- •10. What is Encryption algorithm?
- •35. Which of these is not considered as a symmetric-key algorithm?
- •36. Which of the following statement(s) is(are) properties of public-key encryption?
- •59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.
- •60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
- •61. What is Hacking?
- •62. What is Cracking?
- •63. What is Phreaking?
- •71. Which of the following statements is the definition of ip Spoofing – Source Routing?
- •72. Which of the following statements is the definition of e-mail Spoofing?
- •73. Which of the following statements is the definition of Session Hijackig?
- •82. One of the most famous documented dDoS attacks Back. How does the Back work?
- •83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
- •84. One of the most famous documented dDoS attacks Land. How does the Land work?
- •85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
- •87. In Magic Square cipher what will be the value of magic constant or magic sum m if the key is 17? 2465
- •89. What is Data integrity?
- •142. ______________ Firewall treats each network frame (Packet) in isolation.
- •143. How many keys are required for two people to communicate via a cipher?
- •144. ________________ - A software application which normally filters traffic entering or leaving a single computer.
- •144. A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
- •145. Which of the following are weaknesses of Packet Filtering Firewall? (Choose 3 answers)
- •146. Which of the following statements is not true?
- •147. One of the most famous documented dDoS attack is the sshProcessTable. How does the sshProcessTablework?
- •148. Which of the following are weaknesses of Stateful Packet Inspection Firewall?(Choose 2 answers)
- •149. One of the most famous documented dDoS attack is the Mailbomb. How does the Mailbomb work?
- •151. A subject or object's ability to use, manipulate, modify, or affect another subject or object.
- •152. Security mechanisms, policies or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.
- •190. Dursi zhauabin tabu kerek
151. A subject or object's ability to use, manipulate, modify, or affect another subject or object.
Выберите один ответ.
|
Access |
|
|
Asset |
|
|
Attack |
|
|
Hack |
|
|
None of the statements |
|
152. Security mechanisms, policies or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.
Выберите один ответ.
|
Threat Agent |
|
|
Security Model |
|
|
Control, Safeguard or Countermeasure |
|
|
Security Posture or Security Profile |
|
|
Vulnerability |
|
153. In an RSA system, the public key of a given user is e = 31, n = 3599. What is the φ( n )?
Ответ:
154.
Decrypt
the message CVKKT W'YVT using the Caesar Cipher with the key 73.
Ответ:
155. A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.
A. Security service
B. Security attack
C. All of the statements
D. Security mechanism
E. Security threat
156. Free from mistake or error and having the value that the end-user expects.
A. Accuracy
B. Authenticity
C. Confidentiality
D. Authentication
E.
157. One of the most famous documented DDoS attack is the SmurfAttack work?
Duris
158. Which cryptanalytic attack attempts to
find two values in the domain of a function that map to the same
value in its range?
A. Social Engineering attack
B. Brute – Force attack
C. Birthday attack
D. None of the statements
E. Dictionary attack
159. Encrypt the message I’M GLAD 2 U using the Caesar Cipher with the key 54.
160. Zhauabin tekseru kerek.
161. By forcing all network traffic to pass through the firewall, there is a greater chance that network will become congested. Which problem can cause in this situation?
A. Network Address Translation
B. All of the statements
C. Single point of failure
D. Anti-Spoofing
E. Traffic bottlenecks
162. For a 3-bit key, the largest possible number is:
A. 3
B. 7
C. 9
D. 8
E. 6
163. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.
A. Security service
B. Security mechanism
C. Security attack
D. All of the statements
E. Security threat
164. One of most famous documented DDoS attack is the SYN Flood. How does the SYN Flood work?
The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them.
165.
Which operation does Personal security do?
Выберите один ответ.
|
Protection of the individual or group of individuals who are authorized to access the organization and its operations. |
|
|
Protection of the details of a particular operation or series of activities. |
|
|
Protection of an organization's communications media, technology, and content. |
|
|
Protection of the physical items, objects, or areas of an organization from unauthorized access and misuse. |
|
|
Protection of networking components, connections, and contents. |
|
166.
