CNS Up
CNS Up
Home » Security » MCQ » Computer Security MCQs – Multiple Choice Questions and Answers – Part 1
MCQ
pdf, computer security mcq questions pdf , computer security mcqs , computer security quiz answers, computer security quiz questions and answers pdf,
computer security test questions , cyber security quiz questions and answers pdf, mcq on computer security , mcq on system security , multiple choice
questions on data security, network and information security mcq, network security attacks mcq, network security consists of, network security mcq with
answers pdf
M ultiple choice questions and answers (MCQs) on Computer Security to prepare for exams, tests, and
certifications. These questions are taken from a real written exam and some parts are taken from an interview. So
you will find questions on basic techniques such as encryption, signature, certificates, authentication, and more. This
MCQ will easily prepare anyone to pass their exam.
1. In computer security, _______ means that active computer systems can only be
modified by authorized persons.
A Confidentiality
B Integrity
C Availability
D Authenticity
Answer
B
Integrity, in terms of data and network security, is the fact that information can only be accessed and
modified by those authorized to do so.
2. In computer security, _______ means that the information contained in a computer
system can only be read by authorized persons.
A Confidentiality
B Integrity
C Availability
D Authenticity
Answer
A
Confidentiality means that the information in a computer system can only be read by authorized
persons.
3. The types of threats to the security of a computer system or network are _______?
A Interruption
B Interception
C Modification
D Creation
E Fabrication
Answer
A, B, C, E
4. Which of the following is an independent malicious program that does not require
any other program?
A Trap door
B Trojan Horse
C Virus
D Worm
Answer
D
A computer worm is an independent malicious computer program that replicates itself to spread to
other computers. Often, it uses a computer network to spread, relying on security failures on the
target computer to gain access.
B Trojan Horse
C Logic bomb
D Virus
Answer
A
Trap doors, also known as backdoors, are code fragments embedded in programs by the
programmer(s) to allow quick access later, often during the testing or debugging phase. If an
inattentive programmer leaves this code or forgets to remove it, a potential security hole is
introduced.
B Trojan Horse
C Logic bomb
D Virus
Answer
C
A logic bomb is a piece of code inserted into an operating system or software application that
implements a malicious function after a certain time, or if specific conditions are met.
C Worm
D Zombie
Answer
A
Trojan horse is a malicious computer program that presents itself as legitimate software. Also called
Trojan horse, it hides malware in a file on a normal appearance.
B Polymorphic virus
C Parasitic virus
D Macro virus
Answer
A
Stealth virus is a computer virus that uses differents mechanisms to avoid detection by antivirus
software.
B False
Answer
A
B False
Home » Security » MCQ » Computer Security MCQs – Multiple Choice Questions and Answers – Part 2
MCQ
pdf, computer security mcq questions pdf , computer security mcqs , computer security quiz answers, computer security quiz questions and answers pdf,
computer security test questions , cyber security quiz questions and answers pdf, mcq on computer security , mcq on system security , multiple choice
questions on data security, network and information security mcq, network security attacks mcq, network security consists of, network security mcq with
answers pdf
M ultiple choice questions and answers (MCQs) on Computer Security to prepare for exams, tests, and
certifications. These questions are taken from a real written exam and some parts are taken from an interview. So
you will find questions on basic techniques such as encryption, signature, certificates, authentication, and more. This
MCQ will easily prepare anyone to pass their exam.
1. ______ is a program that can infect other programs by modifying them. This
modification includes a copy of the virus program, which can then infect other
programs.
A Worm
B Virus
C Zombie
D Trap doors
Answer
B
A virus is a type of malicious software (malware) consisting of small pieces of code associated with
legitimate programs. When this program is run, the virus is executed.
2. ______ are used in denial-of-service (DOS) attacks, usually against targeted
websites.
A Worm
B Virus
C Zombie
D Trojan horse
Answer
C
A zombie is a computer that has been implanted with a demon that puts it under the control of a
malicious hacker without the knowledge of the computer owner. Zombies are used by malicious
hackers to launch denial-of-service attacks.
3. The type of encoding in which the manipulation of bit stream without taking into
account the meaning of bits is called _________?
A Destination Encoding
B Entropic Encoding
C Source Encoding
D Differential Encoding
Answer
B
Entropic encoding is a type of lossless encoding. Huffman encoding is a type of entropy encoding.
