Security And Cryptography Quiz: Test!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Baidulla.madi
B
Baidulla.madi
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,137
| Attempts: 2,176
SettingsSettings
Please wait...
  • 1/100 Questions

    In cryptography, original message, before being transformed, is called

    • Simple text
    • Plain text
    • Empty text
    • Filled text
Please wait...
About This Quiz

This Security and Cryptography Quiz assesses knowledge in digital signatures, DES, and symmetric-key cryptography. It tests understanding of cryptographic keys and their roles in ensuring data security and authenticity, making it ideal for learners in computer security.

Security And Cryptography Quiz: Test! - Quiz

Quiz Preview

  • 2. 

    DSS stands for:

    • Digital signature standard

    • Digital sound system

    • Digital simulation schemes

    • None of these

    Correct Answer
    A. Digital signature standard
    Explanation
    DSS stands for Digital Signature Standard. This is a cryptographic algorithm that is used to generate and verify digital signatures. Digital signatures are used to ensure the authenticity, integrity, and non-repudiation of electronic documents. The DSS algorithm uses a combination of public and private keys to create a unique digital signature for each document. This standard is widely used in various industries and applications to secure electronic transactions and communications.

    Rate this question:

  • 3. 

    One commonly used public-key cryptography method is the ______ algorithm.

    • RSA

    • RSS

    • RAS

    • RAA

    • HDD

    Correct Answer
    A. RSA
    Explanation
    RSA is a commonly used public-key cryptography method. It stands for Rivest-Shamir-Adleman, named after the three inventors of the algorithm. RSA is widely used for secure communication, digital signatures, and encryption. It is based on the mathematical problem of factoring large composite numbers, making it difficult to break the encryption without the private key. RSA has been widely adopted and is considered secure for most applications.

    Rate this question:

  • 4. 

    An encryption algorithm transforms plaintext into

    • Cipher text

    • Plain text

    • Empty text

    • Filled text

    Correct Answer
    A. Cipher text
    Explanation
    An encryption algorithm is designed to convert plaintext into cipher text. This process involves the use of mathematical operations and a secret key to scramble the original message, making it unreadable to anyone who does not possess the key. The resulting cipher text can only be decrypted back into the original plaintext using the correct key. Therefore, the correct answer is "Cipher text."

    Rate this question:

  • 5. 

    Ciphers of today are called round ciphers because they involve

    • Single Round

    • Double Rounds

    • Multiple Round

    Correct Answer
    A. Multiple Round
    Explanation
    Ciphers of today are called round ciphers because they involve multiple rounds. This means that the encryption process is repeated multiple times, with each round adding an additional layer of complexity to the cipher. By using multiple rounds, the cipher becomes more secure and resistant to attacks. Each round typically includes a combination of substitution, permutation, and other cryptographic operations to ensure the confidentiality and integrity of the data being encrypted. Overall, the use of multiple rounds enhances the security of modern ciphers.

    Rate this question:

  • 6. 

    AES stands for:

    • Advanced Encryption Standard

    • Advanced Encryption System

    • Advanced Encryption Solutions

    • Advanced Encryption Senders

    Correct Answer
    A. Advanced Encryption Standard
    Explanation
    AES stands for Advanced Encryption Standard. It is a widely used encryption algorithm that is used to secure sensitive data. It was developed by the National Institute of Standards and Technology (NIST) and is considered to be one of the most secure encryption standards available. AES uses a symmetric key algorithm, meaning the same key is used for both encryption and decryption. It is used in various applications such as securing communication over the internet, protecting sensitive information in databases, and securing data stored on devices.

    Rate this question:

  • 7. 

    Cryptography ensures:

    • Confidentiality of data

    • Authentication of data

    • Integrity of data

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    Cryptography ensures the confidentiality of data by encrypting it, making it unreadable to unauthorized users. It also ensures the authentication of data by verifying the identity of the sender and receiver, preventing any tampering or unauthorized access. Additionally, cryptography ensures the integrity of data by detecting any alterations or modifications made to the data during transmission. Therefore, the correct answer is "All of the above" as cryptography encompasses all these aspects to protect data.

