#2 Information security and data protection

Beschreibung

- at Quiz am #2 Information security and data protection, erstellt von хомяк убийца am 13/05/2018.
хомяк убийца
Quiz von хомяк убийца, aktualisiert more than 1 year ago
хомяк убийца
Erstellt von хомяк убийца vor fast 6 Jahre
942
21

Zusammenfassung der Ressource

Frage 1

Frage
This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Antworten
  • Conditional access
  • Authentication
  • Identification
  • Anonymizer
  • Authorization

Frage 2

Frage
In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack
Antworten
  • Password
  • Two factor authentication
  • Security token
  • Authentication

Frage 3

Frage
Why would reusing a ticket as a replay attack is Kerberos not be successful?
Antworten
  • The tickets are encrypted
  • The tickets are digitally signed
  • The tickets are used a token
  • The tickets are time stamped

Frage 4

Frage
What is Man in the middle attack?
Antworten
  • The attackers catch our employee in the middle of them and start applying physical pressure on them
  • The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras
  • The hacker jacks in a network and records all the information sent over the network

Frage 5

Frage
What is encryption strength is based on? Please select the best answer
Antworten
  • The strength of the algorithm, the length of the key, and the secrecy of the key
  • The length of the key, the type of algorithm, and the strength of the key
  • The privacy of the key, the length of the algorithm, and the strength of the key
  • The strength of the key, the length of the algorithm, and the privacy of the key

Frage 6

Frage
One form of ‘something you have’ is the _____ and USB tokens
Antworten
  • Fingerprint
  • Tokens
  • Identification
  • Password
  • Digital signatures

Frage 7

Frage
The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as (Please select the best answer)
Antworten
  • Password authentication
  • Physical authentication
  • Fingerprint authentication
  • Biometric authentication

Frage 8

Frage
What is a good way to make users in a network safer in the internet
Antworten
  • Get a slow connection so they cannot download too much
  • Deny all internet access
  • All of the above
  • None of the above
  • Set up a filtering proxy server so you can check all the incoming traffic

Frage 9

Frage
When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a
Antworten
  • It is known as the Man in the middle attack
  • It is known as the TCP/IP spoofing attack
  • It is known as the Back door attack
  • It is known as the Replay attack

Frage 10

Frage
In which of the following attack does the attacker capture a portion of the communication between two parties, modifies it, and inserts
Antworten
  • Man-in-the-middle attack
  • Spoofing
  • Sniffing
  • Denial-of-service

Frage 11

Frage
A password represents
Antworten
  • Something you have
  • None of the above
  • Something you are
  • Something you know
  • All of the above

Frage 12

Frage
List the main aspects of information security: I. Confidentiality II. Integrity III. Availability IV. Consistency
Antworten
  • I-III-IV
  • I-III
  • I-II-III
  • I only
  • II-III-IV

Frage 13

Frage
Which of the following describes the challenge-response
Antworten
  • A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
  • A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)
  • A special hardware device that is used to generate random text in a cryptography system
  • The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.

Frage 14

Frage
Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?
Antworten
  • 6
  • 8
  • 9
  • 16

Frage 15

Frage
Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should
Antworten
  • Encrypt the message with Alice’s public key and send Alice the message
  • Encrypt the message with Alice’s private key and send the encrypted message to Alice
  • Encrypt the message with his public key and send Alice the message
  • Encrypt the message with his private key and send the encrypted message to Alice

Frage 16

Frage
Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature
Antworten
  • Bob applies a hash function to m and then encrypts the result with his private key
  • Bob applies a hash function to m and then encrypts the result with his public key
  • Bob applies a hash function to m and then encrypts the result with Alice’s public key
  • Bob encrypts m with his private key and then applies a hash function to the result

Frage 17

Frage
Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Antworten
  • Applies Bob's public key to the digital signature, applies the has function to m, and compares the results of the two operations;
  • Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m;
  • Applies a de-hashing function to the digital signature and compare the result to m;
  • No correct answer;

Frage 18

Frage
Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with
Antworten
  • The CA's private key
  • Bob’s public key
  • The CA's public key
  • Bob’s private key

Frage 19

Frage
A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.
Antworten
  • Network Adapter
  • Antivirus Software
  • Intrusion Detection System
  • Firewall

Frage 20

Frage
Which security action should be finished before access is given to the network?
Antworten
  • Identification and authorization
  • Identification and authentication
  • Authentication and authorization
  • Authentication and password

Frage 21

Frage
Which of the following types of encryption would BEST to use for a large amount of data?
Antworten
  • Asymmetric
  • Symmetric
  • RSA
  • Hash

Frage 22

Frage
Which statement correctly describes the difference between a secure cipher and a secure hash?
Antworten
  • A hash produces a variable output for any input size; a cipher does not.
  • A cipher can be reversed; a hash cannot.
  • A cipher produces the same size output for any input size; a hash does not.