Duris zhauabi: I men III
167. Duris
168. Duris zhauabi: Adaptive proxies
169. Duris zhauabi: II men III only
170. Duris
171. Duris zhauabi: Exposure
172. Duris
173. Duris zhauabi: I, II and III
174. Duris jauabi I, II and III
175.
176.
177.
Which of the following is(are) characteristic(s) of Tracking State? I. When a user logs on to a site a persistent authentication is maintained. II. This authentication can be stolen for masquerading as the user. III. Attacker writes his own web site address before the legitimate link.
Выберите один ответ.
|
I and III only |
|
|
I and II only |
|
|
I only |
|
|
II and III only |
|
|
I, I and III |
|
178.
One of the most famous documented DDoS attack is the SYN Flood. How does the SYN Flood work?
Выберите один ответ.
|
This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up. |
|
|
The victim is flooded with InternetControlMessageProtocol (ICMP) "echo-reply" packets. |
|
|
Attacker creates a packet that contains more than 65,536 bytes. |
|
|
The victim's mail queue is flooded by an abundance of messages, causing system failure. |
|
|
The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them. |
|
179.
Which type of firewall monitors TCP or UDP sessions?
Выберите один ответ.
|
Application Gateway/Proxies |
|
|
Circuit-level gateways |
|
|
Stateful packet |
|
|
None of the statements |
|
|
Packet filtering |
|
180.
Perform decryption using the Playfair Cipher where the message is "FCHLNSGD" and the key is "FINAL EXAM".
Ответ:
181.
Which of the following is characteristic of Cyberpunk?
Выберите один ответ.
|
The cyberpunk is someone who breaks into the telephone network illegally manipulating various audio frequencies associated with the tones, typically to make free long-distance phone calls. |
|
|
The cyberpunk can be considered a recent mutation that combines the characteristics of the hacker, cracker, and phreak. A very dangerous combination indeed. |
|
|
The cyberpunk destroys the information and software that they get into. |
|
|
None of the statements. |
|
|
The cyberpunk gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system. |
|
182.
Which of the following are strengths of Packet Filtering Firewall?(Choose 3 answers)
Выберите по крайней мере один ответ:
|
Packet filtering is typically faster than other packet screening methods. |
|
|
Packet filtering firewalls are typically less expensive. |
|
|
Defining rules and filters on a packet filtering firewall can be a complex task. |
|
|
Packet filtering firewalls can be implemented transparently. |
|
|
Packet filtering firewalls allow a direct connection to be made between the two endpoints. |
|
183.
A ____________ firewall is often called a network layer firewall because the filtering is primarily done at the network layer (layer three) or the transport layer (layer four) of the OSI reference model.
Выберите один ответ.
|
Packet Filtering |
|
|
Adaptive Proxies |
|
|
Circuit level |
|
|
Stateful Packet Inspection |
|
|
Application level |
|
184.
Using the RSA algorithm encrypt message M = 7 where p = 11, q = 13 and e = 11.
Ответ:
185.
Which operation does Network security do?
Выберите один ответ.
|
Protection of networking components, connections, and contents. |
|
|
Protection of an organization's communications media, technology, and content. |
|
|
Protection of the details of a particular operation or series of activities. |
|
|
Protection of the physical items, objects, or areas of an organization from unauthorized access and misuse. |
|
|
Protection of the individual or group of individuals who are authorized to access the organization and its operations. |
|
186.
_______________ firewall keeps track of the state of network connections (such as TCP streams) traveling across it.
Выберите один ответ.
|
Software |
|
|
Network |
|
|
Stateless |
|
|
Stateful |
|
|
Personal |
|
187.
Using the RSA algorithm find d where p = 11, q = 13, e = 11 and M = 7.
Ответ:
188. Duris
189. Duris
