CS_InfSec

Beschreibung

Quiz am CS_InfSec, erstellt von Dina Kim am 26/03/2019.
Dina  Kim
Quiz von Dina Kim, aktualisiert more than 1 year ago
Dina  Kim
Erstellt von Dina Kim vor etwa 5 Jahre
152
5

Zusammenfassung der Ressource

Frage 1

Frage
Which of the following is not a fundamental security goal?
Antworten
  • assurance
  • confidentiality
  • all of the statements are correct
  • integrity
  • availability

Frage 2

Frage
A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
Antworten
  • Trojan Horse
  • Virus
  • Logic Bomb
  • OPSEC
  • Worm

Frage 3

Frage
A(n) ____ is one that encrypts a digital data stream one bit or one byte at a time
Antworten
  • stream cipher
  • symmetric cipher
  • none of the statements
  • asymmetric cipher
  • block cipher

Frage 4

Frage
A pair of keys that have been selected so that if one is used for encryption the other is used for decryption in public key cryptosystem
Antworten
  • public and private keys
  • public and cipher keys
  • encryption and decryption keys
  • none of the statements
  • plain and cipher keys

Frage 5

Frage
Free from mistake or error and having the value that the end-user expects
Antworten
  • Accuracy
  • Authenticity
  • Confidentiality
  • Availability
  • Authentication

Frage 6

Frage
Which of these is possibly the worst password that user can choose
Antworten
  • Nursulatan1612
  • k@zaKh
  • a$tana8567
  • aLm4tyc?TY
  • none of the statements

Frage 7

Frage
What is plaintext?
Antworten
  • the original intelligible message or data that is fed into the algorithm as input
  • the original intelligible message or data that is produced as output
  • none of the statements
  • the scrambled message produced as output
  • the scrambled message or data that is fed into the algorithm as output

Frage 8

Frage
Which of the following statement is not true?
Antworten
  • The public key is kept secret while the private key may be widely distributed
  • Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys
  • The public key and private key are mathematically related
  • The private key cannot be practically derived from the public
  • Asymmetric cryptography is also known as public key cryptography

Frage 9

Frage
A function that is easily computed and the calculation of its inverse is infeasible unless certain privileged information is known
Antworten
  • Trapdoor one-way function
  • Virus
  • Logical Bomb
  • Trojan Horse
  • Worm

Frage 10

Frage
What is encryption algorithm
Antworten
  • performs various substitutions and transformations on the plaintext
  • it takes the ciphertext and the secret key and produces the original plaintext
  • the scrambled message produced as output
  • performs various substitutions and transformations on the ciphertext
  • random stream of data and, as it stands, is unintelligible

Frage 11

Frage
Which of the statement is property for p and q
Antworten
  • p and q are prime
  • p is greater than q
  • p and q should be of similar bit length
  • p and q are distinct
  • p - q -1

Frage 12

Frage
DMZ what is one advantage of setting up a DMZ with two firewalls
Antworten
  • you can control where traffic goes in the three networks
  • you can do stateful packet filtering
  • you can do load balancing
  • improved network performance
  • all of the statements

Frage 13

Frage
Program that can replicate itself and send copies from computer to computer across network connections. usually performs some unwanted function
Antworten
  • worm
  • trojan house
  • virus
  • logical bomb
  • opsec

Frage 14

Frage
In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of p and q?
Antworten
  • p = 5, q = 7
  • p = 1, q = 35
  • p = q = e =5
  • p = 6, q = 8
  • p = q = n = 35

Frage 15

Frage
Encrypt the message WELCOME! Using Caesar cipher with the key = 34’ [blank_start]Answer[blank_end]
Antworten
  • emtkwum!

Frage 16

Frage
Which of the following is form of malware
Antworten
  • all of the statements are correct
  • rootkits
  • viruses
  • worms
  • scripts

Frage 17

Frage
Which of the following is not true?
Antworten
  • A user must protect his/her public key
  • A user does not have to protect his/her public key
  • A user will have his/her own public key
  • A user will have his/her own private key
  • A user must remember his/her password that encrypts the public key

Frage 18

Frage
Which of these statements is true
Antworten
  • In symmetric key cryptography the key that is used to encrypt data is the same key that is used to decrypt it
  • The encryption algorithm performs its steps using the key to alter the ciphertext and convert it to plaintext
  • The term "key" comes from the fact that the password you can choose works in the same way that a conventional key works
  • In cryptography, to protect the contents of your files, you can install a lock on your door
  • The decryption algorithm performs its steps using the key to alter the plaintext and convert it to ciphertext

