Documente Academic
Documente Profesional
Documente Cultură
ANSWER: C
is the most widely used privacy-ensuring program by _____ .27
individuals and is also used by many corporations
.which is developed by Philip R. Zimmermann
A. DSS
B. OCSP
C. Secure HTTP
D. Pretty Good Privacy
ANSWER: D
is the encryption algorithm that will begin to supplant _____ .28
the Data Encryption Standard (DES) - and later Triple
DES - over the next few years as the new standard encryption
.algorithm
A. Rijndael
B. kerberos
C. blowfish
D. IPsec
ANSWER: A
is a mode of operation for a block cipher, with the ____ .29
characteristic that each possible block of plaintext has a
.defined corresponding ciphertext value and vice versa
A. footprinting
B. hash function
C. watermark
D. electronic code block
ANSWER: D
is a trial and error method used to decode encrypted data ____ .30
through exhaustive effort rather than employing
.intellectual strategies
A. chaffing and winnowing
B. cryptanalysis
C. serendipity
D. brute force cracking
ANSWER: D
._______ In IDEA, the key size is .31
A. 128 bytes
B. 128 bits
C. 256 bytes
D. 256 bits
ANSWER: B
.is based on the IDEA algorithm _____ .32
A. S/MIME
B. PGP
C. SET
D. SSL
ANSWER: B
.There are _____ rounds in DES .33
A. 8
B. 10
C. 14
D. 16
ANSWER: D
.DES encrypt blocks of _____ bits .34
A. 32
B. 56
C. 64
D. 128
ANSWER: C
.increases the redundancy of plain text ____________ .35
A. confusion
B. diffusion
C. both confusion and diffusion
D. neither confusion nor diffusion
ANSWER: B
.In _______, one block of plain text is encrypted at a time .36
A. stream cipher
B. block cipher
C. both stream and block cipher
D. none of the above
ANSWER: B
.In _______, one bit of plain text is encrypted at a time .37
A. stream cipher
B. block cipher
C. both stream and block cipher
D. none of the above
ANSWER: A
.____ In tunnel mode IPsec protects the .38
A. entire IP packet
B. IP header
C. IP payload
D. none of the mentioned
ANSWER: A
._____ IPSec is designed to provide the security at the .39
A. transport layer
B. network layer
C. application layer
D. session layer
ANSWER: B
PGP encrypts data by using a block cipher called .40
.________________
A. international data encryption algorithm
B. private data encryption algorithm
C. internet data encryption algorithm
D. none of the mentioned
ANSWER: A
.____ Pretty Good Privacy is used in .41
A. browser security
B. email security
C. FTP security
D. none of the mentioned
ANSWER: B
.__________ Firewalls operate by .42
.A. The pre-purchase phase
B. isolating intranet from extranet
C. screening packets to/from the network and provide controllable
.filtering of network traffic
.D. none of the above
ANSWER: C
._____ Kerberos is an encryption-based system that uses .43
A. Secret key encryption
B. public key encryption
C. private key encryption
D. data key encryption
ANSWER: A
Mechanism to protect private network from outside attack is .44
.____
A. firewall
B. antivirus
C. digital signature
D. formatting
ANSWER: A
._____ A digital signature is .45
A. scanned signature
B. signature in binary form
C. encrypting information
D. handwritten signature
ANSWER: C
is a popular session key creator protocol that __________ .46
requires an authentication server and a ticket-granting
.server
A. KDC
B. Kerberos
C. CA
D. none of the above
ANSWER: B
.A digital signature needs a(n) _____ system .47
A. symmetric key
B. asymmetric key
C. either a or b
D. neither a or b
ANSWER: B
10
.D. RSA
ANSWER: A
._________ The cryptography algorithms used in S/MIME are .70
.A. IDEA
.B. RC4
.C. RSA,DES-3
.D. RC5
ANSWER: C
.__________ In S/MIME,MLA stands for .71
.A. mailing list agent
.B. multipurpose list agent
.C. mail lock agent
.D. message link agent
ANSWER: A
The processed S/MIME along with security related data is .72
.________ called as
.A. public key cryptography standard
.B. private key cryptography standard
.C. S/MIME
.D. MIME
ANSWER: A
.________ Blow fish was developed by .73
A. Bruce Schneier
B. Tuchman
C. Tuchman
D. dennis
ANSWER: A
The number of rounds used for encryption in DES algorithm .74
._____
A. 48
B. 8
C. 16
D. 32
ANSWER: C
._____ Triple DEA was first proposed by .75
A. Tuchman
B. fredick
C. nauman
D. dennis
ANSWER: A
In DES, the plain text is _______ bits and the key is ____ bits in .76
.length
A. 128,32
B. 64,16
C. 64,56
D. 256,32
ANSWER: C
11
12
B. masquerade
C. modification of messages
D. replay
ANSWER: A
When one entity pretends to be a different entity is a ________ .85
