- •10. What is Encryption algorithm?
- •35. Which of these is not considered as a symmetric-key algorithm?
- •36. Which of the following statement(s) is(are) properties of public-key encryption?
- •59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.
- •60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
- •61. What is Hacking?
- •62. What is Cracking?
- •63. What is Phreaking?
- •71. Which of the following statements is the definition of ip Spoofing – Source Routing?
- •72. Which of the following statements is the definition of e-mail Spoofing?
- •73. Which of the following statements is the definition of Session Hijackig?
- •82. One of the most famous documented dDoS attacks Back. How does the Back work?
- •83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
- •84. One of the most famous documented dDoS attacks Land. How does the Land work?
- •85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
- •87. In Magic Square cipher what will be the value of magic constant or magic sum m if the key is 17? 2465
- •89. What is Data integrity?
- •142. ______________ Firewall treats each network frame (Packet) in isolation.
- •143. How many keys are required for two people to communicate via a cipher?
- •144. ________________ - A software application which normally filters traffic entering or leaving a single computer.
- •144. A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
- •145. Which of the following are weaknesses of Packet Filtering Firewall? (Choose 3 answers)
- •146. Which of the following statements is not true?
- •147. One of the most famous documented dDoS attack is the sshProcessTable. How does the sshProcessTablework?
- •148. Which of the following are weaknesses of Stateful Packet Inspection Firewall?(Choose 2 answers)
- •149. One of the most famous documented dDoS attack is the Mailbomb. How does the Mailbomb work?
- •151. A subject or object's ability to use, manipulate, modify, or affect another subject or object.
- •152. Security mechanisms, policies or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.
- •190. Dursi zhauabin tabu kerek
87. In Magic Square cipher what will be the value of magic constant or magic sum m if the key is 17? 2465
88. Using Magic Square cipher decipher the message “..S....NS.....IE...O.S...” with the given key 5 and generated magic square .<br/> SESSION
89. What is Data integrity?
A. Ensuring information has not been altered by unauthorised or unknown means.
B. An authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
C. Secret undocumented entry point into a program, used to grant access without normal methods of access authentication.
D. Temporary encryption key used between two principals.
E. An identifier or number that is used only once.
90. The ___________ is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.
A. MD5 Message Digest Algorithm
B. Magic Square
C. Data Encryption Standard
D. Feistel Cipher
E. None of the statements
91. Program that consumes system resources by replicating itself.
A. Bacteria
B. Virus
C. Worm
D. Logical Bomb
E. Zombie
92. A symmetric encryption algorithm in which a block of plaintext bits (typically 64 or 128) is transformed as a whole into a ciphertext block of the same length.
A. Block cipher
B. Bit cipher
C. Byte cipher
D. Stream cipher
E. None of the statements
93. A sequence of eight bits. Also referred to as an octet. BYTE
94. The translation of encrypted text or data (called ciphertext) into original text or data (called plaintext). Also called deciphering. DECRYPTION
95. The key used in a symmetric encryption system. Both participants must share the same key, and this key must remain secret to protect the communication.
A. Secret key
B. Public key
C. Private key
D. Symmetric key
E. Asymmetric key
96. Encrypt the message WELCOME! using Caesar Cipher with the key = 5.<br/> BJQHTRJ!
97. Decipher the ciphertext QMHXIVQ using Caesar Cipher with the key=4.<br/> MIDTERM
98. If the encrypted message is XBPG and deciphered text is QUIZ using Caesar Cipher, what is the value of key? 7
99. What will be the value of key in Caser Cipher if initially key=65? 13
100. Encrypt the message WELCOME! using Caesar Cipher with the key = 34.<br/> EMTKWUM!
101. The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams
A. Playfair cipher
B. Hill cipher
C. Caesar Cipher
D. Feistel Cipher
E. RSA
102. Using this Playfair matrix <br/> <br/> encrypt the message: Cadogans TGTUERVF
103. Using this Playfair matrix <br/> <br/> decipher the message: UZTB MUST
104. The Vigenere cipher is which of the following types:
A. Polyaplhabetic
B. Monoalphabetic
C. Dialphabetic
D. Asymmetric
E. None of the statements
105. Use the Playfair cipher with the keyword "PLAYFAIR" to encrypt the message "GOTO”. OVNQ
106. Use the Playfair cipher with the keyword "PLAYFAIR" to decrypt the message "YPYQ”. AFAS
107. Decipher the message IAIWWT using the Hill cipher with the inverse key . <br/>Take the indices of letters according to the given table. ONALLY