Entropy encoding appears everywhere in modern digital systems. It is an essential part of data
compression, which is generally necessary, especially for the Internet, video, audio, communication,
etc.
B PGP
C SNMP
D HTTP
Answer
B
PGP is used to sign, encrypt and decrypt text, email, files, directories and entire disk partitions, as well
as to enhance the security of email communications.
B Cryptography
C Cryptanalysis
D Encryption
Answer
C
Cryptanalysts seek to decrypt cipher texts without knowing the source of the plaintext, the encryption
key, or the algorithm used to encrypt it; Cryptanalysts also targets secure hashing, digital signatures,
and other cryptographic algorithms.
Answer
C
Unicode is a character encoding standard published by the Unicode Consortium. Computers store
numbers that represent a character. Unicode provides a unique number for each character.
7. The number of subkeys generated in the IDEA algorithm is _______?
A 54
B 48
C 52
D 50
Answer
C
IDEA (International Data Encryption Algorithm) uses 52 subkeys each of 16 bits. Two are used in each
turn, and four are used before each turn and after the last turn. It has eight towers.
B 8
C 16
D 32
Answer
B
B DES
C IREA
D RC5
Answer
A
B C = (p + 26) mod3
C C = (p – 3) mod26
D C = (p + 3) mod26
Answer
A
Caesar’s cipher is one of the earliest known ciphers. It is a type of substitution cipher in which each
letter is replaced by another letter.
MCQ
Practice competitive and technical Multiple Choice Questions and Answers (MCQs) with simple and
logical explanations to prepare for tests and interviews.
READ MORE
Home » Security » MCQ » Computer Security MCQs – Multiple Choice Questions and Answers – Part 3
MCQ
mcq pdf, computer security mcq questions pdf , computer security mcqs , computer security quiz answers, computer security quiz questions and answers
pdf, computer security test questions , cyber security quiz questions and answers pdf, mcq on computer security , mcq on system security , multiple choice
questions on data security, network and information security mcq, network security attacks mcq, network security consists of, network security mcq with
answers pdf
M ultiple choice questions and answers (MCQs) on Computer Security to prepare for exams, tests, and
certifications. These questions are taken from a real written exam and some parts are taken from an interview. So
you will find questions on basic techniques such as encryption, signature, certificates, authentication, and more. This
MCQ will easily prepare anyone to pass their exam.
1. The ______ attaches itself to executable files and replicates itself, when the infected
program is executed, looking for other executable files to infect.
A Stealth Virus
B Polymorphic Virus
C Parasitic Virus
D Macro Virus
Answer
C
Parasitic viruses attach themselves to programs, also called executables. When a user launches a
program containing a parasitic virus, the virus is launched first. To hide its presence from the user, the
virus then triggers the original program to open. Because the operating system understands that it is
part of the program, the parasite virus has the same rights as the program to which the virus is
attached. These rights allow the virus to replicate itself, install itself in memory or release its payload.
In the absence of antivirus software, only the payload can arouse the suspicion of the normal user. A
famous parasitic virus called Jerusalem has the power to slow down the system and eventually delete
all programs launched by the user.
B 12 rounds
C 16 rounds
D 24 rounds
Answer
C
3. ________ transforms the message into a format that cannot be read by hackers.
A Decryption
B Encryption
C Transforming
Answer
B
Encryption is a way of transforming data in such a way that only approved persons can decipher it and
then transform it into something understandable.
B 443
C 445
D 444
Answer
B
B Network layer
C Transport layer
D Presentation layer
Answer
D
The presentation layer is concerned with maintaining the correct meaning of information in a
network. The presentation layer can represent data in a variety of ways (e.g., encryption), but the
recipient converts the encoding back to its original meaning.
6. What is the algorithm of key exchange used in the parameter of a Cipher Suite?
A RSA
B Fixed Diffie-Hellman
C Ephemeral Diffie-Hellman
Answer
D
We can use any of the following for the key exchange of a cryptographic suite.
RSA
Fixed Diffie-Hellman
Ephemeral Diffie-Hellman
Anonymous Diffie-Hellman
Fortezza.
7. The certificate message is required for any agreed key exchange method,
except__________.
A Ephemeral Diffie-Hellman
B Anonymous Diffie-Hellman
C Fixed Diffie-Hellman
D RSA
Answer
B
The certificate message is required for any agreed key exchange method except Anonymous Diffie-
Hellman.
