Online Technical Quiz (Nis)

50 Questions | Total Attempts: 53

SettingsSettingsSettings
Please wait...
Online Technical Quiz (Nis)

Online Technical Quiz Competition conducted by Prof. R. H. Rathod, Computer Eng. Deptt.


Questions and Answers
  • 1. 
    Which of the following is independent malicious program that need not any host program?
    • A. 

      Trap doors

    • B. 

      Trojan horse

    • C. 

      Virus

    • D. 

      Worm

  • 2. 
    Which of the following malicious program do not replicate automatically?
    • A. 

      Trojan Horse

    • B. 

      Worm

    • C. 

      Virus

    • D. 

      Zombie

  • 3. 
    This logo is used by which company? 
    • A. 

      Logitech

    • B. 

      Netscape

    • C. 

      LG

    • D. 

      AMD

  • 4. 
    In ________ authentication, the claimant proves that she knows a secret without actually sending it.
    • A. 

      Password based

    • B. 

      Challenge response

    • C. 

      Encryption based

    • D. 

      None

  • 5. 
    In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.
    • A. 

      Message Authentication

    • B. 

      Message Confidentiality

    • C. 

      Entity Authentication

    • D. 

      None

  • 6. 
    Password-based authentication can be divided into two broad categories: _______ and _______.
    • A. 

      Fixed and Variable

    • B. 

      Fixed and One time

    • C. 

      Time stamped and Fixed

    • D. 

      None of the Above

  • 7. 
    ------------------- is the art of achieving security by encoding messages to make them non-readable
    • A. 

      Cryptography

    • B. 

      Cryptology

    • C. 

      Cryptanalysis

    • D. 

      None of the this

  • 8. 
    There are two ways by which plain text message can be converted in to cipher text messages.....
    • A. 

      Substitution & Transposition

    • B. 

      Symmetric & Asymmetric

    • C. 

      Encryption & Decryption

    • D. 

      None of these

  • 9. 
    The cipher message of the plain text “network security” is ……………………. When uses Caesar’s cipher
    • A. 

      Qhwzrun vhfxulwb

    • B. 

      Qhwavwr vhfxvmxc

    • C. 

      Qhwrvwx vhewulzf

    • D. 

      Qhwvwxr vhevwmae

  • 10. 
    The same key is used for encryption and decryption is known as ………………. Cryptography
    • A. 

      Asymmetric key

    • B. 

      Private key

    • C. 

      Symmetric key

    • D. 

      All of these

  • 11. 
    Unauthorized access and viruses are issues dealing  with network …..
    • A. 

      Performance       

    • B. 

      Reliability

    • C. 

      Security

    • D. 

      None of these

  • 12. 
    The form of cryptography where pair of keys are used for encryption and decryption is known as ......
    • A. 

      Public key

    • B. 

      Private key

    • C. 

      Asymmetric key 

    • D. 

      Symmetric key

  • 13. 
    Digital signatures are used to ……                                   1. Encrypt and secure the document     2. Authenticate the identity of sender    3. Not repudiate later by the sender
    • A. 

      1 and 2

    • B. 

      1 and 3

    • C. 

      2 and 3

    • D. 

      All 1 to 3

  • 14. 
    DES  encrypts ……………… bit clear text blocks under the control of ………….. bit keys
    • A. 

      64 ; 56

    • B. 

      64 ; 48

    • C. 

      48 ; 32

    • D. 

      32 ; 32

  • 15. 
    In DES algorithm, 56 bit key can be obtained by
    • A. 

      Using 56 bit key

    • B. 

      Discarding every 8th bit of 64 bit key

    • C. 

      Adding 8th bit of 56 bit key

    • D. 

      None

  • 16. 
    Identify the cryptography technique........
    • A. 

      Symmetric key cryptography

    • B. 

      Asymmetric key cryptography

  • 17. 
    What is the cipher text if the plain text message is “STAY AT HOME STAY SAFE” and the encryption algorithm used is simple columnar transposition technique with the key as VIRUS
    • A. 

      THTFAOAEAESYMYSTSA

    • B. 

      STSATHTFAOAEYMYAES

    • C. 

      THTFAOAESTSAAESYMY

    • D. 

      AOAESTSATHTFYMYAES

  • 18. 
    What is the cipher text if the plain text message is “HOW ARE YOU” and the encryption algorithm used is Vernam cipher (one time pad) technique with one time pad NCBTTZQARX   [  Consider  A=0 ]
    • A. 

      VRZURVZGS

    • B. 

      UQXTQUYFR

    • C. 

      TPWSPTXEQ

    • D. 

      WSZVSWAHT

  • 19. 
    Select the proper attributes of Firewall ___
    • A. 

      All the traffic should pass through the firewall

    • B. 

      The firewall should allow only authorized traffic

    • C. 

      The firewall itself can stop attacks

    • D. 

      The firewall should detect viruses

  • 20. 
    Identify the configuration of firewall__
    • A. 

      Screened subnet firewall

    • B. 

      Screened Host Firewall, Dual-Homed Bastion

    • C. 

      Screened Host Firewall, Single-Homed Bastion

    • D. 

      None

  • 21. 
    A packet filter firewall filters at __________
    • A. 

      Physical layer

    • B. 

      Data link layer

    • C. 

      Network layer or Transport layer

    • D. 

      Application layer

  • 22. 
    A system that performs attack recognition and alerting for a network is what?
    • A. 

      HIDS         

    • B. 

      NIDS

    • C. 

      Anomaly detection HIDS

    • D. 

      Signature-based NIDS

  • 23. 
    What are the characteristics of Host based IDS?
    • A. 

      The host operating system logs in the audit information

    • B. 

      Logs includes logins, file opens and program executions

    • C. 

      Logs are analyzed to detect tails of intrusion

    • D. 

      All of the mentioned

  • 24. 
    What are the drawbacks of the host based IDS?
    • A. 

      Unselective logging of messages may increase the audit burdens

    • B. 

      Selective logging runs the risk of missed attacks

    • C. 

      They are very fast to detect

    • D. 

      They have to be programmed for new patterns

  • 25. 
    What are characteristics of Network based IDS?
    • A. 

      They look for attack signatures in network traffic

    • B. 

      Filter decides which traffic will not be discarded or passed

    • C. 

      It is programmed to interpret a certain series of packet

    • D. 

      It models the normal usage of network as a noise characterization

Back to Top Back to top