Daniyar Adilkhanov
Quiz by , created more than 1 year ago

Computer Science Quiz on oku_kerek_tagy_byr_ret, created by Daniyar Adilkhanov on 17/05/2018.

138
1
0
Daniyar Adilkhanov
Created by Daniyar Adilkhanov almost 6 years ago
Close

oku_kerek_tagy_byr_ret

Question 1 of 113

1

A message is authentic and digitally signed if sent with:

Select one of the following:

  • a message digest/hash encrypted with the receiver’s public key

  • a message digest/hash encrypted with the receiver’s private key

  • a message digest/hash encrypted with the sender’s public key

  • a message digest/hash encrypted with the sender’s private key

Explanation

Question 2 of 113

1

Which of the following issues is not addressed by Kerberos:

Select one of the following:

  • availability.

  • privacy.

  • integrity.

  • authentication.

Explanation

Question 3 of 113

1

In Asymmetric-Key Cryptography, two keys, e and d, have a special relationship to

Select one of the following:

  • Others

  • Data

  • Keys

  • Each other

Explanation

Question 4 of 113

1

Substitutional cipers are

Select one of the following:

  • Monoalphabatic

  • Semialphabetic

  • Polyalphabetic

  • None of the above

  • Both monoalphabatic and polyalphabetic

Explanation

Question 5 of 113

1

Heart of Data Encryption Standard (DES), is the

Select one of the following:

  • Cipher

  • Rounds

  • Encryption

  • DES function

Explanation

Question 6 of 113

1

DES stands for

Select one of the following:

  • Data Encryption Standard

  • Data Encryption Subscription

  • Data Encryption Solutions

  • Data Encryption Slots

Explanation

Question 7 of 113

1

In symmetric key cryptography, key used by sender and receiver is

Select one of the following:

  • Shared

  • Different

  • two keys are used

  • None

Explanation

Question 8 of 113

1

In symmetric-key cryptography, key(s) used for encryption and decryption is/are

Select one of the following:

  • Same

  • Different

  • Private

  • Public

Explanation

Question 9 of 113

1

Keys used in cryptography are

Select one of the following:

  • secret key

  • private key

  • public key

  • All of them

  • None of them

Explanation

Question 10 of 113

1

Cryptography can provide

Select one of the following:

  • entity authentication

  • nonrepudiation of messages

  • confidentiality

  • None of them

  • All of them

Explanation

Question 11 of 113

1

Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and

Select one of the following:

  • Data Size

  • Round Size

  • Key Size

  • Encryption Size

Explanation

Question 12 of 113

1

Cryptography algorithms (ciphers) are divided into

Select one of the following:

  • two groups

  • four groups

  • one single group

  • None

Explanation

Question 13 of 113

1

In Cryptography, original message, before being transformed, is called

Select one of the following:

  • Simpletext

  • Plaintext

  • Emptytext

  • Filledtext

Explanation

Question 14 of 113

1

SHA-l has a message digest of

Select one of the following:

  • 160 bits

  • 512 bits

  • 628 bits

  • 820 bits

Explanation

Question 15 of 113

1

A hash function guarantees integrity of a message. It guarantees that message has not be

Select one of the following:

  • Replaced

  • Over view

  • Changed

  • Left

Explanation

Question 16 of 113

1

To check integrity of a message, or document, receiver creates the

Select one of the following:

  • Cipher text

  • Hash

  • Hyper Text

  • Finger Print

Explanation

Question 17 of 113

1

A digital signature needs a

Select one of the following:

  • private-key

  • shared-key

  • public-key

  • All of them

  • None of them

Explanation

Question 18 of 113

1

Encryption and decryption provide secrecy, or confidentiality, but not

Select one of the following:

  • Authentication

  • Integrity

  • Keys

  • Frames

  • Confidentiality

Explanation

Question 19 of 113

1

When data must arrive at receiver exactly as they were sent, it is called

Select one of the following:

  • Message Confidentiality

  • Message Integrity

  • Message Splashing

  • Message Sending

Explanation

Question 20 of 113

1

In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of

Select one of the following:

  • 512 Bit Blocks

  • 1023 Bit Blocks

  • 1001 Bit Blocks

  • 1510 Bit Blocks

  • 2024 Bit Blocks

Explanation

Question 21 of 113

1

Message privacy means that sender and receiver expect

Select one of the following:

  • Integrity

  • Confidentiality

  • Authentication

  • Nonrepudiation

Explanation

Question 22 of 113

1

Message must be encrypted at sender site and decrypted at the

Select one of the following:

  • Sender Site

  • Site

  • Receiver site

  • Conferencing

Explanation

Question 23 of 113

1

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if message is

Select one of the following:

  • Short

  • Huge

  • Complex

  • Thin

  • None of them

Explanation

Question 24 of 113

1

An encryption algorithm transforms plaintext into

Select one of the following:

  • Cipher text

  • Simple Text

  • Plain Text

  • Empty Text

Explanation

Question 25 of 113

1

A transposition cipher reorders (permutes) symbols in a

Select one of the following:

  • block of packets

  • block of slots

  • block of signals

  • block of symbols

Explanation

Question 26 of 113

1

Ciphers of today are called round ciphers because they involve

Select one of the following:

  • Single Round

  • Double Rounds

  • Multiple Round

  • Round about

Explanation

Question 27 of 113

1

RSA stands for

Select one of the following:

  • Rivest, Shamir, Adleman

  • Roger, Shamir, Adrian

  • Robert, Shamir, Anthoney

  • Rivest, Shaw, Adleman

Explanation

Question 28 of 113

1

_______ is the science and art of transforming messages to make them secure and immune to attacks.

Select one of the following:

  • Cryptography

  • Cryptoanalysis

  • Crypt

  • Encryption

  • None of them

Explanation

Question 29 of 113

1

The _______ is a number or a set of numbers on which the cipher operates.

Select one of the following:

  • cipher

  • nonce

  • secret

  • key

  • none of the above

Explanation

Question 30 of 113

1

In a(n) ________ cipher, the same key is used by both the sender and receiver.

Select one of the following:

  • symmetric-key

  • asymmetric-key

  • Public-key cryptography

  • RSA algorithm

  • None of them

Explanation

Question 31 of 113

1

In a(n) ________, the key is called the secret key.

Select one of the following:

  • symmetric-key

  • asymmetric-key

  • Public-key cryptography

  • All of them

  • None of them

Explanation

Question 32 of 113

1

In a(n) ________ cipher, a pair of keys is used

Select one of the following:

  • symmetric-key

  • asymmetric-key

  • Private-key cryptography

  • DES algorithm

Explanation

Question 33 of 113

1

The Caesar cipher is a _______cipher that has a key of 3.

Select one of the following:

  • transposition

  • additive

  • asymmetric

  • substitution

  • none of the above

Explanation

Question 34 of 113

1

The ________ cipher reorders the plaintext characters to create a ciphertext.

Select one of the following:

  • transposition

  • additive

  • asymmetric

  • substitution

  • shift

Explanation

Question 35 of 113

1

A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream.

Select one of the following:

  • S-box

  • P-box

  • T-box

  • none of the above

  • SP-boxes

Explanation

Question 36 of 113

1

A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.

Select one of the following:

  • S-box

  • P-box

  • T-box

  • none of the above

  • SP-boxes

Explanation

Question 37 of 113

1

DES is a(n) ________ method adopted by the U.S. government.

Select one of the following:

  • symmetric-key

  • asymmetric-key

  • decryption

  • encryption

  • None of them

Explanation

Question 38 of 113

1

DES has an initial and final permutation block and _________ rounds.

Select one of the following:

  • 14

  • 15

  • 12

  • 16

  • none of the above

Explanation

Question 39 of 113

1

DES uses a key generator to generate sixteen _______ round keys.

Select one of the following:

  • 32-bit

  • 48-bit

  • 56-bit

  • 42-bit

  • 64-bit

Explanation

Question 40 of 113

1

AES has _____ different configurations

Select one of the following:

  • two

  • three

  • four

  • five

  • AES has no configurations

Explanation

Question 41 of 113

1

One commonly used public-key cryptography method is the ______ algorithm.

Select one of the following:

  • RSS

  • RAS

  • RSA

  • RAA

  • DSS

Explanation

Question 42 of 113

1

The ________ method provides a one-time session key for two parties.

Select one of the following:

  • Diffie-Hellman

  • RSA

  • DES

  • AES

  • DSA

Explanation

Question 43 of 113

1

In symmetric cryptography, which of the following MUST be true:

Select one of the following:

  • The same key is used for encryption and decryption

  • Encryption and decryption take the same amount of time

  • Different algorithms are used for encryption and decryption

  • Cryptographic operations are one‐way, and not reversible

Explanation

Question 44 of 113

1

Message _____ means that the data must arrive at the receiver exactly as sent.

