Security And Cryptography Quiz: Test!

100 Questions | Total Attempts: 489

SettingsSettingsSettings
Security And Cryptography Quiz: Test! - Quiz

.


Questions and Answers
  • 1. 
    A message is authentic and digitally signed if sent with:
    • A. 

      A message digest/hash encrypted with the sender’s private key

    • B. 

      A message digest/hash encrypted with the sender’s public key

    • C. 

      A message digest/hash encrypted with the receiver’s private key

    • D. 

      A message digest/hash encrypted with the receiver’s private key

  • 2. 
    Heart of Data Encryption Standard (DES), is the
    • A. 

      Cipher

    • B. 

      Rounds

    • C. 

      Encryption

    • D. 

      DES function

  • 3. 
    Digital Signatures are:
    • A. 

      Proof of authenticity of the sender

    • B. 

      Proof of authenticity of the receiver

    • C. 

      Proof of authenticity of the verifier

    • D. 

      Proof of authenticity of Alice

  • 4. 
    In symmetric-key cryptography, the key used by sender and receiver is
    • A. 

      Shared

    • B. 

      Different

    • C. 

      Two keys are used

    • D. 

      None

  • 5. 
    In symmetric key cryptography, key(s) used for encryption and decryption is/are
    • A. 

      Same

    • B. 

      Different

    • C. 

      Private

    • D. 

      Public

  • 6. 
    Keys used in cryptography are:
    • A. 

      Secret key

    • B. 

      Private key

    • C. 

      Public key

    • D. 

      All of them

    • E. 

      None of them

  • 7. 
    Cryptography can provide:
    • A. 

      All of them

    • B. 

      Entity authentication

    • C. 

      Nonrepudiation of messages

    • D. 

      Confidentiality

  • 8. 
    Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
    • A. 

      Key Size

    • B. 

      Datasize

    • C. 

      Round Size

    • D. 

      Encryption Size

  • 9. 
    Cryptography algorithms (ciphers) are divided into:
    • A. 

      Two groups.

    • B. 

      Four groups.

    • C. 

      One single group

    • D. 

      None

  • 10. 
    In cryptography, original message, before being transformed, is called
    • A. 

      Simple text

    • B. 

      Plain text

    • C. 

      Empty text

    • D. 

      Filled text

  • 11. 
    A hash function guarantees integrity of a message. It guarantees that message has not be
    • A. 

      Replaced

    • B. 

      Over view

    • C. 

      Changed

    • D. 

      Left

  • 12. 
    Message digest is referred to:
    • A. 

      RSA

    • B. 

      Digital signature

    • C. 

      Hash function

    • D. 

      Digital signature with hash function

  • 13. 
    SHA means:
    • A. 

      Secret Hash Algorithm

    • B. 

      Secure Hash Algorithm

    • C. 

      Sneaky Hash Algorithm

    • D. 

      Super Hash Algorithm

  • 14. 
    Number of submissions for SHA-3 algorithm:
    • A. 

      15

    • B. 

      64

    • C. 

      128

    • D. 

      45

  • 15. 
    SHA-1 has a message digest of :
    • A. 

      160 bits

    • B. 

      512 bits

    • C. 

      628 bits

    • D. 

      820 bits

  • 16. 
    To check integrity of a message or document, receiver creates the :
    • A. 

      Cipher text

    • B. 

      Hash

    • C. 

      Hyper Text

    • D. 

      Finger Print

  • 17. 
    A digital signature needs a
    • A. 

      Private key

    • B. 

      Shared key

    • C. 

      Public key

    • D. 

      All of them

    • E. 

      None of them

  • 18. 
    Symmetric encryption:
    • A. 

      Used to conceal the contents of block or stream of data of any size, including messages, files, encryption keys, and passwords

    • B. 

      Used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures

    • C. 

      Used to protect blocks of data, such as messages, from alteration

    • D. 

      These are schemes based on the use of cryptographic algorithms designed to authenticate the identity of entities

  • 19. 
    Asymmetric encryption:
    • A. 

      Used to conceal the contents of block or stream of data of any size, including messages, files, encryption keys, and passwords

    • B. 

      Used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures

    • C. 

      Used to protect blocks of data, such as messages, from alteration

    • D. 

      These are schemes based on the use of cryptographic algorithms designed to authenticate the identity of entities

  • 20. 
    Authentication protocol:
    • A. 

      Used to conceal the contents of block or stream of data of any size, including messages, files, encryption keys, and passwords

    • B. 

      Used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures

    • C. 

      Used to protect blocks of data, such as messages, from alteration

    • D. 

      These are schemes based on the use of cryptographic algorithms designed to authenticate the identity of entities

  • 21. 
    What is Computer Security
    • A. 

      Protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources

    • B. 

      Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

    • C. 

      Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

    • D. 

      Ensuring timely and reliable access to and use of information.

  • 22. 
    What is Confidentiality?
    • A. 

      Protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources

    • B. 

      Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

    • C. 

      Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

    • D. 

      Ensuring timely and reliable access to and use of information.

  • 23. 
    What is Integrity?
    • A. 

      Protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources

    • B. 

      Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

    • C. 

      Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

    • D. 

      Ensuring timely and reliable access to and use of information.

  • 24. 
    What is Availability?
    • A. 

      Protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources

    • B. 

      Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

    • C. 

      Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

    • D. 

      Ensuring timely and reliable access to and use of information.

  • 25. 
    How many rounds of processing uses DES?
    • A. 

      14

    • B. 

      15

    • C. 

      16

    • D. 

      17

Back to Top Back to top