    Rate this question:

  • 8. 

    SHA means:

    • Secret Hash Algorithm

    • Secure Hash Algorithm

    • Sneaky Hash Algorithm

    • Super Hash Algorithm

    Correct Answer
    A. Secure Hash Algorithm
    Explanation
    The correct answer is "Secure Hash Algorithm." SHA stands for Secure Hash Algorithm, which is a cryptographic hash function used to generate unique hash values for data. It is widely used in various security applications, such as digital signatures, password storage, and data integrity verification.

    Rate this question:

  • 9. 

    A hash function guarantees integrity of a message. It guarantees that message has not be

    • Replaced

    • Over view

    • Changed

    • Left

    Correct Answer
    A. Changed
    Explanation
    A hash function guarantees the integrity of a message by generating a unique hash value for a given message. This hash value acts as a digital fingerprint for the message, ensuring that any changes made to the message will result in a different hash value. Therefore, if the hash value of a message is different from the original hash value, it indicates that the message has been changed in some way.

    Rate this question:

  • 10. 

    How many rounds of processing uses DES?

    • 14

    • 15

    • 16

    • 17

    Correct Answer
    A. 16
    Explanation
    DES (Data Encryption Standard) is a symmetric encryption algorithm that uses a Feistel network structure. In each round of processing, DES performs several operations, including permutation, substitution, and XOR operations. Specifically, DES consists of 16 rounds of processing. During each round, the algorithm applies a different subkey derived from the original encryption key. This process increases the security and complexity of the encryption. Therefore, the correct answer is 16.

    Rate this question:

  • 11. 

    In a(n) ________ cipher, the same key is used by both the sender and receiver

    • Symmetric - key

    • Asymmetric – key

    • Public –key cryptography

    • RSA algorithm

    • None of them

    Correct Answer
    A. Symmetric - key
    Explanation
    In a symmetric-key cipher, the same key is used by both the sender and receiver to encrypt and decrypt the message. This means that both parties have access to the same key, allowing for efficient and secure communication. Unlike asymmetric-key cryptography, which uses different keys for encryption and decryption, symmetric-key cryptography is faster and more suitable for situations where both parties need to have access to the same key. The RSA algorithm, on the other hand, is a specific asymmetric-key algorithm used for encryption and digital signatures. Therefore, the correct answer is symmetric-key.

    Rate this question:

  • 12. 

    In asymmetric encryption

    • Different keys are used encryption and decryption

    • Same key is used for encryption and decryption

    • No key is required for encryption and decryption

    • None of them

    Correct Answer
    A. Different keys are used encryption and decryption
    Explanation
    In asymmetric encryption, different keys are used for encryption and decryption. This means that there are two separate keys: a public key for encryption and a private key for decryption. The public key is used to encrypt the data, while the private key is kept secret and used to decrypt the data. This approach provides a higher level of security because even if the public key is intercepted, it cannot be used to decrypt the data without the corresponding private key.

    Rate this question:

  • 13. 

    In cryptography

    • Information is transmitted from sender to receiver

    • No information is transmitted

    • Information is damaged

    • No correct answer

    Correct Answer
    A. Information is transmitted from sender to receiver
    Explanation
    The correct answer is "Information is transmitted from sender to receiver" because cryptography is the practice of securing communication by converting information into a format that is unreadable to unauthorized individuals. This implies that there is indeed information being transmitted between the sender and receiver, but it is done in a way that ensures its confidentiality and integrity.

    Rate this question:

  • 14. 

    The field which deals with _____ called cryptography.

    • Keys

    • Encryption techniques and secure systems

    • Firewalls, Kerberos and Intrusion detection systems

    • Operating systems

    Correct Answer
    A. Encryption techniques and secure systems
    Explanation
    Cryptography is the field that deals with encryption techniques and secure systems. It involves the study and implementation of techniques to secure information and communications from unauthorized access or alteration. Encryption techniques are used to convert plaintext into ciphertext, making it unreadable without the proper decryption key. Secure systems, on the other hand, refer to the various mechanisms and protocols used to protect sensitive data and ensure secure communication. This includes authentication, access control, firewalls, intrusion detection systems, and other security measures.