Frage 19

Frage
The _________ is a number or a set of numbers on which the cipher operates
Antworten
  • key
  • plaintext
  • cipher
  • secret
  • ciphertext

Frage 20

Frage
embedded in a computer program that checks for a certain set of conditions to be present on the system. When these conditions are met, it executes some function resulting in unauthorized actions
Antworten
  • Logic bomb
  • Worm
  • OPSEC
  • Trojan House
  • Virus

Frage 21

Frage
The quality of state of having ownership or control of some object or item
Antworten
  • possession
  • confidentiality
  • integrity
  • utility
  • authentication

Frage 22

Frage
Which one of the statement is a formula to find plain in RSA
Antworten
  • M = c^d(mod n)
  • M = c^n(mod d)
  • M = c^e(mod n)
  • M = c^e(mod d)
  • M = c^n(mod e)

Frage 23

Frage
One objective of cryptography is property of being accessible and usable upon demand by an authorized entity
Antworten
  • availability
  • denial of service
  • confidentiality
  • reliability
  • authentication

Frage 24

Frage
The vigenere cipher is which of the following types
Antworten
  • polyalphabetic
  • monoalphabetic
  • none of the statements
  • asymmetric
  • diaplhabetic

Frage 25

Frage
The word asymmetric in public key cryptography means
Antworten
  • The key to encrypt is different to the key to decrypt
  • The algorithm to encrypt is different from the algorithm to decrypt
  • None of the listed answers
  • The key to encrypt is the same with the key to decrypt
  • The algorithm to encrypt is the same with the algorithm to decrypt

Frage 26

Frage
A _________ cipher replaces one character with another character.
Antworten
  • Substitution
  • Transposition
  • Reversing
  • Cultivation
  • Multiplication

Frage 27

Frage
Which one of the statement is a formula to find cipher in RSA
Antworten
  • C =m^e(mod n)
  • C =m^n(mod d)
  • C =m^d(mod n)
  • C =m^n(mod e)
  • C =m^e(mod d)

Frage 28

Frage
In the rsa key the public key of a given user is e=31, n=3599. What is the value of p and q
Antworten
  • P= 61, Q= 59
  • P= 1, Q= 3599
  • P= Q = N= 3599
  • P= Q= E = 31
  • P= 62, Q= 60

Frage 29

Frage
Find d using rsa algorithm, if p = 5, q= 11, e = 3; M = 9 [blank_start]Answer[blank_end]
Antworten
  • 27

Frage 30

Frage
In a public – key system using rsa you intercept the ciphertext C = 10 sent to a user whose public key is e = 5 ; n = 35 what is the fi(n)? [blank_start]Answer[blank_end]
Antworten
  • 24

Frage 31

Frage
Which of the following statement is properties of public key encryption
Antworten
  • the sender and receiver must each have one of the matched pair of keys(not the same one)
  • one algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption
  • one of the two keys must be kept secret
  • the sender and receiver must share the algorithm and the key
  • the same algorithm with the same key is used for encryption and decryption

Frage 32

Frage
If a wrong key is entered to decrypt a message what will happen
Antworten
  • The output will be gibberish
  • The output will not be visible
  • There is an error message
  • The cryptosystem will stop working
  • Nothing will happen

Frage 33

Frage
A ___ - level proxy inspects the entire packet and makes access decisions based on the contents of the packet
Antworten
  • Application
  • Physical
  • Server
  • Proxy
  • Circuit

Frage 34

Frage
One objective of cryptography is keeping information secret from all but those who are authorised to see it. The term referring to this is:
Antworten
  • Confidentiality
  • Secrecy
  • Witnessing
  • Authorisation
  • Anonymity

Frage 35

Frage
One of the keys used in an asymmetric encryption system. The public key is made public to be used in conjunction with a corresponding private key [blank_start]Answer[blank_end]
Antworten
  • public key

Frage 36

Frage
A program that secretly takes over another internet attached computer and then uses that computer to lunch attacks that are difficult to trace to the creator
Antworten
  • Zombie
  • Virus
  • Logical Bomb
  • OPSEC
  • Worm