Frage 23

Frage
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
Antworten
  • Decryption
  • Cryptanalysis
  • Cryptography
  • Brute force cracking

Frage 24

Frage
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Antworten
  • Auditability
  • Availability
  • Integrity
  • Confidentiality

Frage 25

Frage
Which of the following appears when an asset of the system become lost, unavailable or unusable?
Antworten
  • Interception
  • Interruption
  • Interpretation
  • Modification
  • Fabrication

Frage 26

Frage
Show incorrect kind of threats
Antworten
  • Interception
  • Interruption
  • Interpretation
  • Modification
  • Fabrication

Frage 27

Frage
Bock cipher maps each plaintext block to :
Antworten
  • Same length cipher text block
  • Different length cipher text block
  • The same letter
  • No answer

Frage 28

Frage
What is vulnerability?
Antworten
  • A weakness in the security system
  • A Method which uses flaws to have more access, privileges or resources to the system
  • A method which used to eliminate or reduce threats
  • A kind of auth to system

Frage 29

Frage
A(n) _____ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through
Antworten
  • Antivirus
  • Intrusion Detection System (IDS)
  • Personal Firewall
  • Network Monitor

Frage 30

Frage
What is assumed by cipher in cryptography ?
Antworten
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Frage 31

Frage
What is assumed by ciphertext in cryptography?
Antworten
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Frage 32

Frage
What is assumed by plaintext in cryptography?
Antworten
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Frage 33

Frage
In cryptography, what is key?
Antworten
  • Info used to cipher, known only to sender and receiver
  • Algorithm for transforming plaintext to ciphertext
  • Encrypted message
  • Recovering plaintext from ciphertext
  • Converting plaintext to ciphertext

Frage 34

Frage
What is cryptoanalysis?
Antworten
  • Study of principles/methods deciphering ciphertext without knowing key
  • Info used to cipher, known only to sender and receiver
  • Algorithm for transforming plaintext to ciphertext
  • Recovering plaintext from ciphertext
  • Converting plaintext to ciphertext

Frage 35

Frage
In asymmetric key cryptography, the public key for decryption is kept by:
Antworten
  • Sender
  • Receiver
  • Sender and receiver
  • Everyone in the network
  • All the connected devices to the network

Frage 36

Frage
Which of these are threats against to modern computer?
Antworten
  • Network attacks, firewall and worms
  • Viruses, worms and encryption
  • Network attacks, viruses and worms
  • Viruses, network encryptions and worms

Frage 37

Frage
How the industry solves the threats ?
Antworten
  • Firewall, IDS, Kerberos, blogs
  • IDS, firewall, authentication, policies
  • Virus, worms, attacks, web-sites
  • Network attacks, IDS, worms, virus

Frage 38

Frage
Which one of the following algorithm is not used in asymmetric key cryptography?
Antworten
  • RSA algorithm
  • Diffle-Hellman algorithm
  • DES algorithm
  • DSA algorithm

Frage 39

Frage
In cryptography, the order of the order of the letters in a message in rearranged by
Antworten
  • Transpositionalcip ciphers
  • substitution ciphers
  • All kinds of the ciphers
  • None of the mentioned

Frage 40

Frage
What is data encryption standard (DES)?
Antworten
  • Block cipher
  • stream cipher
  • bit cipher
  • none of the mentioned

Frage 41

Frage
Cryptanalysis is used:
Antworten
  • To find some insecurity in cryptographic scheme
  • to increase the speed
  • to encrypt the data
  • none of the mentioned

Frage 42

Frage
Cryptographic hash function takes an arbitrary block of data and returns
Antworten
  • Fixed site bit string
  • variable size bit string
  • none of the mentioned
  • both of the mentioned

Frage 43

Frage
A substitution cipher substitutions one symbol with
Antworten
  • Keys
  • Others
  • Multi Parties
  • Single Party

