хомяк убийца
Quiz por , criado more than 1 year ago

- at Quiz sobre #2 Information security and data protection, criado por хомяк убийца em 13-05-2018.

944
21
0
хомяк убийца
Criado por хомяк убийца aproximadamente 6 anos atrás
Fechar

#2 Information security and data protection

Questão 1 de 60

1

This is the process of determining whether someone or something is, in fact, who or what it is declared to be.

Selecione uma das seguintes:

  • Conditional access

  • Authentication

  • Identification

  • Anonymizer

  • Authorization

Explicação

Questão 2 de 60

1

In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack

Selecione uma das seguintes:

  • Password

  • Two factor authentication

  • Security token

  • Authentication

Explicação

Questão 3 de 60

1

Why would reusing a ticket as a replay attack is Kerberos not be successful?

Selecione uma das seguintes:

  • The tickets are encrypted

  • The tickets are digitally signed

  • The tickets are used a token

  • The tickets are time stamped

Explicação

Questão 4 de 60

1

What is Man in the middle attack?

Selecione uma das seguintes:

  • The attackers catch our employee in the middle of them and start applying physical pressure on them

  • The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras

  • The hacker jacks in a network and records all the information sent over the network

Explicação

Questão 5 de 60

1

What is encryption strength is based on? Please select the best answer

Selecione uma das seguintes:

  • The strength of the algorithm, the length of the key, and the secrecy of the key

  • The length of the key, the type of algorithm, and the strength of the key

  • The privacy of the key, the length of the algorithm, and the strength of the key

  • The strength of the key, the length of the algorithm, and the privacy of the key

Explicação

Questão 6 de 60

1

One form of ‘something you have’ is the _____ and USB tokens

Selecione uma das seguintes:

  • Fingerprint

  • Tokens

  • Identification

  • Password

  • Digital signatures

Explicação

Questão 7 de 60

1

The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as (Please select the best answer)

Selecione uma das seguintes:

  • Password authentication

  • Physical authentication

  • Fingerprint authentication

  • Biometric authentication

Explicação

Questão 8 de 60

1

What is a good way to make users in a network safer in the internet

Selecione uma das seguintes:

  • Get a slow connection so they cannot download too much

  • Deny all internet access

  • All of the above

  • None of the above

  • Set up a filtering proxy server so you can check all the incoming traffic

Explicação

Questão 9 de 60

1

When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a

Selecione uma das seguintes:

  • It is known as the Man in the middle attack

  • It is known as the TCP/IP spoofing attack

  • It is known as the Back door attack

  • It is known as the Replay attack

Explicação

Questão 10 de 60

1

In which of the following attack does the attacker capture a portion of the communication between two parties, modifies it, and inserts

Selecione uma das seguintes:

  • Man-in-the-middle attack

  • Spoofing

  • Sniffing

  • Denial-of-service

Explicação

Questão 11 de 60

1

A password represents

Selecione uma das seguintes:

  • Something you have

  • None of the above

  • Something you are

  • Something you know

  • All of the above

Explicação

Questão 12 de 60

1

List the main aspects of information security: I. Confidentiality II. Integrity III. Availability IV. Consistency

Selecione uma das seguintes:

  • I-III-IV

  • I-III

  • I-II-III

  • I only

  • II-III-IV

Explicação

Questão 13 de 60

1

Which of the following describes the challenge-response

Selecione uma das seguintes:

  • A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)

  • A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)

  • A special hardware device that is used to generate random text in a cryptography system

  • The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.

Explicação

Questão 14 de 60

1

Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?

Selecione uma das seguintes:

  • 6

  • 8

  • 9

  • 16

Explicação

Questão 15 de 60

1

Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should

Selecione uma das seguintes:

  • Encrypt the message with Alice’s public key and send Alice the message

  • Encrypt the message with Alice’s private key and send the encrypted message to Alice

  • Encrypt the message with his public key and send Alice the message

  • Encrypt the message with his private key and send the encrypted message to Alice

Explicação

Questão 16 de 60

1

Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature

Selecione uma das seguintes:

  • Bob applies a hash function to m and then encrypts the result with his private key

  • Bob applies a hash function to m and then encrypts the result with his public key

  • Bob applies a hash function to m and then encrypts the result with Alice’s public key

  • Bob encrypts m with his private key and then applies a hash function to the result

Explicação

Questão 17 de 60

1

Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice

Selecione uma das seguintes:

  • Applies Bob's public key to the digital signature, applies the has function to m, and compares the results of the two operations;

  • Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m;

  • Applies a de-hashing function to the digital signature and compare the result to m;

  • No correct answer;

Explicação

Questão 18 de 60

1

Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with

Selecione uma das seguintes:

  • The CA's private key

  • Bob’s public key

  • The CA's public key

  • Bob’s private key

Explicação

Questão 19 de 60

1

A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.

Selecione uma das seguintes:

  • Network Adapter

  • Antivirus Software

  • Intrusion Detection System

  • Firewall

Explicação

Questão 20 de 60

1

Which security action should be finished before access is given to the network?