Frage 37

Frage
According to DAD triad, _______ attempts to defeat availability
Antworten
  • Destruction
  • Availability
  • Disclosure
  • Alteration
  • Confidentiality

Frage 38

Frage
The process of verifying and identify claimed by or for a system entity
Antworten
  • Authentication
  • Timestamping
  • Confirmation
  • Processing
  • Validation

Frage 39

Frage
______ is a form of cryptosystem in which encryption and decryption are performed using two different keys one a public key and one a private key
Antworten
  • Asymmetric encryption
  • Symmetric encryption
  • Synchronous encryption
  • None of the statements
  • Asynchronous encryption

Frage 40

Frage
One objective of cryptography is conveyance, to another entity, of official sanction to do or be something. The term referring to this is:
Antworten
  • Authorisation
  • Entity authentication
  • Validation
  • Certificate
  • Confirmation

Frage 41

Frage
If the encrypted message is XBPG and deciphered text is QUIZ using the Caesar cipher, what is the value of key [blank_start]Answer[blank_end]
Antworten
  • 7

Frage 42

Frage
A pair of key that have been selected so that if one is used for encryption, the other is used for decryption in Public-key cryptosystem
Antworten
  • public and private keys
  • plain and cipher keys
  • none of the statements
  • public and cipher keys
  • encryption and decryption keys

Frage 43

Frage
Set of hacker tools after attacker has broken into a computer system and gained root-level access
Antworten
  • rootkits
  • root-level hack
  • assets
  • zombie
  • virus

Frage 44

Frage
Which of the following statement is ingredients for a public key encryption scheme
Antworten
  • all of the statements
  • encryption/decryption algorithm
  • plaintext
  • public/private keys
  • ciphertext

Frage 45

Frage
In a public-key system using RSA you intercept the ciphertext C = 10 sent to a user whose public key is e = 5; n = 35. What is the value of p and q?
Antworten
  • P=5; q=7
  • P=6; q=8
  • P=q=e=5
  • P=1; q=35
  • p = q= n = 35

Frage 46

Frage
which of the following statement is not true
Antworten
  • the public key can be used to derive the private key
  • the foundation of public-key algorithm is a one way function
  • all of the listed answers are true
  • the private key operates as a trap door that allows the owner to recover the original data
  • reversing the process of encryption is virtually impossible without the private key

Frage 47

Frage
Consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security
Antworten
  • virtual private network
  • demilitarized zone
  • anti-spoofing
  • firewalls
  • network address translation

Frage 48

Frage
you can use _________ to protect your computer from outsiders
Antworten
  • antivirus software and personal firewall programs
  • system restore and antivirus software
  • personal firewall programs and system restore
  • antivirus software and the Recycle Bin
  • firewall programs and the Recycle Bin

Frage 49

Frage
One objective of cryptography is ensuring information has not been altered by unauthorised or unknown means. The term referring to this is:
Antworten
  • data integrity
  • message authentication
  • confirmation
  • authorisation
  • validation

Frage 50

Frage
encrypt the message WELCOME! Using Caesar cipher with the key = 5 [blank_start]Answer[blank_end]
Antworten
  • BJQHTRJ!

Frage 51

Frage
A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption
Antworten
  • Symmetric encryption
  • One key encryption
  • Private key encryption
  • Asymmetric encryption
  • Same key encryption

Frage 52

Frage
In a public key system using RSA you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n =35. What will be the fi(n)? [blank_start]Answer[blank_end]
Antworten
  • 24

Frage 53

Frage
A secret data value usually a character string that’s used as authentication information
Antworten
  • password
  • secret key
  • key
  • OPSEC
  • DMZ

Frage 54

Frage
code embedded within a program that causes a copy of itself to be inserted in one of more other programs. Usually performs some unwanted function
Antworten
  • virus
  • zombie
  • all of the statements
  • worm
  • firewall

Frage 55

Frage
In public-key system using rsa, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M [blank_start]Answer[blank_end]
Antworten
  • 5

Frage 56

Frage
Secret undocumented entry point into a program, used to grant access without normal methods of access authentication
Antworten
  • Trapdoor
  • Virus
  • Trojan Horse
  • Logic Bomb
  • Worm

Frage 57

Frage
One objective of cryptography is identifying and acknowledging the identity of entity. The term referring to this is:
Antworten
  • identification
  • message authentication
  • confirmation
  • validation
  • witnessing