Anonymous Diffie-Hellman uses Diffie-Hellman, but without authentication. As the keys used in the
exchange are not authenticated, the protocol is susceptible to Man-in-the-Middle attacks.
8. The types of threats to the security of a computer system or a network are _______
?
A Interruption
B Interception
C Modification
D Creation
E Fabrication
Answer
A, B, C, E
B Security
C Tunneling
D Congestion control
Answer
B
10. _________ is used to validate the identity of the message sender to the recipient.
A Encryption
B Decryption
C Digital certificate
Answer
C
Digital certificates allow a user to verify to whom a certificate is issued as well as its issuer. Digital
certificates are used by SSL for public key cryptography. Public key cryptography uses two keys: a
private key and a public key.
MCQ
Practice competitive and technical Multiple Choice Questions and Answers (MCQs) with simple and
logical explanations to prepare for tests and interviews.
READ MORE
Home » Security » MCQ » Computer Security MCQs – Multiple Choice Questions and Answers – Part 4
MCQ
mcq pdf, computer security mcq questions pdf , computer security mcqs , computer security quiz answers, computer security quiz questions and answers
pdf, computer security test questions , cyber security quiz questions and answers pdf, mcq on computer security , mcq on system security , multiple choice
questions on data security, network and information security mcq, network security attacks mcq, network security consists of, network security mcq with
answers pdf
M ultiple choice questions and answers (MCQs) on Computer Security to prepare for exams, tests, and
certifications. These questions are taken from a real written exam and some parts are taken from an interview. So
you will find questions on basic techniques such as encryption, signature, certificates, authentication, and more. This
MCQ will easily prepare anyone to pass their exam.
1. When you log in to an online service, you are asked to provide some sort of
identification, such as your name, account number, and password. What is the
name given to this brief interaction?
A Security procedures
B Connection procedure
C Backup procedure
D Identification procedure
Answer
B
B SHA-2
C SHA-1
Answer
C
Digital Signature Standard (DSS) are used to detect unauthorized data changes and to authenticate the
identity of the signer.
B Polymorphic virus
C Parasitic virus
D Macro viruses
Answer
A
The stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus
software.
4. One part of the polymorphic virus, usually called ________, creates a random cipher
and a key to encrypt the rest of the virus.
A mutual engine
B mutation engine
C multiple engine
D polymorphic engine
Answer
B
The polymorphic virus uses its mutation engine called MtE (the Mutation Engine) to generate a new
decryption routine each time it infects a new program.
B False
Answer
A
B False
Answer
A
B Zombie
C Virus
D Trap doors
Answer
B
8. Which hash algorithm does RSA signature use?
A MD5
B SHA-1
D Trap doors
Answer
C
The MD5 and SHA-1 hash is concatenated and then encrypted with the server’s private key.
B certificate_creation
C certificate_exchange
D certificate_type
Answer
D
10. What is the size of an RSA signature after MD5 and SHA-1 processing?
A 42 bytes
B 32 bytes
C 36 bytes
D 48 bytes
Answer
C
View Answer
Answer: c
Explanation: Network security covers a variety of computer networks, both private and
public. Everyday jobs like conducting transactions and communications among
business and government agencies etc.
View Answer
Answer: a
Explanation: The statement is true. AFS is an example. It helps us protect vital information.
View Answer
Answer: d
Explanation: The Identification, Authentication and Access control are the objectives
of network security. There is no such thing called lock.
View Answer
Answer: a
Explanation: The answer is UserID. UserID is a part of identification. UserID can be a
combination of username, user student number etc.
View Answer
Answer: a
Explanation: It is called an authentication. It is typically based on passwords, smart card,
fingerprint, etc.
View Answer
Answer: c
Explanation: Functional authorization is concerned with individual user rights. Authorization
is the function of specifying access rights to resources related to information security.
View Answer
Answer: a
Explanation: CHAP stands for Challenge Handshake authentication protocol. Features of
CHAP: plaintext, memorized token. Protocol uses Telnet, HTTP.
8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
View Answer
Answer: d
Explanation: Access control refers to the security features. Applications call access control to
provide resources.
View Answer
Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher. cipher is an algorithm
for performing encryption or decryption
10. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
View Answer
Answer: a
Explanation: The text that gets transformed is called plain text. The algorithm used is called
cipher.
View Answer
Answer: a
Explanation: WTLS is Wireless Transport Security Layer. It provides security between the
mobile device and the WAP gateway to internet.
2. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
a) WTLS
b) WEP
c) RSN
d) WP
View Answer
Answer: b
Explanation: WEP stands for Wired Equivalent Privacy. WEP has been broken already in
2001. WEP protocol designed to make the security of wireless LAN as good as that of
wired LAN.
3. A person who enjoys learning details about computers and how to enhance their
capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller
View Answer
Answer: b
Explanation: The person is called hacker. A person who enjoys learning the details of
computer systems and how to stretch their capabilities is called hacker.
View Answer
Answer: b
Explanation: SATAN is the Security analysis tool for auditing networks. It is created by
farmer and venema.
View Answer
Answer: d
Explanation: The program is called virus. It alters the way that the computer operates. It often
does damages like deleting and corrupting files and data.
View Answer
Answer: a
Explanation: A worm copies itself from one system to another over a network without the
assistance of human.
View Answer
Answer: b
Explanation: The answer is Denial of service. In case of denial of service attacks, a computer
site is bombarded with a lot of messages.
8. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification
View Answer
Answer: a
Explanation: The answer is auditing. It is done to keep an eye on wrong doings. Auditing can
be used as a deterrent.
View Answer
Answer: a
Explanation: Honey pot is an indirect form of surveillance. Network personnel create a trap,
watching for unscrupulous acts.
View Answer
Answer: c
Explanation: The answer is Trojan horse. Trojan horse is a code that is present in a program
that appears harmless.
11. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer
Answer: d
Explanation: The attack is a spoofing attack. It is when a user creates a packet that appears to
be something else or from someone else.
View Answer
Answer: a
Explanation: Smurfing is a technique in which a program attacks a network by exploiting IP
broadcast addressing operations.
View Answer
Answer: c
Explanation: In the case of denial of e-mail bombing, a user sends an excessive amount of
unwanted e-mail to someone.
View Answer
Answer: b
Explanation: In transposition-based cipher, the order of the plain text is not preserved. They
can be very simple to identify.
View Answer
Answer: c
Explanation: The key is the unique piece of information. It is used to create the cipher text
and decrypt it back.
View Answer
Answer: b
Explanation: It is called as cryptography. It is the study of creating and using the encryption
techniques.
View Answer
Answer: b
Explanation: Encryption is the process of transforming readable text i.e. plain text to make it
unreadable to anyone except those possessing special knowledge, usually referred to as
a key.
View Answer
Answer: a
Explanation: The statement is true. Cipher is the algorithm used in encryption. Encryption is
making readable text as unreadable to keep it secured.
22. These ciphers replace a character or characters with a different character or characters,
based on some key.
a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Mono alphabetic substitution based
View Answer
Answer: d
Explanation: In mono alphabetic substitution-based cipher, a character is replaced with some
other character or multiple characters, based on some key.
View Answer
Answer: b
Explanation: The statement is false. Cryptography is the study of creating and using
encryption and decryption techniques.
View Answer
Answer: c
Explanation: These ciphers are similar to that of mono alphabetic ciphers. Multiple strings are
used to encode the plain text.
View Answer
Answer: d
Explanation: It is called as public key cryptography. It has 2 keys: a private key and a public
key.
View Answer
Answer: c
Explanation: Public key cryptography has 2 keys. They are private key and a public key. The
public key encrypts the message. The private key decrypts the message.
View Answer
Answer: a
Explanation: DES stands for Data Encryption Standard. It was created in 1977 and went into
operation from 1990s.
28. Under DES, the data encryption standard took a 64-bit block of data and subjected it to
______ levels of encryption.
a) 64
b) 8
c) 16
d) 4
View Answer
Answer: c
Explanation: The answer is 16. It was subjected to 16 levels of encryption. DES is the data
encryption standard.
View Answer
Answer: b
Explanation: There are 2 keys in triple DES as well. The private and the public key. It can
also have 3 unique keys.
View Answer
Answer: a
Explanation: AES is Advanced Encryption Standard. It was selected by the US government.
It is used to replace DES.
31. An electronic document that establishes your credentials when you are performing
transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate
View Answer
Answer: d
Explanation: Digital certificate is an electronic document that is responsible for secure
internet transactions.
32. Identify the term which denotes that only authorized users are capable of accessing the
information
Confidentiality
Availability
Integrity
Non-repudiation
Answer: B) The term which denotes that only authorized users are capable of accessing the
information is known as availability.