Selecione uma das seguintes:

  • Identification and authorization

  • Identification and authentication

  • Authentication and authorization

  • Authentication and password

Explicação

Questão 21 de 60

1

Which of the following types of encryption would BEST to use for a large amount of data?

Selecione uma das seguintes:

  • Asymmetric

  • Symmetric

  • RSA

  • Hash

Explicação

Questão 22 de 60

1

Which statement correctly describes the difference between a secure cipher and a secure hash?

Selecione uma das seguintes:

  • A hash produces a variable output for any input size; a cipher does not.

  • A cipher can be reversed; a hash cannot.

  • A cipher produces the same size output for any input size; a hash does not.

Explicação

Questão 23 de 60

1

This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.

Selecione uma das seguintes:

  • Decryption

  • Cryptanalysis

  • Cryptography

  • Brute force cracking

Explicação

Questão 24 de 60

1

Making sure that the data has not been changed unintentionally, due to an accident or malice, is:

Selecione uma das seguintes:

  • Auditability

  • Availability

  • Integrity

  • Confidentiality

Explicação

Questão 25 de 60

1

Which of the following appears when an asset of the system become lost, unavailable or unusable?

Selecione uma das seguintes:

  • Interception

  • Interruption

  • Interpretation

  • Modification

  • Fabrication

Explicação

Questão 26 de 60

1

Show incorrect kind of threats

Selecione uma das seguintes:

  • Interception

  • Interruption

  • Interpretation

  • Modification

  • Fabrication

Explicação

Questão 27 de 60

1

Bock cipher maps each plaintext block to :

Selecione uma das seguintes:

  • Same length cipher text block

  • Different length cipher text block

  • The same letter

  • No answer

Explicação

Questão 28 de 60

1

What is vulnerability?

Selecione uma das seguintes:

  • A weakness in the security system

  • A Method which uses flaws to have more access, privileges or resources to the system

  • A method which used to eliminate or reduce threats

  • A kind of auth to system

Explicação

Questão 29 de 60

1

A(n) _____ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through

Selecione uma das seguintes:

  • Antivirus

  • Intrusion Detection System (IDS)

  • Personal Firewall

  • Network Monitor

Explicação

Questão 30 de 60

1

What is assumed by cipher in cryptography ?

Selecione uma das seguintes:

  • Algorithm for performing encryption and decryption

  • Encrypted message

  • None of mentioned

  • Raw message

  • All of mentioned

Explicação

Questão 31 de 60

1

What is assumed by ciphertext in cryptography?

Selecione uma das seguintes:

  • Algorithm for performing encryption and decryption

  • Encrypted message

  • None of mentioned

  • Raw message

  • All of mentioned

Explicação

Questão 32 de 60

1

What is assumed by plaintext in cryptography?

Selecione uma das seguintes:

  • Algorithm for performing encryption and decryption

  • Encrypted message

  • None of mentioned

  • Raw message

  • All of mentioned

Explicação

Questão 33 de 60

1

In cryptography, what is key?

Selecione uma das seguintes:

  • Info used to cipher, known only to sender and receiver

  • Algorithm for transforming plaintext to ciphertext

  • Encrypted message

  • Recovering plaintext from ciphertext

  • Converting plaintext to ciphertext

Explicação

Questão 34 de 60

1

What is cryptoanalysis?

Selecione uma das seguintes:

  • Study of principles/methods deciphering ciphertext without knowing key

  • Info used to cipher, known only to sender and receiver

  • Algorithm for transforming plaintext to ciphertext

  • Recovering plaintext from ciphertext

  • Converting plaintext to ciphertext

Explicação

Questão 35 de 60

1

In asymmetric key cryptography, the public key for decryption is kept by:

Selecione uma das seguintes:

  • Sender

  • Receiver

  • Sender and receiver

  • Everyone in the network

  • All the connected devices to the network

Explicação

Questão 36 de 60

1

Which of these are threats against to modern computer?

Selecione uma das seguintes:

  • Network attacks, firewall and worms

  • Viruses, worms and encryption

  • Network attacks, viruses and worms

  • Viruses, network encryptions and worms

Explicação

Questão 37 de 60

1

How the industry solves the threats ?

Selecione uma das seguintes:

  • Firewall, IDS, Kerberos, blogs

  • IDS, firewall, authentication, policies

  • Virus, worms, attacks, web-sites

  • Network attacks, IDS, worms, virus

Explicação

Questão 38 de 60

1

Which one of the following algorithm is not used in asymmetric key cryptography?

Selecione uma das seguintes:

  • RSA algorithm

  • Diffle-Hellman algorithm

  • DES algorithm

  • DSA algorithm

Explicação

Questão 39 de 60

1

In cryptography, the order of the order of the letters in a message in rearranged by

Selecione uma das seguintes:

  • Transpositionalcip ciphers

  • substitution ciphers

  • All kinds of the ciphers

  • None of the mentioned

Explicação

Questão 40 de 60

1

What is data encryption standard (DES)?