Frage 58

Frage
Decipher the ciphertext QMHXIVQ using Caesar Cipher with the key = 4 [blank_start]Answer[blank_end]
Antworten
  • midterm

Frage 59

Frage
Weakness of a system that could be accidentally or intentionally exploited to damage assets
Antworten
  • Vulnerabilities
  • DMZ
  • Risk
  • Treats
  • Assets

Frage 60

Frage
Some _____ firewalls are able to examine the contents of packets as well as the headers for signs that they ate legitimate.
Antworten
  • Stateful
  • Personal
  • Stateless
  • Boundary

Frage 61

Frage
provides a user with protection against discovery and misuse of his or her identity by other users
Antworten
  • privacy
  • misuse
  • identification
  • ptotection
  • all of the statements

Frage 62

Frage
Use the playfair cipher with the keyword “PLAYFAIR” to encrypt the message “GOTO” [blank_start]Answer[blank_end]
Antworten
  • OVNQ

Frage 63

Frage
In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of d? [blank_start]Answer[blank_end]
Antworten
  • 5

Frage 64

Frage
Base elements of information such as numbers, letters, symbols and so on which are processed or carried out by human (or by some machine)
Antworten
  • Data
  • Context
  • Bytes
  • Information
  • Bits

Frage 65

Frage
What does firewall do
Antworten
  • Protects your computer from internet intrusion
  • Restores lost data on your computer
  • Checks floppy or CDs for corrupted files
  • Scans for viruses on your system
  • Protects against power surges

Frage 66

Frage
Perform decryption using the rsa algorithm if p = 5; q = 11, e = 3; c =14 [blank_start]answer[blank_end]
Antworten
  • 9

Frage 67

Frage
Which of the statement is true
Antworten
  • The larger the key size the greater the range of possible values a key can be
  • The larger the key size the smaller the range of possible values a key can be
  • The larger the key size the range of possible values a key can be remains the same
  • The smaller the key size the greater the range of possible values a key can be
  • The smaller the key size the range of possible values a key can be remains the same

Frage 68

Frage
What of the following statements is true
Antworten
  • Public key algorithms are slow compared to symmetric cryptography
  • None of the listed answers
  • Public key algorithms are used to hash the password
  • Public key algorithms are used to encrypt the message
  • Public key algorithms are used to encrypt the key encryption key

Frage 69

Frage
what is decryption algorithm
Antworten
  • takes the ciphertext and the secret key and produces the original plaintext
  • none of the statements are true
  • the original intelligible message or data that is fed into the algorithm as input
  • the scrambled message produced as output
  • performs various substitutions and transformations on the plaintext

Frage 70

Frage
A stateful firewall maintains a ______ , which is a list of active connections
Antworten
  • State table
  • Connection table
  • Hub table
  • Routing table
  • Bridging table

Frage 71

Frage
Possibility of an incident or attack to cause damage to your enterprise
Antworten
  • Risk
  • Virus
  • Security
  • Assets
  • Malware

Frage 72

Frage
According to dad triad, _______ attempts to defeat confidentiality
Antworten
  • disclosure
  • alteration
  • confidentiality
  • availability
  • destruction

Frage 73

Frage
Find d using rsa algorithm, if p = 3, q= 11, e = 7; M = 5 [blank_start]Answer[blank_end]
Antworten
  • 3

Frage 74

Frage
According to dad triad, _______ attempts to defeat integrity
Antworten
  • Alteration
  • Confidentiality
  • Availability
  • Destruction
  • Disclosure

Frage 75

Frage
One objective of cryptography is prevention of authorized access to resources or the delaying of time-critical operations
Antworten
  • Denial of service
  • Confidentiality
  • Availability
  • Authentication
  • Reliability

Frage 76

Frage
A public key encryption algorithm based on exponentiation in modular arithmetic. It is the only algorithm generally accepted as practical and secure for public key encryption
Antworten
  • RSA
  • Caesar cipher
  • Playfair Cipher
  • Vigenere Cipher
  • Hill Cipher

Frage 77

Frage
Which of the following statements are types of firewalls?
Antworten
  • Application level gateways
  • Packet – filtering
  • Circuit-level gateways
  • Session-level gateways
  • Internet-level gateways