33. State whether True or False: Data encryption is primarily used to ensure confidentiality.
True
False
Cannot be interpreted
None
34. Identify the Debian-based OS which has 2 virtual machines and focuses on preserving
users’ data.
Ubuntu
Fedora
Whonix
Kubuntu
Answer: C) Whonix has two virtual machines and focuses on preserving users’ data.
35. Identify the oldest phone hacking technique used by hackers to make free calls.
Spamming
Phreaking
Cracking
Phishing
Answer: B) Phreaking is the oldest phone hacking technique used by hackers to make free
calls.
36. Which of the following platforms is used for the safety and protection of information in
the cloud?
AWS
Cloud workload protection platforms
Cloud security protocols
One Drive
Answer: B) Cloud workload protection platforms are used for the safety and protection of
information in the cloud.
37. Identify the type of attack which uses a fraudulent server with a relay address.
MITM
NTLM
SMB
NetBIOS
38. Identify the port used to connect to Active Directory in Windows 2000.
139
445
80
389
Answer: D) The port used to connect to Active Directory in Windows 2000 is 389.
39. Choose among the following techniques, which are used to information inside a picture.
Image rendering
Steganography
Rootkits
Bitmapping
40. Identify among the following which is used to avoid browser-based hacking.
Adware remover in browser
Incognito mode in the browser
Anti-malware in browser
Remote browser access
42. Which of the following is used for monitoring traffic and analyzing network flow?
Managed detection and response
Cloud access security broker
Network traffic analysis
Network security firewall
Answer: C) Network traffic analysis is used for monitoring traffic and analyzing network
flow.
43.
In which category does compromising confidential information fall?
Threat
Bug
Attack
Vulnerability
44. In which category does the lack access control policy fall?
Threat
Bug
Attack
Vulnerability
46. Which software is mainly used to help users detect viruses and avoid them?
Antivirus
Adware
Malware
None of the above
Answer: A) Antivirus is used to help users detect viruses and avoid them.
47. Identify the term which denotes the violation of principle if the computer is no more
accessible.
Access control
Availability
Confidentiality
All of the above
56. Identify which of the following can be considered instances of Open design.
DVD Player
CSS
Only B
Both A and B
Answer: D) Both DVD Player and CSS are instances of open design and their documentation
is publicly available.
57. What is transformed using cipher algorithms?
Scalar text
Complex text
Plain text
None
59. Identify the malware which does not replicate or clone through an infection?
Trojans
Worms
Rootkits
Virus
66. Which of the following is used for encrypting data at the network level?
HTTPS
SMTP
S/MIME
IPSec
70. Identify the term among the following which is the first phase of ethical hacking.
Footprinting
ARP Poisoning
DNS Poisoning
Enumeration
73. Identify the type of symmetric key algorithm which uses a streaming cipher to encrypt
information.
SHA
MD5
RC4
Blowfish
74. Identify the maximum character which Linux OS supports in its file names.
32
64
128
256
75. Among the following, identify the one which does not need any host program and is
independent.
Worm
Virus
Trojan horse
Trap door
Answer: A) Worm does not need any host program and is independent.
78. Which one of the following can be considered as the class of computer threats?
Dos Attack
Phishing
Soliciting
Both B and C
79. Choose the default port number for Apache and other web servers.
20
27
80
87
81. Identify the element which is not considered in the triad, according to the CIA.
Authenticity
Availability
Integrity
Confidentiality
Answer: D) Confidentiality is not considered in the triad according to the CIA.
83. Identify the term which denotes the protection of data from modification by unknown
users.
Confidentiality
Authentication
Integrity
Non-repudiation
Answer: C) The term which denotes the protection of data from modification by unknown
users is known as integrity.
COMPUTER NETWORK SECURITY
MCQ
1. In computer security, _______ means that active computer systems can only
be modified by authorized persons.