.type of active attacks
A. replay
B. modification of messages
C. denial of services
D. masquerade
ANSWER: D
.Active attack can be classified in to ___ categories .86
A. 3
B. 2
C. 4
D. 1
ANSWER: C
To prevent the opponent from learning the contents of .87
. message during transmissions is ________ type of attack
A. traffic analysis
B. system performance
C. release of message
.D. active attack
ANSWER: C
attacks are in the nature of eavesdropping on, or _____ .88
.monitoring of, transmissions
A. active attacks
B. passive attacks
C. both a and b
D. none of the above
ANSWER: B
.Addition of records to a file is a ____ type of attack .89
A. modification
B. fabrication
C. interception
D. interruption
ANSWER: B
An unauthorized party gains access to an asset. This is an .90
.______ attack on
A. availability
B. confidentiality
C. integrity
D. authenticity
ANSWER: B
An asset of the system is destroyed or becomes unavailable or .91
._____ unsuable. This type of attack is called as
A. Interception
13
B. Interruption
C. Non repudiation
D. Confidentiality
ANSWER: B
?Which of the following is not a security mechanisms .92
A. Encryption
B. Digital signature
C. Access control
D. All of the above
ANSWER: D
ensures that the information in a computer system and _______ .93
transmitted information are accessible only for
.reading by authorized parties
A. Integrity
B. Availability
C. Non repudiation
D. Confidentiality
ANSWER: D
requires that neither the sender nor the reciver of a _____ .94
.message be able to deny the transmission
A. Access control
B. Non repudiation
C. Integrity
D. Availability
ANSWER: B
A ________ is a program that secretly takes over another .95
Internet-attached computer and then uses that computer
.to launch attacks
A. Worm
B. Zombie
C. Virus
D. Trap doors
ANSWER: B
In _______ the virus places an identical copy of itself into other .96
.programs or into certain system areas on the disk
A. Dormant phase
B. Propagation phase
C. Triggering phase
D. Execution phase
ANSWER: B
The type(s) of auto executing macros, in Microsoft word is/are .97
._____
A. Auto execute
B. Auto macro
C. Command macro
D. All of the above
ANSWER: D
14
15
16
C. read frequency
D. execution frequency
ANSWER: D
.X.509 recommends ____ algorithm .113
A. DES
B. Triple DES
C. RSA
D. Blowfish
ANSWER: C
.____ The heart of the X.509 scheme is .114
A. public key
B. private key
C. both a and b
D. none of the above
ANSWER: A
____ In X.509, the user certificate is created by .115
A. Certificate authority
B. admin
C. user
D. directory server
ANSWER: A
.___ In X.509 format , signature field covers .116
A. hash code
B. private key
C. algorithm
D. all of the above
ANSWER: D
defines a format for text message that are sent using ____ .117
.electronic mail
A. RFC836
B. RFC822
C. RFC348
D. RFC356
ANSWER: B
.___ The use of S/MIME .118
A. commercial
B. organization
C. both a and b
D. none of the above
ANSWER: C
.Receiving agents of S/MIME uses ____ algorithm .119
A. Triple DES
B. RSA
C. SHA-1
D. MD5
ANSWER: B
Which of the following public key algorithm is not used by .120
17
18
19
20
C. 64
D. 56
ANSWER: B
is the science and art of transforming messages to ________ .143
.make them secure and immune to attacks
A. Cryptography
B. Cryptoanalysis
C. either (a) or (b)
D. neither (a) nor (b)
ANSWER: A
.The DES function has _______ components .144
A. 2
B. 3
C. 4
D. 5
ANSWER: C
DES was designed to increase the size of the DES key ________ .145
A. Double
B. Triple
C. Quadruple
D. none of the above
ANSWER: B
The ________ method provides a one-time session key for two .146
.parties
A. Diffie-Hellman
B. RSA
C. DES
D. AES
ANSWER: A
The _________ attack can endanger the security of the Diffie- .147
Hellman method if two parties are not
.authenticated to each other
A. man-in-the-middle
B. ciphertext attack
C. plaintext attack
D. none of the above
ANSWER: A
In _____ Mode, the authentication header is inserted .148
.immediately after the IP header
A. transport
B. tunnel
C. authentication
D. both a and b
ANSWER: B
?Which of the following is not the External Security Threats .149
A. Front-door Threats
B. Back-door Threats
21
C. Underground Threats
D. Denial of Service (DoS)
ANSWER: C
Which of the following pieces of information can be found in .150
?the IP header
A. Source address of the IP packet
B. Destination address for the IP packet
C. Sequence number of the IP packet
.D. Both (A) and (B) only
ANSWER: D
Staff Name
. Kalaivani S
22