DES, the key size is ___ and meet in the middle attack takes ___ tests to break the key.
Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority
from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in
the correct order as –
X.509 certificate recommends which cryptographic algorithm _____ and The issuer unique identifier of the X.509
certificates was added in which version _____?
Kerberos is a computer-network_____ protocol that works on the basis of _____ to allow nodes communicating
over a non-secure network to prove their _____to one another in a secure manner.
Kerberos builds on ______ cryptography and requires a _____, and optionally may use _____cryptography during
certain phases of authentication
Which all are not operates in the transport mode or the tunnel mode.
i)SSL
ii) PGP
iii)IPSec
iv)ECC
_____defines two protocols: _______ and ________.
PGP offers _____ block ciphers for message encryption.
i)Triple-DES
ii) CAST
iii) IDEA
The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
i) list of protocols
ii) cipher suite
iii) list of keys
Which types of VPNs are not used for corporate connectivity across companies residing in different geographical
location?
i)Remote access VPNs
ii) Site-to-site VPNs
iii) Peer-to-Peer VPNs
iv)Country-to-country VPNs
X2 X1 X1 B X1 X1 X2 A
RSA; 2 DES; 2
Protocols used for tunnelling the traffic Whether VPNs are providing site-to-s
Default password attack Dictionary Attack
Charles Wheatstone julius Caesar
Worms Trojan horses
Play fair Caesar Cipher
Transposition permutation
DES AES
66 65
11 23
SSL TLS
secret public
One Message Access Agent One message transfer agent
MAC (Message Authentication
MAC (Message Access Code) Code)
SSL IPSec
SSL Handshake
1 0
c d Correct Answer
c) They help understands security d) They help to understand the cy c
c) i,ii,iii d) i,iii,iv a
c) d)
d
All functions are public, only the The key prevents the user of
key is secret. It contains the having to reinstall the software c
parameters used for the at each change in technology or
encryption resp. decryption. in the functions for encryption.
Advanced Encrypted Standard, Active Encryption Standard, b
Device Encryption Standard Data Encrypted Standard
Caesar cipher, 2 Twofish, 5 a
Caesar cipher, wofish, IDEA wofish, DES, IDEA, b
256; 128, 192, or 256 128; 128, 192, or 256 d
b
14,16,60 words 16,16, 64 words
b
128; 8 ; the first and last 128; 10 ; no
a
(69, 26) (12, -86)
dsa algorithm, diffie-hellman
electronic code book algorithm, algorithm, electronic code book a
dsa algorithm, rsa algorithm algorithm
nonrepudiation,confidentiality, intauthentication,confidentiality, int b
Issuer unique Identifier, Serial Signature, Issuer Name, Issuer d
Modifier,Signature unique Identifier
c
X1 X2 X2 B X1 X2 X2 A
a
AES; 1 Rabin; 4
authentication; cryptography; c
authentication; tickets; identity identity
symmetric key; trusted third asymmetric key; trusted third a
party; private key party; private key
d
only (iii) correct All (i), (ii), (iii) correct
b
only (iii) correct All (i), (ii), (iii) correct
privacy, integrity, and c
authentication none of the above
64 64 a
63 22 a
PGP SET b