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
a) Stealth Virus
b) Polymorphic Virus
c) Parasitic Virus
d) Macro Virus
a) 8 rounds
b) 12 rounds
c) 16 rounds
d) 24 rounds
23. ________ transforms the message into a format that cannot be read by
hackers.
a) Decryption
b) Encryption
c) Transforming
d) None of the above
a) 43
b) 443
c) 445
d) 444
25. The encryption and decryption of data is the responsibility of which layer?
a) Session layer
b) Network layer
c) Transport layer
d) Presentation layer
26. What is the algorithm of key exchange used in the parameter of a Cipher
Suite?
a) RSA
b) Fixed Diffie-Hellman
c) Ephemeral Diffie-Hellman
d) All the answers are true
27. The certificate message is required for any agreed key exchange method,
except__________.
a) Ephemeral Diffie-Hellman
b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman
d) RSA
28. Firewalls are used for __________
a) Routing
b) Security
c) Tunneling
d) Congestion control
29. _________ is used to validate the identity of the message sender to the
recipient.
a) Encryption
b) Decryption
c) Digital certificate
d) None of the above
30. When you log in to an online service, you are asked to provide some sort of
Identification, such as your name, account number, and password. What is
the name given to this brief interaction?
a) Security procedures
b) Connection procedure
c) Backup procedure
d) Identification procedure
a) MD5
b) SHA-2
c) SHA-1
d) Does not use a hash algorithm
a) Stealth virus
b) Polymorphic virus
c) Parasitic virus
d) Macro viruses
33. One part of the polymorphic virus, usually called ________, creates a random
cipher and a key to encrypt the rest of the virus.
a) mutual engine
b) mutation engine
c) multiple engine
d) polymorphic engine
a) True
b) False
a) True
b) False
a) Worm
b) Zombie
c) Virus
d) Trap doors
a) MD5
b) SHA-1
c) MD5 and SHA-1
d) Trap doors
a) certificate_ extension
b) certificate_ creation
c) certificate_ exchange
d) certificate_ type
39. What is the size of an RSA signature after MD5 and SHA-1 processing?
a) 42 bytes
b) 32 bytes
c) 36 bytes
d) 48 bytes
a) Virus Attacks
b) Fire Attacks
c) Data Driven Attacks
d) Unauthorized Attacks
41. The first computer virus is
a) The famous
b) HARLIE
c) PARAM
d) Creeper
42. Which one of the following is a key function of firewall?
a) Copying
b) Moving
c) Deleting
d) Monitoring
43. Which memory is nonvolatile and may be written only once?
a) PROM
b) RAM
c) EP-ROM
d) SRAM
44. Unauthorized copying of software to be used for personal gain of personal backups is called
a) Program looting
b) Program thievery
c) Data snatching
d) Software piracy
45. Like a virus , it is a self-replicating program it also propagates through computer network
a) Phishing scam
b) Worm
c) Spyware
d) Cracker
46. The terminal device often used in checking charge cards that offers both a limited keyboard
a) Depending on passwords
b) Carelessness by users
c) Too much emphasis on preventing physical access
d) Insufficient technology used to prevent breaches
51. Trojan-Horse programs:-
a) Computed
b) Mind
c) Brain
d) Elk cloner
53. The linking of computers with a communication system is called
a) Assembling
b) Interlocking
c) Pairing
d) Networking
54. The phrase ____ describe viruses, worms, Trojan horse attack applets and attack scripts.
a) Spam
b) Phishing
c) Malware
d) Virus
55. Abuse messaging systems to send unsolicited is
a) Phishing
b) Adware
c) Firewall
d) Spam
56. A person who uses his or her expertise to gain access to other people’s computers to get
a) Hacker
b) Analyst
c) Spammer
d) Programmer
57. Malicious access are unauthorized
a) Destruction of data
b) Modification of data
c) Reading of data
d) All of these
58. Encrypted passwords are used for
a) Security purpose
b) Passwords list secret
c) Faster execution
d) Both (a) and (b)
59. A firewall
4. ___ means that assets can be modified only by authorized parties or only in
authorized ways.
Ans: Integrity
9. Ciphertext depends on the original plaintext message, the algorithm, and the ___.
Ans: key-value
13. The size of the enciphered text should be no larger than the text of the original
message. True / False
Ans: True
14. Symmetric algorithms use ___ key(s).
Ans: one.
15. ___ enables such an analyst to infer data that should be kept confidential in the
database.
Ans: Linear programming.
16. ___ is a person who attempts to break a cypher text message to obtain the original
plaintext message.
Ans: Cryptanalyst
18. The columnar transposition and other transpositions are examples of ___.
Ans: Block cyphers.
19. The data encryption algorithm developed by IBM for NBS was based on ___.
Ans: Lucifer
23. The ___ is likely to be the commercial-grade symmetric algorithm of choice for
years, if not decades.