    Rate this question:

  • 15. 

    Cryptography can provide:

    • All of them

    • Entity authentication

    • Nonrepudiation of messages

    • Confidentiality

    Correct Answer
    A. All of them
    Explanation
    Cryptography is a powerful tool that can provide various security features. Entity authentication ensures that the communicating parties can verify each other's identities, preventing unauthorized access. Nonrepudiation of messages ensures that the sender cannot deny sending a message, providing accountability. Confidentiality ensures that the information exchanged between parties remains private and cannot be accessed by unauthorized individuals. Therefore, cryptography can indeed provide all of these security features.

    Rate this question:

  • 16. 

    RSA stands for

    • Rivest, Shamir, Adleman

    • Roger, Shamir, Adrian

    • Robert , Shamir , Adlan

    • Rivest, Shaw, Adleman

    Correct Answer
    A. Rivest, Shamir, Adleman
    Explanation
    RSA stands for Rivest, Shamir, Adleman. This is the correct answer because RSA is a public-key encryption algorithm that was developed by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977. The algorithm is widely used for secure communication and data encryption.

    Rate this question:

  • 17. 

    The sender “signs” a message as:

    • Digital Signature

    • Artificial Signature

    • Encrypted Signature

    • None of the above

    Correct Answer
    A. Digital Signature
    Explanation
    A digital signature is a cryptographic technique used to verify the authenticity and integrity of a message or document. It involves the use of a private key to encrypt the message, which can only be decrypted using the corresponding public key. This ensures that the message has not been tampered with during transmission and can be traced back to the sender. An artificial signature refers to a signature created by a computer program, while an encrypted signature is not a commonly used term in the context of message signing. Therefore, the correct answer is Digital Signature.

    Rate this question:

  • 18. 

    RSA involves very large _____ numbers?

    • Prime

    • Even

    • Odd

    • Integer

    Correct Answer
    A. Prime
    Explanation
    RSA (Rivest-Shamir-Adleman) is a widely used encryption algorithm that relies on the difficulty of factoring large composite numbers. In RSA, two large prime numbers are used to generate the public and private keys. The security of RSA is based on the assumption that factoring large composite numbers into their prime factors is computationally infeasible. Therefore, the correct answer is "Prime" because RSA involves very large prime numbers.

    Rate this question:

  • 19. 

    In symmetric-key cryptography, the key used by sender and receiver is

    • Shared

    • Different

    • Two keys are used

    • None

    Correct Answer
    A. Shared
    Explanation
    In symmetric-key cryptography, the key used by the sender and receiver is "shared." This means that both parties have access to the same key, which is used for both encryption and decryption of the message. By sharing the key, the sender can encrypt the message using the key, and the receiver can decrypt it using the same key. This ensures that only the intended recipient, who possesses the key, can decrypt and access the message.

    Rate this question:

  • 20. 

    The total number of rounds in DES algorithm.

    • 16

    • 10

    • 48

    • 14

    • 36

    Correct Answer
    A. 16
    Explanation
    The DES algorithm, which stands for Data Encryption Standard, consists of 16 rounds. Each round involves several operations, including permutation, substitution, and key mixing, to encrypt the input data. These rounds ensure a high level of security and complexity in the encryption process. Therefore, the correct answer is 16.

    Rate this question:

  • 21. 

    Keys used in cryptography are:

    • Secret key

    • Private key

    • Public key

    • All of them

    • None of them

    Correct Answer
    A. All of them
    Explanation
    Keys used in cryptography include a secret key, a private key, and a public key. A secret key is used in symmetric encryption algorithms where the same key is used for both encryption and decryption. A private key is used in asymmetric encryption algorithms where a different key is used for encryption and decryption. A public key is used in asymmetric encryption algorithms where the public key is used for encryption and the corresponding private key is used for decryption. Therefore, all three types of keys are used in cryptography.