Select one of the following:

  • confidentiality

  • integrity

  • authentication

  • availability

  • none of the above

Explanation

Question 45 of 113

1

Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

Select one of the following:

  • confidentiality

  • integrity

  • availability

  • authentication

  • none of the above

Explanation

Question 46 of 113

1

________ means to prove the identity of the entity that tries to access the system's resources.

Select one of the following:

  • Message authentication

  • Entity authentication

  • Message confidentiality

  • Message integrity

  • none of the above

Explanation

Question 47 of 113

1

Digital signature cannot provide ________ for the message.

Select one of the following:

  • integrity

  • confidentiality

  • nonrepudiation

  • authentication

  • availability

Explanation

Question 48 of 113

1

Challenge-response authentication can be done using ________.

Select one or more of the following:

  • symmetric-key ciphers

  • asymmetric-key ciphers

  • keyed hash function

  • keyless hash function

  • all of the above

Explanation

Question 49 of 113

1

A digital signature needs a(n)_________ system.

Select one of the following:

  • symmetric-key

  • asymmetric-key

  • both symmetric- and asymmetric-key cryptography

  • None of the above

Explanation

Question 50 of 113

1

The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.

Select one of the following:

  • one-way property

  • collision-free property

  • both one-way and collision-free properties

  • none of the above

Explanation

Question 51 of 113

1

Making sure that the data has not been changed unintentionally, due to an accident or malice, is:

Select one of the following:

  • Auditability

  • Confidentiality

  • Integrity

  • Availability

  • Identity

Explanation

Question 52 of 113

1

I have a company’s documents which are proprietary and a trade secret. How do I protect them from getting stolen?

Select one of the following:

  • Digitally sign the documents

  • Encrypt them using RSA or AES

  • Hash the data

  • Use decryption

  • None of them

Explanation

Question 53 of 113

1

Biometrics represents:

Select one of the following:

  • Something you know

  • Something you have

  • Something you are

  • All of the above

  • None of the above

Explanation

Question 54 of 113

1

In asymmetric encryption

Select one of the following:

  • same key is used for encryption and decryption

  • different keys are used encryption and decryption

  • no key is required for encryption and decryption

  • none of the mentioned

Explanation

Question 55 of 113

1

The sender “signs” a message as:

Select one of the following:

  • Digital Signature

  • Artificial Signature

  • Encrypted Signature

  • None of the above

Explanation

Question 56 of 113

1

In encryption:

Select one of the following:

  • Public key is used

  • Private key is used

  • Both public and private keys are used

  • None of the above

Explanation

Question 57 of 113

1

AES stands for:

Select one of the following:

  • Advanced Encryption Standard

  • Advanced Encryption System

  • Advanced Encryption Suggestion

  • None of the above

Explanation

Question 58 of 113

1

Authentication is:

Select one of the following:

  • Verification of user’s identification

  • Verification of the data

  • All answers are correct

  • No correct answer

Explanation

Question 59 of 113

1

The process to discover plaintext or key is known as

Select one of the following:

  • Cryptanalysis

  • Cryptography

  • Crypto design

  • Crypto processing

  • Cryptology

Explanation

Question 60 of 113

1

Output message in cryptography is called:

Select one of the following:

  • Plaintext

  • Ciphertext

  • Raw text

  • None of the above

Explanation

Question 61 of 113

1

Input message in cryptography is called:

Select one of the following:

  • Plaintext

  • Ciphertext

  • Encrypted text

  • None of the above

Explanation

Question 62 of 113

1

In cryptography

Select one of the following:

  • Information is transmitted from sender to receiver

  • No information is transmitted

  • Information is damaged

  • No correct answer

Explanation

Question 63 of 113

1

Secure hash algorithm(SHA) developed by:

Select one of the following:

  • National Institute of Standards and Technology (NIST) or NSA

  • IEEE

  • ANSI

  • None of the above

Explanation

Question 64 of 113

1

Conventional encryption is:

Select one of the following:

  • Symmetric encryption

  • Secret key encryption

  • Single key encryption

  • All of the above

Explanation

Question 65 of 113

1

In network security:

Select one of the following:

  • Data is protected from hackers

  • Data is protected from cracker

  • Both answers are possible

  • None of the above

Explanation

Question 66 of 113

1

DSS stands for:

Select one of the following:

  • Digital signature standard

  • Digital sound system

  • Digital simulation schemes

  • None of these

Explanation

Question 67 of 113

1

Cryptography ensures:

Select one of the following:

  • Confidentiality of data

  • Authentication of data

  • Integrity of data

  • All of the above

Explanation

Question 68 of 113

1

In network security:

Select one of the following:

  • Data is protected during transmission

  • Data is not protected during transmission

  • Data is changed

  • None of the above

Explanation

Question 69 of 113

1

Network security ensures:

Select one of the following:

  • Detecting attacks

  • Preventing attacks

  • Recovering attacks

  • All of the above

Explanation

Question 70 of 113

1

Encryption protects against:

Select one of the following:

  • Attacks

  • Viruses

  • Manipulation of data

  • All of the above

Explanation

Question 71 of 113

1

Authentication refers to:

Select one of the following:

  • Verification of user’s identity

  • Checking user’s privileges

  • Auditing user’s process

  • None of the above

Explanation

Question 72 of 113

1

The message is decrypted at ________ - side

Select one of the following:

  • Receiver

  • Sender

  • Broker

  • Attacker

  • All of the above

Explanation

Question 73 of 113

1

Cryptography relates to ______

Select one of the following:

  • Editing

  • Security

  • Testing

  • All of the above

Explanation

Question 74 of 113

1

Which of the following is not used for symmetric encryption?

Select one of the following:

  • RSA

  • DES

  • SHAI

  • RC4

  • MD5

Explanation

Question 75 of 113

1

Finding plaintext, without knowing key is know as:

Select one of the following:

  • Cryptography

  • Cryptanalysis

  • Cryptology

  • None of the above

Explanation

Question 76 of 113

1

Which of the following is a transposition cipher?

Select one of the following:

  • Caesar cipher

  • Vigenere cipher

  • One time pad

  • Playfair cipher

Explanation

Question 77 of 113

1

Which of the following is a monoalphabetic cipher?

Select one of the following:

  • Caesar Cipher

  • Lucifier cipher

  • Playfair cipher

  • No correct answer

Explanation

Question 78 of 113

1

RSA involves very large _____ numbers.

Select one of the following:

  • Prime

  • Even

  • Odd

  • Any random

Explanation

Question 79 of 113

1

Cryptology means

Select one of the following:

  • Cryptography + Cryptodesign

  • Cryptography + Cryptanalysis

  • Cryptography itself known as cryptology also

  • None of the above

Explanation

Question 80 of 113

1

Diffie-Hellman key exchange is vulnerable to:

Select one of the following:

  • Discrete logarithmic problem

  • Elliptic curve cryptography

  • Man-in-the-middle attack

Explanation

Question 81 of 113

1

None of these Which of the following is an example of a passive attack?

Select one of the following:

  • Modify

  • Denial of Service (DoS)

  • Masquerade

  • Traffic analysis

Explanation

Question 82 of 113

1

Which kind of service ensures that a message was received from the actual sender not from an attacker?

Select one of the following:

  • Confidentiality

  • Access Control

  • Integrity

  • Non-repudiation

  • Authentication

Explanation

Question 83 of 113

1

Which of the following is an active attack? I. Release of message contents; II. Traffic analysis; III. Modify; IV. Denial of Service

Select one of the following:

  • I and II

  • I and III

  • III and IV

  • II and IV

  • I, III and IV

Explanation

Question 84 of 113

1

The method of hiding the secret is called

Select one of the following:

  • Cryptography

  • Watermarking

  • Cryptanalysis

  • Steganography

Explanation

Question 85 of 113

1

It is the art of breaking the cipher

Select one of the following:

  • Cryptanalysis

  • Watermarking

  • Cryptography

  • Steganography

Explanation

Question 86 of 113

1

The field which deals with _____ called cryptography

Select one of the following:

  • Keys

  • Encryption techniques and secure systems

  • Firewalls, Kerberos and Intrusion detection systems

  • Operating systems

Explanation

Question 87 of 113

1

What would be the number of rounds in AES, if the key size is 24 bytes?

Select one of the following:

  • 10

  • 12

  • 14

  • 26

Explanation

Question 88 of 113

1

What would be the number of rounds in AES, if the key size is 32 bytes?

Select one of the following:

  • 10

  • 12

  • 14

  • 16

Explanation

Question 89 of 113

1

Which of the following step is absent in the last round of AES?

Select one of the following:

  • Shift row

  • Mix columns

  • Byte substitution

  • Add subkey

Explanation

Question 90 of 113

1

DES algorithm uses total ______ subkeys

Select one of the following:

  • 10

  • 12

  • 14

  • 16

  • 24

Explanation

Question 91 of 113

1

The total number of rounds in DES algorithm.

Select one of the following:

  • 10

  • 12

  • 14

  • 16

  • 24

Explanation

Question 92 of 113

1

Which of the following method provides a one-time session key for two parties?

Select one of the following:

  • Diffie-Hellman

  • RSA

  • DES

  • AES

Explanation

Question 93 of 113

1

What is the size of round key for DES algorithm?