Ans: AES
25. Asymmetric or public-key encryption systems use two keys, ___, and ___.
Ans: A public key, a private key
29. ___ gives us a reliable means to prove the origin of data or code.
Ans: Digital signatures
31. A digital signature must meet two primary conditions ___ and ___.
Ans: Unforgeable, authentic
32. Flaws are first divided into ___ and ___ flaws.
Ans: Intentional, inadvertent
35. Virus attaches itself to the program and propagates copies of it to other programs.
True/ False
Ans: True
37. ___ is often used as a safe way for general users to access sensitive data.
Ans: Trusted software.
39. ___ is a feature in a program by which someone can access the program other than
by the obvious, direct call, perhaps with special privileges.
Ans: Backdoor
40. In ___ separation, processes conceal their data and computations in such a way that
they are unintelligible to outside processes.
Ans: Cryptographic
43. A key advantage of the group protection approach is its ease of implementation.
True/False
Ans: True
44. ___ are mutually agreed-upon code words, assumed to be known only to the user
and the system.
Ans: Passwords
46. In ___, each piece of information is ranked at a particular sensitivity level, such as
unclassified, restricted, confidential, secret, or top secret.
Ans: Military security.
47. The military security model is representative of a more general scheme, called a
___.
Ans: Lattice
48. Unlike regular operating systems, trusted systems incorporate technology to address
both ___ and ___
Ans: Features, assurance
50. ___ is a characteristic that often grows over time, in accordance with evidence and
experience.
Ans: Trust
51. A single computing system in a network is often called ___ and its processor
(computer) is called ___.
Ans: A node, a host
52. The way a network is configured, in terms of nodes and connections, is called the
network firewall. True/False
Ans: False
58. You can protect the IP datagrams by using one of the IPSec protocol elements, the
___ or the ___.
Ans: Encapsulating Security Payload (ESP), Authentication Header (AH).
60. The security association that applies to a given IPSec header is determined by the
packets ___ and the ___ in the packet header.
Ans: Destination IP address, Security parameter index (SPI).
61. The management of SAs can be either manual or through an Internet standard
called___.
Ans: Key management protocol
62. ESP seeks to provide ___ and ___ by encrypting data to be protected and placing
the encrypted data in the data portion of the IP ESP.
Ans: Confidentiality and Integrity
63. IKE is considered a hybrid protocol because it combines (and supplements) the
functions of three other protocols ___ and ___.
Ans: ISAKMP, OAKLEY, and SKEME
64. ___ is a generic protocol that supports many different key exchange methods.
Ans: ISAKMP
65. The ___ has established a service for assessing the security of commercial websites.
Ans: National Computer Security Association (NCSA)
66. On the upper layer, a protocol for initial authentication and transfer of encryption
keys is called ___.
Ans: SSL Handshake Protocol
67. The combination of key exchange, hash, and encryption algorithm for each SSL
session is defined as ___.
Ans: Cipher suite
68. SSL uses the ___ for reporting errors and abnormal conditions.
Ans: Alert protocol
70. In SET ___ is used to link two messages that are intended for two different
recipients.
Ans: Dual Signature.
71. ___ is an open encryption and security specification designed to protect credit card
transactions on the Internet.
Ans: Secure Electronic Transaction (SET)
74. Encrypted e-mail messages always carry a digital signature, so the ___ and ___ of
the sender are assured.
Ans: Authenticity, non-repudiability
76. ___ cannot protect against forgery by a recipient, since both sender and recipient
share a common key.
Ans: Symmetric encryption
79. Encrypted e-mail messages always carry a ___, so the authenticity and non-
reputability of the sender are assured.
Ans: Digital signature
80. ___ is a device that filters all traffic between a protected or “inside” network and a
less trustworthy or “outside” network.
Ans: Firewall
81. A packet filtering gateway controls access to packets based on packet address (source
or destination) or ___.
Ans: Specific transport protocol type
83. ___ maintains state information from one packet to another in the input stream.
Ans: Stateful inspection firewall
84. The primary disadvantage of packet filtering routers is a combination of ___ and
___.
Ans: Simplicity, complexity
85. ___ identifies and organizes the security activities for a computing system.
Ans: Security plan
86. ___ is the difference in risk exposure divided by the cost of reducing the risk.
Ans: Risk leverage
91. ___ is a process that drives the rest of the security administration.
Ans: Security planning