    Rate this question:

  • 22. 

    DES has an initial and final permutation block and _________ rounds.

    • 14

    • 15

    • 12

    • 16

    • 3

    Correct Answer
    A. 16
    Explanation
    The correct answer is 16. DES (Data Encryption Standard) has an initial and final permutation block and a total of 16 rounds. During each round, a specific set of operations is performed on the input data to encrypt or decrypt it. These rounds increase the security and complexity of the encryption algorithm, making it more resistant to attacks.

    Rate this question:

  • 23. 

    The method of hiding the secret is called…

    • Cryptography

    • Blockchain

    • Watermarking

    • RSA decryption

    Correct Answer
    A. Cryptography
    Explanation
    Cryptography is the method of hiding a secret through the use of encryption techniques. It involves converting plain text into cipher text, making it unreadable to anyone who does not have the decryption key. This process ensures the confidentiality and integrity of information, protecting it from unauthorized access or tampering. Cryptography is widely used in various fields, such as secure communication, data protection, and financial transactions.

    Rate this question:

  • 24. 

    Cryptography algorithms (ciphers) are divided into:

    • Two groups.

    • Four groups.

    • One single group

    • None

    Correct Answer
    A. Two groups.
    Explanation
    Cryptography algorithms (ciphers) are divided into two groups. This means that there are two distinct categories or classifications for these algorithms. This division allows for easier organization and understanding of the different types of ciphers. It also suggests that there are different characteristics or properties that differentiate the algorithms within each group.

    Rate this question:

  • 25. 

    Diffie-Hellman key exchange is vulnerable to:

    • Man-in-the-middle attack

    • Elliptic curve cryptography

    • Discrete logarithmic problem

    Correct Answer
    A. Man-in-the-middle attack
    Explanation
    The Diffie-Hellman key exchange is vulnerable to a man-in-the-middle attack. In this type of attack, a malicious third party intercepts the communication between the two parties who are trying to establish a secure key. The attacker then impersonates each party to establish separate secure connections with them. This allows the attacker to intercept and modify the exchanged keys, compromising the security of the communication.

    Rate this question:

  • 26. 

    Authentication is:

    • Verification of user’s identification

    • Verification of the data

    • All answers are correct

    • No correct answer

    Correct Answer
    A. Verification of user’s identification
    Explanation
    Authentication refers to the process of verifying the identity of a user. It involves confirming that the user is who they claim to be before granting them access to a system, application, or data. This can be done through various means such as passwords, biometrics, security tokens, or two-factor authentication. By verifying the user's identification, authentication ensures that only authorized individuals are granted access, enhancing security and protecting against unauthorized access or data breaches.

    Rate this question:

  • 27. 

    Secure hash algorithm(SHA) developed by:

    • National Institute of Standards and Technology or NSA

    • Google

    • ANSI

    • United Nations

    • NASA

    Correct Answer
    A. National Institute of Standards and Technology or NSA
    Explanation
    The correct answer is National Institute of Standards and Technology or NSA. The NSA is responsible for the development of the Secure Hash Algorithm (SHA). SHA is a widely used cryptographic hash function that is used to ensure data integrity and security. It is designed to produce a unique and fixed-size hash value from input data of any size. The development of SHA by the NSA demonstrates their expertise and focus on cryptographic algorithms and security standards.

    Rate this question:

  • 28. 

    What is the purpose of access control list?

    • To prevent unauthorised access to data

    • To enforce a specified security policy

    • To emphasize encryption

    • It is a key distribution center

    Correct Answer
    A. To prevent unauthorised access to data
    Explanation
    Access control lists (ACLs) are used to determine who is allowed to access certain resources or data. By implementing ACLs, organizations can prevent unauthorized access to sensitive information, protecting it from potential breaches or misuse. ACLs enforce security policies by specifying which users or groups have permission to access specific resources, ensuring that only authorized individuals can view or modify the data. Emphasizing encryption is not the primary purpose of ACLs, and they are not a key distribution center.

