Security

64 Questions | Attempts: 202
Share

SettingsSettingsSettings
Security - Quiz

.


Questions and Answers
  • 1. 

    Which of these are threats against to modern computers?

    • A.

      Network attacks, firewall and worms

    • B.

      Viruses, worms and encryption

    • C.

      Network attacks, viruses and worms

    • D.

      Viruses, network encryptions and worms

    Correct Answer
    C. Network attacks, viruses and worms
  • 2. 

    How the industry solves the threats (network attacks, viruses and etc.)?

    • A.

      Firewall, IDS, Kerberos, blogs

    • B.

      IDS, firewall, authentication, policies

    • C.

      Virus, worms, attacks, web-sites

    • D.

      Network attacks, IDS, worms, virus

    Correct Answer
    B. IDS, firewall, authentication, policies
  • 3. 

    How many types of threats?

    • A.

      5

    • B.

      4

    • C.

      3

    • D.

      2

    • E.

      6

    Correct Answer
    B. 4
  • 4. 

    Interception is …

    • A.

      Unauthorized access

    • B.

      Asset lost, unusable, unavailable

    • C.

      Unauthorized change, tamper of data

    • D.

      Unauthorized add data to a database

    Correct Answer
    A. Unauthorized access
  • 5. 

    Interruption is ….

    • A.

      Unauthorized access

    • B.

      Asset lost, unusable, unavailable

    • C.

      Unauthorized change, tamper of data

    • D.

      Unauthorized add data to a database

    Correct Answer
    B. Asset lost, unusable, unavailable
  • 6. 

    Modification is ….

    • A.

      Unauthorized access

    • B.

      Asset lost, unusable, unavailable

    • C.

      Unauthorized change, tamper of data

    • D.

      Unauthorized add data to a database

    Correct Answer
    C. Unauthorized change, tamper of data
  • 7. 

    Which are the examples of DEFENCE?

    • A.

      Firewall, router access control list, spam filters, virus scanners

    • B.

      Employee communication, policy on company Intranet

    • C.

      Audit logs, intrusion detection system, network traffic monitoring

    • D.

      Network attacks, IDS, worms, virus

    Correct Answer
    A. Firewall, router access control list, spam filters, virus scanners
  • 8. 

    Which are the examples of DETERRENCE?

    • A.

      Firewall, router access control list, spam filters, virus scanners

    • B.

      Employee communication, policy on company Intranet

    • C.

      Audit logs, intrusion detection system, network traffic monitoring

    • D.

      Network attacks, IDS, worms, virus

    Correct Answer
    B. Employee communication, policy on company Intranet
  • 9. 

    Which are the examples of DETECTION?

    • A.

      Firewall, router access control list, spam filters, virus scanners

    • B.

      Employee communication, policy on company Intranet

    • C.

      Audit logs, intrusion detection system, network traffic monitoring

    • D.

      Network attacks, IDS, worms, virus

    Correct Answer
    C. Audit logs, intrusion detection system, network traffic monitoring
  • 10. 

    What is the encryption?

    • A.

      Is the process of encoding a message so that its meaning is not obvious

    • B.

      Is the reverse process, transforming an encrypted message back into its normal, original form

    • C.

      Is the process of preventing any attacks from the hackers

    Correct Answer
    A. Is the process of encoding a message so that its meaning is not obvious
  • 11. 

    In password protection, this is a random string of data or number used to modify a password hash

    • A.

      SSL

    • B.

      Nonce

    • C.

      One time password

    • D.

      Secret key

    Correct Answer
    B. Nonce
  • 12. 

    Using public key cryptography, suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should

    • A.

      Encrypt the message with his private key, encrypt the result with Alice’s public key, and then send Alice the message.

    • B.

      Encrypt the message with his private key, encrypt the result with Alice’s private key, and then send Alice the message.

    • C.

      Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message.

    Correct Answer
    A. Encrypt the message with his private key, encrypt the result with Alice’s public key, and then send Alice the message.
  • 13. 

    Which statement correctly describes the difference between a secure cipher and a secure hash?

    • A.

      A hash can be reversed, a cipher cannot

    • B.

      A hash produces a variable output for any input size, a cipher does not

    • C.

      A cipher can be reversed, a hash cannot

    Correct Answer
    C. A cipher can be reversed, a hash cannot
  • 14. 

    This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.

    • A.

      Decryption

    • B.

      Cryptanalysis

    • C.

      Cryptography

    • D.

      Brute force cracking

    Correct Answer
    D. Brute force cracking
  • 15. 

    Making sure that the data has not been changed unintentionally, due to an accident or malice is:

    • A.

      Auditability

    • B.

      Availability

    • C.

      Integrity

    • D.

      Confidentiality

    Correct Answer
    C. Integrity
  • 16. 