Select one of the following:

  • 32-bit

  • 48-bit

  • 64-bit

  • 128-bit

Explanation

Question 94 of 113

1

What is the purpose of access control list?

Select one of the following:

  • to enforce a specified security policy

  • to prevent unauthorised access to data

  • to emphasize encryption

  • it is a key distribution center

Explanation

Question 95 of 113

1

Define a subject of Access Control List

Select one of the following:

  • an active entity requesting for resource access

  • a passive entity and target of the protection

  • an access control decision function

  • an access control information function

Explanation

Question 96 of 113

1

Define an object of Access Control List

Select one of the following:

  • an active entity requesting for resource access

  • a passive entity and target of the protection

  • an access control decision function

  • an access control information function

Explanation

Question 97 of 113

1

What does multilevel security mean?

Select one of the following:

  • Classification of information by the level of importance and permission of access by users with different security clearance

  • Classification of information by date and permission of access by users with different security clearance

  • Classification of information by the level of importance and permission of access by users name

  • Classification of information by date and permission of access by users name

Explanation

Question 98 of 113

1

How many levels are covered in multilevel security

Select one of the following:

  • 1

  • 2

  • 3

  • 4

Explanation

Question 99 of 113

1

No read up (read down) means

Select one of the following:

  • A subject can only read an object of less or equal security level

  • A subject can only write into an object of greater or equal security level

  • A subject can only read an object of more or equal security level

  • A subject can only write into an object of less or equal security level

Explanation

Question 100 of 113

1

No write down (write up) means

Select one of the following:

  • A subject can only read an object of less or equal security level

  • A subject can only write into an object of greater or equal security level

  • A subject can only read an object of more or equal security level

  • A subject can only write into an object of less or equal security level

Explanation

Question 101 of 113

1

What does “computationally infeasible to find data mapping to specific hash” mean?

Select one of the following:

  • One way property

  • Collision free property

  • Second way property

  • Collision property

Explanation

Question 102 of 113

1

Which of the following is not property of hash functions?

Select one of the following:

  • One wayness

  • Preimage resistance

  • Strong collision resistance

  • Long, unfixed output

Explanation

Question 103 of 113

1

The purpose of hash function is to

Select one of the following:

  • Create a message

  • Compress a message

  • Divide a message

  • Conquer a message

Explanation

Question 104 of 113

1

Which of the following refers requirement of digital signature?

Select one of the following:

  • Must be relatively hard to produce

  • Must be relatively hard to recognize

  • Must depend on the message verified

  • Must to be computationally infeasible to forge

Explanation

Question 105 of 113

1

Which of the following refers requirement of digital signature?

Select one of the following:

  • Must be relatively hard to produce

  • Must be relatively hard to recognize

  • Must depend on the message verified

  • Must to be practical to save digital signature in storage

Explanation

Question 106 of 113

1

What is the property of direct digital signature?

Select one of the following:

  • Assumed receiver has sender’s private key

  • Involves only sender

  • Can encrypt using receiver’s public key

  • Assumed sender has receiver’s private key

Explanation

Question 107 of 113

1

Define AAA.

Select one of the following:

  • Access After Anyone

  • Authentication Authorization Accounting

  • Authentication Authorization Access

  • Authentication Access Accounting

Explanation

Question 108 of 113

1

Which of the term refers to authorization?

Select one of the following:

  • The user identity is a parameter in access control decisions

  • The user identity is recorded when logging security

  • The process of verifying a claimed identity

  • Accounting of service

Explanation

Question 109 of 113

1

Which of the term refers to accounting?

Select one of the following:

  • The user identity is a parameter in access control decisions

  • The user identity is recorded when logging security

  • The process of verifying a claimed identity

Explanation

Question 110 of 113

1

Define X.509

Select one of the following:

  • TTP certifies trustworthiness of binding public key with its rightful owner’s identity

  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity

  • To enable the validation and to give legal meaning to digital signature

  • Answers for supporting encryption/decryption algorithms

Explanation

Question 111 of 113

1

Define a Kerberos

Select one of the following:

  • Trusted third party authentication system and makes no use of public key cryptography

  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity

  • To enable the validation and to give legal meaning to digital signature

  • Answers for supporting encryption/decryption algorithms

Explanation

Question 112 of 113

1

Which of the following does not refer for Kerberos property

Select one of the following:

  • Impeccability

  • Containment

  • Transparency

  • Viciousness

Explanation

Question 113 of 113

1

How BruteForce works

Select one of the following:

  • аttаckеr triеs еvеry possiblе combinаtion of chаrаctеrs

  • Install viruses

  • Attacker sends more data to an application than is expected

  • Attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability

Explanation