    Rate this question:

  • 29. 

    Public key cryptosystem provides authentication:

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Public key cryptosystem provides authentication by using a pair of keys, a public key and a private key. The public key is freely available to anyone, while the private key is kept secret by the owner. When someone wants to authenticate themselves, they can use their private key to encrypt a message, and anyone with the corresponding public key can decrypt it. This process verifies the identity of the sender, as only the owner of the private key could have encrypted the message. Therefore, public key cryptosystem provides authentication.

    Rate this question:

  • 30. 

    Public key cryptosystem provides confidentiality:

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Public key cryptosystem provides confidentiality because it uses a pair of keys - a public key and a private key. The public key is used to encrypt the data, while the private key is used to decrypt it. Only the intended recipient with the private key can decrypt and access the confidential information. This ensures that the data remains secure and confidential during transmission and storage.

    Rate this question:

  • 31. 

    Message privacy means that sender and receiver expect:

    • Integrity

    • Confidentiality

    • Authentication

    • Nonrepudiation

    Correct Answer
    A. Confidentiality
    Explanation
    Message privacy refers to the protection of the content of a message from unauthorized access or disclosure. It ensures that only the intended recipient can access and understand the message. Confidentiality is an essential aspect of message privacy, as it ensures that the information remains private and cannot be accessed or understood by unauthorized parties. It involves encryption and other security measures to prevent unauthorized access to the message content. Therefore, the expectation of confidentiality is crucial for maintaining the privacy of messages between sender and receiver.

    Rate this question:

  • 32. 

    In symmetric cryptography, which of the following MUST be true.

    • Encryption and decryption take the same amount of time

    • Different algorithms are used for encryption and decryption

    • Cryptographic operations are one – way and nor reversible

    • The same key is used for encryption

    Correct Answer
    A. The same key is used for encryption
    Explanation
    In symmetric cryptography, the same key is used for both encryption and decryption. This is because symmetric encryption algorithms use a single key to both scramble and unscramble the data. The key is shared between the sender and the receiver, allowing them to encrypt and decrypt the message using the same key. This ensures that the message remains secure and can only be accessed by those who possess the key.

    Rate this question:

  • 33. 

    The process to discover plaintext or key is known as

    • Cryptanalysis

    • Cryptography

    • Crypto desing

    • Crypto gaming

    • Crypto learning

    Correct Answer
    A. Cryptanalysis
    Explanation
    Cryptanalysis refers to the process of analyzing and deciphering encrypted messages or codes without having access to the key or the original plaintext. It involves studying the patterns and weaknesses in the encryption algorithm to uncover the meaning behind the encrypted data. This process is often used by individuals or organizations to break encryption systems and gain unauthorized access to sensitive information. Cryptanalysis plays a crucial role in the field of cybersecurity and is used both for defensive purposes, such as identifying vulnerabilities in encryption systems, as well as offensive purposes, such as cracking encrypted messages for intelligence gathering.

    Rate this question:

  • 34. 

    Which of the following method provides a one-time session key for two parties?

    • Diffie – Hellman

    • RSA

    • DES

    • AES

    Correct Answer
    A. Diffie – Hellman
    Explanation
    Diffie-Hellman is a method that allows two parties to establish a shared secret key over an insecure channel. It provides a one-time session key for the two parties by allowing them to independently generate public and private keys, exchange public keys, and then compute a shared secret key using their own private keys and the other party's public key. This shared secret key can then be used for secure communication between the two parties. RSA, DES, and AES are encryption algorithms but do not specifically provide a one-time session key for two parties like Diffie-Hellman does.

    Rate this question:

  • 35. 

    Operation in AES is based on

    • Substitution

    • Permutation

    • Substitution-permutation

    Correct Answer
    A. Substitution-permutation
    Explanation
    The operation in AES is based on a combination of both substitution and permutation. Substitution involves replacing each byte of the input with another byte based on a specific substitution table. Permutation involves rearranging the positions of the bytes in the input. This combination of substitution and permutation provides a high level of security and makes AES resistant to various cryptographic attacks.