    Which of the following appears when an asset of the system becomes lost, unavailable, or unusable?

    • A.

      Interception

    • B.

      Interruption

    • C.

      Interpretation

    • D.

      Modification

    Correct Answer
    B. Interruption
  • 17. 

    Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with

    • A.

      The CA’s private key

    • B.

      Bob’s public key

    • C.

      The CA’s public key

    • D.

      Bob’s private key

    Correct Answer
    A. The CA’s private key
  • 18. 

    A well designed and configured _________ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building

    • A.

      Network Adapter

    • B.

      Antivirus Software

    • C.

      Intrusion Detection System

    • D.

      Firewall

    Correct Answer
    D. Firewall
  • 19. 

    What is the abbreviation “MOM” stands for?

    • A.

      Method, Opportunity, Motive

    • B.

      Method, Operation, Model

    • C.

      Mother

    • D.

      Market, Option, Motivation

    Correct Answer
    A. Method, Opportunity, Motive
  • 20. 

    What is CIA in computer-related security system?

    • A.

      Confidentiality, Integrity, Availability

    • B.

      Central Intelligence Agency

    • C.

      Culinary Institute of America

    • D.

      Certified Internal Auditor

    Correct Answer
    A. Confidentiality, Integrity, Availability
  • 21. 

    Block cipher maps each plaintext block to

    • A.

      Different-length ciphertext block

    • B.

      Same-length ciphertext block

    • C.

      The same letter

    • D.

      No answer

    Correct Answer
    B. Same-length ciphertext block
  • 22. 

    What is vulnerability?

    • A.

      A weakness in the security system

    • B.

      A method which uses flaws to have more access, privileges, or resources to the system

    • C.

      A method which used to eliminate or reduce threats

    • D.

      A kind of authentication to the system

    Correct Answer
    A. A weakness in the security system
  • 23. 

    A(n) __________ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through

    • A.

      Antivirus

    • B.

      Intrusion Detection System (IDS)

    • C.

      Personal Firewall

    • D.

      Network Monitor

    Correct Answer
    C. Personal Firewall
  • 24. 

    What is assumed by cipher in cryptography?

    • A.

      Algorithm for performing encryption and decryption

    • B.

      Encrypted message

    • C.

      None of the mentioned

    • D.

      Raw message

    Correct Answer
    A. Algorithm for performing encryption and decryption
  • 25. 

    What is assumed by cyphertext in cryptography?

    • A.

      Algorithm for performing encryption and decryption

    • B.

      Encrypted message

    • C.

      None of the mentioned

    • D.

      All of the mentioned

    Correct Answer
    B. Encrypted message
  • 26. 

    What is assumed by plaintext in cryptography?

    • A.

      Algorithm for performing encryption and decryption

    • B.

      Encrypted message

    • C.

      Raw message

    • D.

      None of the mentioned

    Correct Answer
    C. Raw message
  • 27. 

    In cryptography, what is key?

    • A.

      Info used to cipher, known only sender and receiver

    • B.

      Algorithm for transforming plaintext to ciphertext

    • C.

      Encrypted message

    • D.

      Recovering plaintext from ciphertext

    Correct Answer
    A. Info used to cipher, known only sender and receiver
  • 28. 

    What is cryptoanalysis?

    • A.

      Study of principles/methods of deciphering ciphertext without knowing key

    • B.

      Info used to cipher, known only sender and receiver

    • C.

      Algorithm for transforming plaintext to ciphertext

    • D.

      Recovering plaintext from ciphertext

    Correct Answer
    A. Study of principles/methods of deciphering ciphertext without knowing key
  • 29. 

    In asymmetric key cryptography, the private key for decryption is kept by

    • A.

      Sender

    • B.

      Receiver

    • C.

      Sender and receiver

    • D.

      Everyone in the network

    • E.

      All the connected devices to the network

    Correct Answer
    B. Receiver
  • 30. 

    In asymmetric key cryptography, the public key is kept by

    • A.

      Sender

    • B.

      Receiver

    • C.

      Sender and receiver

    • D.

      Everyone in the network

    • E.

      All the connected devices to the network

    Correct Answer
    D. Everyone in the network
  • 31. 

    Which one of the following algorithm is not used in asymmetric-key cryptography?

    • A.

      RSA algorithm

    • B.

      Diffie-Hellman algorithm

    • C.

      DES algorithm

    • D.

      DSA algorithm

    Correct Answer
    C. DES algorithm
  • 32. 

    In cryptography, the order of the letters in a message is rearranged by

    • A.

      Transpositional ciphers

    • B.

      Substation cipher

    • C.

      All kinds of cipher

    • D.

      None of the mentioned

    Correct Answer
    A. Transpositional ciphers
  • 33. 

    What is data encryption standard (DES)?