Selecione uma das seguintes:

  • Block cipher

  • stream cipher

  • bit cipher

  • none of the mentioned

Explicação

Questão 41 de 60

1

Cryptanalysis is used:

Selecione uma das seguintes:

  • To find some insecurity in cryptographic scheme

  • to increase the speed

  • to encrypt the data

  • none of the mentioned

Explicação

Questão 42 de 60

1

Cryptographic hash function takes an arbitrary block of data and returns

Selecione uma das seguintes:

  • Fixed site bit string

  • variable size bit string

  • none of the mentioned

  • both of the mentioned

Explicação

Questão 43 de 60

1

A substitution cipher substitutions one symbol with

Selecione uma das seguintes:

  • Keys

  • Others

  • Multi Parties

  • Single Party

Explicação

Questão 44 de 60

1

An asymmetric-key(or public key ) cipher uses

Selecione uma das seguintes:

  • 1 key

  • 2 key

  • 3 key

  • 4 key

Explicação

Questão 45 de 60

1

In the computer industry the “What you have” method is use of?

Selecione uma das seguintes:

  • Passwords

  • Smart cards

  • Digital certificates’

Explicação

Questão 46 de 60

1

A smartcard represents

Selecione uma das seguintes:

  • None of the above

  • Something you are

  • All of the above

  • Something you have

  • Something you know

Explicação

Questão 47 de 60

1

Convert one symbol of plaintext immediately into a symbol of cipher text (example:Caesar cipher)

Selecione uma das seguintes:

  • Encryption

  • Plaintext

  • Block cipher

  • stream ciphers

Explicação

Questão 48 de 60

1

Interruption is

Selecione uma das seguintes:

  • Asset lost, unusable, unavailable

  • Unauthorized access

  • Unauthorized change, tamper of data

  • Ex. Unauthorized add data to a DB

Explicação

Questão 49 de 60

1

Modification is

Selecione uma das seguintes:

  • Unauthorized change, tamper of data

  • Asset lost, unusable, unavailable

  • Unauthorized access

  • Ex. Unauthorized add data to a DB

Explicação

Questão 50 de 60

1

Which are the examples of DEFENCE?

Selecione uma das seguintes:

  • Firewalls, router access control list, spam filters, virus scanners

  • Employee communication, policy on company Intranet

  • Audit logs, intrusion detection system, network traffic monitoring

  • Network attacks, IDS, worms, virus

Explicação

Questão 51 de 60

1

Which are the examples of DETERRENCE?

Selecione uma das seguintes:

  • Employee communication, policy on company Intranet

  • Firewalls, router access control list, spam filters, virus scanners

  • Audit logs, intrusion detection system, network traffic monitoring

  • Network attacks, IDS, worms, virus

Explicação

Questão 52 de 60

1

Which are the examples of DETECTION?

Selecione uma das seguintes:

  • Audit logs, intrusion detection system, network traffic monitoring

  • Employee communication, policy on company Intranet

  • Firewalls, router access control list, spam filters, virus scanners

  • Network attacks, IDS, worms, virus

Explicação

Questão 53 de 60

1

What is encryption?

Selecione uma das seguintes:

  • Is the process of encoding a message so that its meaning is not obvious

  • Is the reverse process, transforming an encrypted message back into its normal, original form

  • Is the process of preventing any attacks from the hackers

Explicação

Questão 54 de 60

1

In password protection, this is a random string of data or number used to modify a password hash

Selecione uma ou mais das seguintes:

  • Nonce

  • Ssl

  • One time password

  • Secret key

  • Public key

Explicação

Questão 55 de 60

1

Using public key cryptography suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should:

Selecione uma das seguintes:

  • Encrypt the message with his private key, encrypt the result with Ailce’s public key and then send Alice the message

  • • Encrypt the message with his private key , encrypt yhe result with alices’ private key, and then send Alicce the message

  • • Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message

Explicação

Questão 56 de 60

1

Which statement correctly describes the difference between a secure cipher and a secure hash?

Selecione uma das seguintes:

  • Cipher can be reversed, hash cannot

  • A hash can be reversed, a cipher cannot

  • A hash production a variable output fot any input size, a cipher does not

  • A cipher produces the same size output for any input size, a hash does not

Explicação

Questão 57 de 60

1

This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies

Selecione uma das seguintes:

  • • Brute force cracking

  • • Decryption

  • • Cryptoanalysis

  • • Cryptography

Explicação

Questão 58 de 60

1

A well designed and configured _____ is like having single point of entry into your building with a security guard at the door allowing only authorized personnel into the building

Selecione uma das seguintes:

  • Firewall

  • Network adapter

  • Antivirus software

  • Intrusion detection system

Explicação

Questão 59 de 60

1

Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with

Selecione uma das seguintes:

  • The CA’s private key

  • Bobs public key

  • The CAs public key

  • Bobs private key

Explicação

Questão 60 de 60

1

Suppose Alice receives from Bob a message m with digital signature for one message m. To verify that the message was not changed and that Bob indeed sent the message, Alice

Selecione uma das seguintes:

  • Applies Bob’s public key to the digital signature applies to the hash function to m, and compares the results of the two operations.

  • Applies bobs public key to the digital signature, then a de-hashing function to the result. She then compares the result of this operation with the message m

  • Applies a de-hashing function to the digital signature and compares the result m

  • No correct answer

Explicação