    Rate this question:

  • 36. 

    Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and

    • Key Size

    • Datasize

    • Round Size

    • Encryption Size

    Correct Answer
    A. Key Size
    Explanation
    The given question is incomplete as it does not provide any specific information or options to choose from. Therefore, an explanation cannot be generated.

    Rate this question:

  • 37. 

    To check integrity of a message or document, receiver creates the :

    • Cipher text

    • Hash

    • Hyper Text

    • Finger Print

    Correct Answer
    A. Hash
    Explanation
    To check the integrity of a message or document, the receiver creates a hash. A hash is a fixed-length string of characters that is generated by applying a mathematical algorithm to the content of the message or document. This hash serves as a unique identifier for the content, allowing the receiver to compare it with the original hash provided by the sender. If the hashes match, it ensures that the message or document has not been tampered with during transmission.

    Rate this question:

  • 38. 

    What is Confidentiality?

    • Protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources

    • Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

    • Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

    • Ensuring timely and reliable access to and use of information.

    Correct Answer
    A. Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
    Explanation
    Confidentiality refers to the preservation of authorized restrictions on information access and disclosure, which includes measures to protect personal privacy and proprietary information. This means that only those who are authorized should have access to certain information, and it should not be disclosed to unauthorized individuals. This helps to maintain the privacy and security of personal and sensitive information, preventing it from falling into the wrong hands.

    Rate this question:

  • 39. 

    _____________ is the science and art of transforming messages to make them secure and immune to attacks

    • Cryptography

    • Cryptoanalysis

    • Crypt

    • Bitcoin

    • Encryption

    • None of them

    Correct Answer
    A. Cryptography
    Explanation
    Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves the use of mathematical algorithms and techniques to encrypt and decrypt information, ensuring that only authorized individuals can access and understand the message. Cryptography plays a crucial role in maintaining the confidentiality, integrity, and authenticity of data in various fields such as computer security, communication systems, and financial transactions.

    Rate this question:

  • 40. 

    Message _____ means that the data must arrive at the receiver exactly as sent.

    • Confidentiality

    • Integrity

    • Authentication

    • None of the above

    Correct Answer
    A. Integrity
    Explanation
    Integrity in the context of data transmission means that the data must arrive at the receiver exactly as it was sent, without any unauthorized changes or alterations. This ensures that the data has not been tampered with during transmission and maintains its accuracy and completeness. Confidentiality refers to the protection of data from unauthorized access, authentication refers to verifying the identity of a user or system, and none of the above does not accurately describe the concept of data arriving unchanged.

    Rate this question:

  • 41. 

    DES algorithm uses total ______ subkeys.

    • 16

    • 10

    • 8

    • 14

    • 24

    Correct Answer
    A. 16
    Explanation
    The DES algorithm uses a total of 16 subkeys. These subkeys are derived from the original encryption key through a process called key scheduling. Each subkey is used in a different round of the DES algorithm to perform the encryption or decryption operation. The use of multiple subkeys enhances the security of the algorithm by introducing complexity and making it more difficult for attackers to break the encryption.

    Rate this question:

  • 42. 

    What does multilevel security mean?

    • Classification of information by the level of importance and permission of access by users with different security clearance

    • Classification of information by date and permission of access by users with different security clearance

    • Classification of information by the level of importance and permission of access by users name

    • Classification of information by date and permission of access by users name

    Correct Answer
    A. Classification of information by the level of importance and permission of access by users with different security clearance
    Explanation
    Multilevel security refers to the classification of information based on its level of importance and the permission of access granted to users with different security clearances. This means that information is categorized into different levels of sensitivity, and users are granted access based on their clearance level, ensuring that only authorized individuals can access information that is appropriate for their level of clearance.

    Rate this question:

  • 43. 