108. Perform encryption using the RSA algorithm, if p = 3; q = 11, e = 7; M = 5. 14
109. Find d using the RSA algorithm, if p = 3; q = 11, e = 7; M = 5. 3
110. Perform decryption using the RSA algorithm, if p = 5; q = 11, e = 3; C = 14. 9
111. Find d using the RSA algorithm, if p = 5; q = 11, e = 3; M = 9. 27
112. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M? 5
113. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the value of d? 5
114. If a key is 8 bits long, how many possible numbers that the key can generate? 256
115. An attack on the key by attempting all possible combinations is called:
A. A brute force attack
B. An all combinations attack
C. A cryptographic key attack
D. A random key attack
E. A systematic seed attack
116. The word “asymmetric” in public-key cryptography means:
A. The algorithm to encrypt is the same with the algorithm to decrypt
B. The algorithm to encrypt is different from the algorithm to decrypt
C. The key to encrypt is the same with the key to decrypt
D. The key to encrypt is different from the key to decrypt
E. None of the listed answers
117. Which of the following statements is TRUE?
A. Public-key algorithms are used to encrypt the message
B. Public-key algorithms are slow compared to symmetric cryptography
C. Public-key algorithms are used to encrypt the key encryption key
D. Public key algorithms are used to hash the password
E. None of the listed answers
118. Which of the following statement is NOT TRUE?
A. A user will have his/her own public key
B. A user will have his/her own private key
C. A user does not have to protect his/her public key
D. A user must protect his/her public key
E. A user must remember his/her password that encrypts the public key
119. Which of the following statement is NOT TRUE?
A. The foundation of public-key algorithm is a one way function
B. The private key operates as a trap door that allows the owner to recover the original data
C. The public-key can be used to derive the private key
D. Reversing the process of encryption is virtually impossible without the private key
E. All of the listed answers are TRUE
120. Which of the following statement is NOT TRUE?
A. Asymmetric cryptography is also known as public key cryptography
B. Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys
C. The public key is kept secret while the private key may be widely distributed
D. The private key cannot be practically derived from the public key
E. The public key and private key are mathematically related
121. Which of the statement is TRUE?
A. The larger the key size, the greater the range of possible values a key can be.
B. The smaller the key size, the greater the range of possible values a key can be.
C. The larger the key size, the smaller the range of possible values a key can be.
D. The larger the key size, the range of possible values a key can be remains the same.
E. The smaller the key size, the range of possible values a key can be remains the same.
122. ____________ a two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers.
A. Bigram
B. Twogram
C. Pair
D. Digram
E. None of the statements
123. Consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security.
A. Demilitarized Zone
B. Network Address Translation
C. Anti-Spoofing
D. Virtual Private Network
E. Firewalls
124. Weaknesses of a system that could be accidentally or intentionally exploited to damage assets.
A. Vulnerabilities
B. Risk
C. Treats
D. Assets
E. DMZ
125. A secret data value, usually a character string, that is used as authentication information.
A. Key
B. Secret key
C. OPSEC
D. DMZ
E. Password
126. Which of these is possibly the worst password that user can choose?
A. k@zaKh
B. Nursultan1612
C. a$tana8567
D. aLm4tyc?TY
E. None of the statements
127. Base elements of information, such as numbers, letters, symbols, and so on, which are processed or carried out by human or computer (or by some machine).
A. Bits
B. Bytes
C. Information
D. Data
E. Context
128. According to DAD triad, ___________ attempts to defeat confidentiality.
A. Disclosure
B. Alteration
C. Destruction
D. Confidentiality
E. Availability
129. According to DAD triad, ___________ attempts to defeat integrity.
A. Disclosure
B. Alteration
C. Destruction
D. Confidentiality
E. Availability
130. According to DAD triad, ___________ attempts to defeat availability.
A. Disclosure
B. Alteration
C. Destruction
D. Confidentiality
E. Availability
131. Set of hacker tools used after attacker has broken into a computer system and gained root-level access.
A. Rootkits
B. Root-level hack
C. Zombie
D. Virus
E. Assets
132. Which of the following statement(s) is(are) the Security Principles?
A. Defence in depth
B. Least privilege
C. Separation of privileges
D. Security through obscurity (the inadvisability thereof)
E. All of the statements
133. Which of the following statements are types of Firewalls?
A. Packet-Filtering
B. Application-level gateways
C. Circuit-level gateways
D. Internet-level gateways
E. Session-level gateways
134. Provides a user with protection against discovery and misuse of his or her identity by other users.
A. Privacy
B. Protection
C. Misuse
D. Identification
E. All of the statements
135. Using Feistel Cipher some information was encrypted, as the ciphertext scrambled message with the length 4n bits was outputted. What is the bit length of initial plaintext? 4N
136. Which of the following cipher(s) is(are) example of block cipher?
A. Fesitel Cipher
B. Caesar Cipher
C. Vigenere Cipher
D. Playfair Cipher
E. All of the statements
137. A(n)___________ is one that encrypts a digital data stream one bit or one byte at a time.
A. Stream cipher
B. Block Cipher
C. Symmetric cipher
D. Asymmetric cipher
E. None of the statements
138. Free from mistake or error and having the value that the end-user expects.
A. Accuracy
B. Availability
C. Authentication
D. Authenticity
E. Confidentiality
139. The quality or state of being genuine or original, rather than a reproduction or fabrication.
A. Accuracy
B. Availability
C. Authentication
D. Authenticity
E. Confidentiality
140. The quality or state of having ownership or control of some object or item.
A. Possession
B. Utility
C. Integrity
D. Confidentiality
E. Authentication
141. Which operation does Communication security do?
Выберите один ответ.
|
Protection of the physical items, objects, or areas of an organization from unauthorized access and misuse. |
|
|
Protection of the details of a particular operation or series of activities. |
|
|
Protection of networking components, connections, and contents. |
|
|
Protection of the individual or group of individuals who are authorized to access the organization and its operations. |
|
|
Protection of an organization's communications media, technology, and content. |
|