    • A.

      Block cipher

    • B.

      Stream cipher

    • C.

      Bit cipher

    • D.

      None of the mentioned

    Correct Answer
    A. Block cipher
  • 34. 

    Cryptanalysis is used

    • A.

      To increase the speed

    • B.

      To find some insecurity in a cryptographic scheme

    • C.

      To encrypt the data

    • D.

      None of the mentioned

    Correct Answer
    B. To find some insecurity in a cryptographic scheme
  • 35. 

    Cryptographic hash function takes an arbitrary block of data and returns

    • A.

      Fixed size bit string

    • B.

      Variable size bit string

    • C.

      None of the mentioned

    • D.

      Both of the mentioned

    Correct Answer
    A. Fixed size bit string
  • 36. 

    A substitution cipher substitutes one symbol with

    • A.

      Keys

    • B.

      Others

    • C.

      Multi Parties

    • D.

      Single Party

    Correct Answer
    B. Others
  • 37. 

    An asymmetric-key (or public-key) cipher uses

    • A.

      1 key

    • B.

      2 key

    • C.

      3 key

    • D.

      4 key

    Correct Answer
    B. 2 key
  • 38. 

    Show incorrect kind of threats

    • A.

      Interception

    • B.

      Interruption

    • C.

      Interpretation

    • D.

      Modification

    Correct Answer
    C. Interpretation
  • 39. 

    Which of the following describes the challenge-response

    • A.

      A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)

    • B.

      A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)

    • C.

      A special hardware device that is used to generate random text in a cryptography system

    • D.

      The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.

    Correct Answer
    A. A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
  • 40. 

    Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?

    • A.

      6

    • B.

      8

    • C.

      9

    • D.

      16

    Correct Answer
    A. 6
  • 41. 

    Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should

    • A.

      Encrypt the message with Alice’s public key and send Alice the message

    • B.

      Encrypt the message with Alice’s private key and send the encrypted message to Alice

    • C.

      Encrypt the message with his public key and send Alice the message

    • D.

      Encrypt the message with his private key and send the encrypted message to Alice

    Correct Answer
    A. Encrypt the message with Alice’s public key and send Alice the message
  • 42. 

    Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature

    • A.

      Bob applies a hash function to m and then encrypts the result with his public key

    • B.

      Bob applies a hash function to m and then encrypts the result with his private key

    • C.

      Bob applies a hash function to m and then encrypts the result with Alice’s public key

    • D.

      Bob encrypts m with his private key and then applies a hash function to the result

    Correct Answer
    B. Bob applies a hash function to m and then encrypts the result with his private key
  • 43. 

    Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice

    • A.

      Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m

    • B.

      Applies a de-hashing function to the digital signature and compare the result to m

    • C.

      No correct answer

    • D.

      Applies Bob's public key to the digital signature, applies the hash function to m, and compares the results of the two operations

    Correct Answer
    D. Applies Bob's public key to the digital signature, applies the hash function to m, and compares the results of the two operations
  • 44. 

    A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.

    • A.

      Network Adapter

    • B.

      Antivirus Software

    • C.

      Intrusion Detection System

    • D.

      Firewall

    Correct Answer
    D. Firewall
  • 45. 

    Which security action should be finished before access is given to the network?

    • A.

      Identification and authorization

    • B.

      Identification and authentication

    • C.

      Authentication and authorization

    • D.

      Authentication and password

    Correct Answer
    B. Identification and authentication
  • 46. 

    Which of the following types of encryption would BEST to use for a large amount of data?

    • A.

      Asymmetric

    • B.

      Symmetric

    • C.

      RSA

    • D.

      Hash

    Correct Answer
    B. Symmetric
  • 47. 

    This is the process of determining whether someone or something is, in fact, who or what it is declared to be.

    • A.

      Conditional access

    • B.

      Authentication

    • C.

      Identification

    • D.

      Anonymizer

    Correct Answer
    B. Authentication
  • 48. 

    In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack

    • A.

      Password

    • B.

      Two factor authentication

    • C.

      Security token

    • D.

      Authentication

    Correct Answer
    D. Authentication
  • 49. 

    Why would reusing a ticket as a replay attack is Kerberos not be successful?

    • A.

      The tickets are encrypted

    • B.

      The tickets are digitally signed

    • C.

      The tickets are used a token

    • D.

      The tickets are time stamped

    Correct Answer
    D. The tickets are time stamped
  • 50. 

    What is Man in the middle attack?

    • A.

      The attackers catch our employee in the middle of them and start applying physical pressure on them

    • B.

      The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras

    • C.

      The hacker jacks in a network and records all the information sent over the network

    Correct Answer
    C. The hacker jacks in a network and records all the information sent over the network

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 17, 2018
    Quiz Created by
    Batyr
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.