    Digital Signatures are:

    • Proof of authenticity of the sender

    • Proof of authenticity of the receiver

    • Proof of authenticity of the verifier

    • Proof of authenticity of Alice

    Correct Answer
    A. Proof of authenticity of the sender
    Explanation
    Digital signatures are a cryptographic technique used to verify the authenticity of the sender of a message or document. They provide proof that the sender is who they claim to be and that the message has not been tampered with during transmission. By using a private key to encrypt the message, the sender creates a unique digital signature that can only be decrypted with their public key. This allows the receiver to verify the sender's identity and ensure the integrity of the message. Therefore, the correct answer is "Proof of authenticity of the sender."

    Rate this question:

  • 44. 

    What is Availability?

    • Protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources

    • Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

    • Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

    • Ensuring timely and reliable access to and use of information.

    Correct Answer
    A. Ensuring timely and reliable access to and use of information.
    Explanation
    Availability refers to the protection and assurance of timely and reliable access to information. This means that the information system is accessible and usable whenever needed, without any disruptions or delays. It involves measures to prevent unauthorized access, information modification, or destruction, and ensures that the information remains authentic and nonrepudiable. By ensuring availability, organizations can maintain the functionality and usability of their information systems, allowing users to access and utilize information as and when required.

    Rate this question:

  • 45. 

    AES is

    • Symmetric key encryption

    • Assymetric key encryption

    Correct Answer
    A. Symmetric key encryption
    Explanation
    AES stands for Advanced Encryption Standard, which is a widely used encryption algorithm. It is a symmetric key encryption algorithm, meaning that the same key is used for both the encryption and decryption processes. In symmetric key encryption, the sender and receiver both use the same key to encrypt and decrypt the data, ensuring confidentiality and data integrity. This makes AES an efficient and secure encryption method for protecting sensitive information.

    Rate this question:

  • 46. 

    The ________ method provides a one-time session key for two parties.

    • Diffie –Hellman

    • RSA

    • DES

    • AES

    • NASA

    Correct Answer
    A. Diffie –Hellman
    Explanation
    The Diffie-Hellman method is a key exchange protocol that allows two parties to establish a shared secret over an insecure communication channel. It provides a one-time session key for the two parties, which can be used for secure communication. This method is widely used in cryptography to ensure secure communication between two entities without the need for pre-shared keys.

    Rate this question:

  • 47. 

    What is Computer Security

    • Protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources

    • Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

    • Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

    • Ensuring timely and reliable access to and use of information.

    Correct Answer
    A. Protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources
    Explanation
    Computer security refers to the measures taken to protect an automated information system. These measures aim to achieve the objectives of maintaining the integrity, availability, and confidentiality of the resources within the information system. This includes safeguarding against unauthorized access and disclosure of information, protecting personal privacy and proprietary information, preventing improper modification or destruction of information, and ensuring reliable and timely access to and use of information.

    Rate this question:

  • 48. 

    The _______ is a number or a set of numbers on which the cipher operates.

    • Key

    • Cipher

    • Nonce

    • Secret

    • None of the above

    Correct Answer
    A. Key
    Explanation
    A key is a number or a set of numbers that is used in a cipher to perform the encryption or decryption process. It is essentially the input that determines how the cipher operates and transforms the plaintext into ciphertext or vice versa. The key acts as a parameter for the cipher algorithm, determining the specific steps and operations that are applied to the data. Without a key, the cipher would not be able to function correctly and would not be able to provide secure encryption or decryption of the data.

    Rate this question:

  • 49. 

    DES uses a key generator to generate sixteen _______ round keys.

    • 48-bit

    • 52-bit

    • 32-bit

    • 47-bit

    Correct Answer
    A. 48-bit
    Explanation
    DES (Data Encryption Standard) uses a key generator to generate sixteen 48-bit round keys. These round keys are derived from the original 64-bit key provided by the user. Each round key is used in the encryption process to modify the state of the data being encrypted. The 48-bit size of the round keys ensures that the encryption algorithm is strong and secure, providing a high level of protection for the data being encrypted.

    Rate this question:

Quiz Review Timeline (Updated): Jan 19, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 19, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • May 17, 2018
    Quiz Created by
    Baidulla.madi
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.