
- •10. What is Encryption algorithm?
- •35. Which of these is not considered as a symmetric-key algorithm?
- •36. Which of the following statement(s) is(are) properties of public-key encryption?
- •59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.
- •60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
- •61. What is Hacking?
- •62. What is Cracking?
- •63. What is Phreaking?
- •71. Which of the following statements is the definition of ip Spoofing – Source Routing?
- •72. Which of the following statements is the definition of e-mail Spoofing?
- •73. Which of the following statements is the definition of Session Hijackig?
- •82. One of the most famous documented dDoS attacks Back. How does the Back work?
- •83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
- •84. One of the most famous documented dDoS attacks Land. How does the Land work?
- •85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
- •87. In Magic Square cipher what will be the value of magic constant or magic sum m if the key is 17? 2465
- •89. What is Data integrity?
59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.
A. Trojan Horse
B. Logical Bomb
C. Trapdoor one-way function
D. Virus
E. Worm
60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
A. Symmetric encryption
B. Asymmetric encryption
C. One key encryption
D. Same key encryption
E. Private key encryption
61. What is Hacking?
A. Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use for malicious, unwanted purposes.
B. Hacking is basically hacking with a telephone. Using different “boxes” and “tricks” to manipulate the phone companies and their phones, you gain many things.
C. A cryptographic technique that seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible.
D. A decoy system designed to lure a potential attacker away from critical systems. A form of intrusion detection.
E. An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.
62. What is Cracking?
A. Cracking is almost the same as hacking.
B. A cracker destroys the information that they get into.
C. Cracking get into people servers and accounts illegally.
D. A cracker destroys the software that they get into.
E. All of the statements
63. What is Phreaking?
A. Phreaking refers to an array of activities which are done to intrude some one else’s personal information space so as to use for malicious, unwanted purposes.
B. Phreaking is basically hacking with a telephone. Using different “boxes” and “tricks” to manipulate the phone companies and their phones, you gain many things.
C. A cryptographic technique that seeks to make the relationship between the statistics of the ciphertext and the value of the encryption key as complex as possible.
D. A decoy system designed to lure a potential attacker away from critical systems. A form of intrusion detection.
E. An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.
64. A ____________ is someone who breaks into the telephone network illegally manipulating various audio frequencies associated with the tones, typically to make free long-distance phone calls.
A. Phreak
B. Hacker
C. Cracker
D. Intruder
E. Kerberos
65. How can we protect the system?
A. Never patch security hole
B. Encrypt important data
C. Include unused setujd/setgid programs
D. Setup firewall
E. Setup IDS
66. What should do after hacked?
A. Shutdown the system
B. Separate the system from network
C. Restore the system with the backup
D. Reinstall all programs
E. All of the statements
67. Which one of the following statements is not the mode of Hacker attack?
A. Locally
B. Offline
C. Theft
D. Deception
E. None of the statements
68. _____________ - an attacker alters his identity so that someone thinks he is someone else
A. Spoofing
B. DDos Attack
C. Permutation scanning
D. Central source propagation
E. Threat modelling
69. Which of the following statements are types of Spoofing?
A. IP Spoofing
B. Email Spoofing
C. Web Spoofing
D. Application Spoofing
E. DDos Spoofing
70. Which of the following statements is the definition of IP Spoofing – Flying-Blind Attack?
A. Attacker uses IP address of another computer to acquire information or gain access.
B. Attacker spoofs the IP address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies.
C. Attacker sends messages masquerading as someone else.
D. Web Site maintains authentication so that the user does not have to authenticate repeatedly
E. Process of taking over an existing active session.