Frage 78

Frage
What will be the value of key in Caesar Cipher if initially key = 65 [blank_start]Answer[blank_end]
Antworten
  • 13

Frage 79

Frage
The key used in a symmetric encryption system. Both participants must share the same key and this key must remain secret to protect communication
Antworten
  • Secret key
  • Symmetric key
  • Public key
  • Private key
  • Asymmetric key

Frage 80

Frage
if you encrypt a ciphertext using right key, you will get
Antworten
  • gibberish
  • ciphertext
  • plaintext
  • error message
  • key

Frage 81

Frage
Which one of the statement is equation for fi(n)?
Antworten
  • Fi(n) = (p-1)(q-1)
  • Fi(n) = (p-1)(q)
  • Fi(n) = (p-q)(q-1)
  • Fi(n) = pq
  • Fi(n) = (p)(q-1)

Frage 82

Frage
Which of the following statement(s) is(are) the Security Principles
Antworten
  • All of the statements
  • Separation of privileges
  • Least privilege
  • Defense in depth
  • Security through obscurity (the inadvisability thereof)

Frage 83

Frage
In a public key system using RSA you intercept the plaintext M=25 sent to user whose public key is e = 5; n =35. What will be the ciphertext C? [blank_start]Answer[blank_end]
Antworten
  • 30

Frage 84

Frage
The Caesar cipher is a _______ cipher that has a key of 3
Antworten
  • Shift
  • Transposition
  • Additive
  • Subtractive
  • Multiplicative

Frage 85

Frage
Secret undocumented entry point into a program, used to grant access without normal methods of access authentication
Antworten
  • Trapdoor
  • Virus
  • Worm
  • Trojan Horse
  • Logic Bomb

Frage 86

Frage
One of the two keys used on an asymmetric encryption system. For secure communication, the private key should only be known to its creator [blank_start]Answer[blank_end]
Antworten
  • private key

Frage 87

Frage
Which of these is not considered as a symmetric key algorithm
Antworten
  • rsa
  • playfair cipher
  • hill cipher
  • caesar cipher
  • vigenere cipher

Frage 88

Frage
The quality of state of being genuine or original rather than a reproduction or fabrication
Antworten
  • Authenticity
  • Availability
  • Authentication
  • Confidentiality
  • Accuracy

Frage 89

Frage
Perform encryption using the rsa algorithm if p = 3 q= 11 e = 7 M = 5 [blank_start]Answer[blank_end]
Antworten
  • 14

Frage 90

Frage
A process of identifying, analysing and controlling critical information
Antworten
  • OPSEC
  • Firewall
  • Scanning
  • DMZ
  • Anti-virus

Frage 91

Frage
____ is another term for a packet of digital information
Antworten
  • datagram
  • data
  • bits
  • header
  • footer

Frage 92

Frage
________ is the science and art of transforming messages to make them secure and immune to attacks
Antworten
  • Cryptography
  • Cryptosystem
  • None of the statements
  • Cryptoanalysis
  • Confidentiality

Frage 93

Frage
Which of the statement(s) is(are) properties for p an q
Antworten
  • p an q are prime
  • p an q are distinct
  • p = q -1
  • p is greater than q
  • p and q should be of similar bit length

Frage 94

Frage
The translation of encrypted text or data (called ciphertext) into original text or data (called plaintext). Also called deciphering [blank_start]answer[blank_end]
Antworten
  • decryption

Frage 95

Frage
Which of these is not considered as a symmetric key algorithm
Antworten
  • RSA
  • Hill Cipher
  • Playfair Cipher
  • Caesar cipher
  • Vigenere Cipher

Frage 96

Frage
A combination of an encryption algorithm and decryption is called a _____
Antworten
  • Cipher
  • Key
  • Polyalphabetic cipher
  • Secret
  • Substitution
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

State & Local Govt - Budgetary Accounting
turquoise_cat
Liberalism Mindmap
floragair
3. Describe the state of nature for Hobbes, Locke, and Rousseau.
Elisabeth Morell
Woody, Alternate, Simple, Families F-R
Wes Smalley
types of economy
Jesse McNab
body parts and sickness
Ambre Badipi
War on Terror
Wesley Spearman
React siblings components
Kostas Diakogiannis
Liberalism Mindmap
hollie garner
United States Capitals
Rob Perry
Secularism
Selective Study