Frage 44

Frage
An asymmetric-key(or public key ) cipher uses
Antworten
  • 1 key
  • 2 key
  • 3 key
  • 4 key

Frage 45

Frage
In the computer industry the “What you have” method is use of?
Antworten
  • Passwords
  • Smart cards
  • Digital certificates’

Frage 46

Frage
A smartcard represents
Antworten
  • None of the above
  • Something you are
  • All of the above
  • Something you have
  • Something you know

Frage 47

Frage
Convert one symbol of plaintext immediately into a symbol of cipher text (example:Caesar cipher)
Antworten
  • Encryption
  • Plaintext
  • Block cipher
  • stream ciphers

Frage 48

Frage
Interruption is
Antworten
  • Asset lost, unusable, unavailable
  • Unauthorized access
  • Unauthorized change, tamper of data
  • Ex. Unauthorized add data to a DB

Frage 49

Frage
Modification is
Antworten
  • Unauthorized change, tamper of data
  • Asset lost, unusable, unavailable
  • Unauthorized access
  • Ex. Unauthorized add data to a DB

Frage 50

Frage
Which are the examples of DEFENCE?
Antworten
  • Firewalls, router access control list, spam filters, virus scanners
  • Employee communication, policy on company Intranet
  • Audit logs, intrusion detection system, network traffic monitoring
  • Network attacks, IDS, worms, virus

Frage 51

Frage
Which are the examples of DETERRENCE?
Antworten
  • Employee communication, policy on company Intranet
  • Firewalls, router access control list, spam filters, virus scanners
  • Audit logs, intrusion detection system, network traffic monitoring
  • Network attacks, IDS, worms, virus

Frage 52

Frage
Which are the examples of DETECTION?
Antworten
  • Audit logs, intrusion detection system, network traffic monitoring
  • Employee communication, policy on company Intranet
  • Firewalls, router access control list, spam filters, virus scanners
  • Network attacks, IDS, worms, virus

Frage 53

Frage
What is encryption?
Antworten
  • Is the process of encoding a message so that its meaning is not obvious
  • Is the reverse process, transforming an encrypted message back into its normal, original form
  • Is the process of preventing any attacks from the hackers

Frage 54

Frage
In password protection, this is a random string of data or number used to modify a password hash
Antworten
  • Nonce
  • Ssl
  • One time password
  • Secret key
  • Public key

Frage 55

Frage
Using public key cryptography suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should:
Antworten
  • Encrypt the message with his private key, encrypt the result with Ailce’s public key and then send Alice the message
  • • Encrypt the message with his private key , encrypt yhe result with alices’ private key, and then send Alicce the message
  • • Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message

Frage 56

Frage
Which statement correctly describes the difference between a secure cipher and a secure hash?
Antworten
  • Cipher can be reversed, hash cannot
  • A hash can be reversed, a cipher cannot
  • A hash production a variable output fot any input size, a cipher does not
  • A cipher produces the same size output for any input size, a hash does not

Frage 57

Frage
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies
Antworten
  • • Brute force cracking
  • • Decryption
  • • Cryptoanalysis
  • • Cryptography

Frage 58

Frage
A well designed and configured _____ is like having single point of entry into your building with a security guard at the door allowing only authorized personnel into the building
Antworten
  • Firewall
  • Network adapter
  • Antivirus software
  • Intrusion detection system

Frage 59

Frage
Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with
Antworten
  • The CA’s private key
  • Bobs public key
  • The CAs public key
  • Bobs private key

Frage 60

Frage
Suppose Alice receives from Bob a message m with digital signature for one message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Antworten
  • Applies Bob’s public key to the digital signature applies to the hash function to m, and compares the results of the two operations.
  • Applies bobs public key to the digital signature, then a de-hashing function to the result. She then compares the result of this operation with the message m
  • Applies a de-hashing function to the digital signature and compares the result m
  • No correct answer
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Tricky words: Set one
barrie edmonds
Present continuos tense
anama_gordillo
DELIVERING AT PACE
Natalie West
UNIT 1
missbotch
Untitled
atanuroy505
ANTT
Gaffer Ji
Phrasel Verb (Prepositions IN, ON, UP and AT)
Dmitriy Lagutin
Phrasel Verb (Prepositions IN, ON, UP and AT)
Петр Казаков
ANTT
Gaffer Ji
Preposition
jizaco0508