Dina  Kim
Quiz por , criado more than 1 year ago

Quiz sobre CS_InfSec, criado por Dina Kim em 26-03-2019.

152
5
0
Sem etiquetas
Dina  Kim
Criado por Dina Kim aproximadamente 5 anos atrás
Fechar

CS_InfSec

Questão 1 de 96

1

Which of the following is not a fundamental security goal?

Selecione uma das seguintes:

  • assurance

  • confidentiality

  • all of the statements are correct

  • integrity

  • availability

Explicação

Questão 2 de 96

1

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

Selecione uma das seguintes:

  • Trojan Horse

  • Virus

  • Logic Bomb

  • OPSEC

  • Worm

Explicação

Questão 3 de 96

1

A(n) ____ is one that encrypts a digital data stream one bit or one byte at a time

Selecione uma das seguintes:

  • stream cipher

  • symmetric cipher

  • none of the statements

  • asymmetric cipher

  • block cipher

Explicação

Questão 4 de 96

1

A pair of keys that have been selected so that if one is used for encryption the other is used for decryption in public key cryptosystem

Selecione uma das seguintes:

  • public and private keys

  • public and cipher keys

  • encryption and decryption keys

  • none of the statements

  • plain and cipher keys

Explicação

Questão 5 de 96

1

Free from mistake or error and having the value that the end-user expects

Selecione uma das seguintes:

  • Accuracy

  • Authenticity

  • Confidentiality

  • Availability

  • Authentication

Explicação

Questão 6 de 96

1

Which of these is possibly the worst password that user can choose

Selecione uma das seguintes:

  • Nursulatan1612

  • k@zaKh

  • a$tana8567

  • aLm4tyc?TY

  • none of the statements

Explicação

Questão 7 de 96

1

What is plaintext?

Selecione uma das seguintes:

  • the original intelligible message or data that is fed into the algorithm as input

  • the original intelligible message or data that is produced as output

  • none of the statements

  • the scrambled message produced as output

  • the scrambled message or data that is fed into the algorithm as output

Explicação

Questão 8 de 96

1

Which of the following statement is not true?

Selecione uma das seguintes:

  • The public key is kept secret while the private key may be widely distributed

  • Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys

  • The public key and private key are mathematically related

  • The private key cannot be practically derived from the public

  • Asymmetric cryptography is also known as public key cryptography

Explicação

Questão 9 de 96

1

A function that is easily computed and the calculation of its inverse is infeasible unless certain privileged information is known

Selecione uma das seguintes:

  • Trapdoor one-way function

  • Virus

  • Logical Bomb

  • Trojan Horse

  • Worm

Explicação

Questão 10 de 96

1

What is encryption algorithm

Selecione uma das seguintes:

  • performs various substitutions and transformations on the plaintext

  • it takes the ciphertext and the secret key and produces the original plaintext

  • the scrambled message produced as output

  • performs various substitutions and transformations on the ciphertext

  • random stream of data and, as it stands, is unintelligible

Explicação

Questão 11 de 96

1

Which of the statement is property for p and q

Selecione uma das seguintes:

  • p and q are prime

  • p is greater than q

  • p and q should be of similar bit length

  • p and q are distinct

  • p - q -1

Explicação

Questão 12 de 96

1

DMZ what is one advantage of setting up a DMZ with two firewalls

Selecione uma das seguintes:

  • you can control where traffic goes in the three networks

  • you can do stateful packet filtering

  • you can do load balancing

  • improved network performance

  • all of the statements

Explicação

Questão 13 de 96

1

Program that can replicate itself and send copies from computer to computer across network connections. usually performs some unwanted function

Selecione uma das seguintes:

  • worm

  • trojan house

  • virus

  • logical bomb

  • opsec

Explicação

Questão 14 de 96

1

In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of p and q?

Selecione uma das seguintes:

  • p = 5, q = 7

  • p = 1, q = 35

  • p = q = e =5

  • p = 6, q = 8

  • p = q = n = 35

Explicação

Questão 15 de 96

1

Preencha o espaço em branco para completar o texto.

Encrypt the message WELCOME! Using Caesar cipher with the key = 34’

Explicação

Questão 16 de 96

1

Which of the following is form of malware

Selecione uma das seguintes:

  • all of the statements are correct

  • rootkits

  • viruses

  • worms

  • scripts

Explicação

Questão 17 de 96

1

Which of the following is not true?

Selecione uma das seguintes:

  • A user must protect his/her public key

  • A user does not have to protect his/her public key

  • A user will have his/her own public key

  • A user will have his/her own private key

  • A user must remember his/her password that encrypts the public key

Explicação

Questão 18 de 96

1

Which of these statements is true

Selecione uma das seguintes:

  • In symmetric key cryptography the key that is used to encrypt data is the same key that is used to decrypt it

  • The encryption algorithm performs its steps using the key to alter the ciphertext and convert it to plaintext

  • The term "key" comes from the fact that the password you can choose works in the same way that a conventional key works

  • In cryptography, to protect the contents of your files, you can install a lock on your door

  • The decryption algorithm performs its steps using the key to alter the plaintext and convert it to ciphertext

Explicação

Questão 19 de 96

1

The _________ is a number or a set of numbers on which the cipher operates

Selecione uma das seguintes:

  • key

  • plaintext

  • cipher

  • secret

  • ciphertext

Explicação

Questão 20 de 96

1

embedded in a computer program that checks for a certain set of conditions to be present on the system. When these conditions are met, it executes some function resulting in unauthorized actions

Selecione uma das seguintes:

  • Logic bomb

  • Worm

  • OPSEC

  • Trojan House

  • Virus

Explicação

Questão 21 de 96

1

The quality of state of having ownership or control of some object or item

Selecione uma das seguintes:

  • possession

  • confidentiality

  • integrity

  • utility

  • authentication

Explicação

Questão 22 de 96

1

Which one of the statement is a formula to find plain in RSA

Selecione uma das seguintes:

  • M = c^d(mod n)

  • M = c^n(mod d)

  • M = c^e(mod n)

  • M = c^e(mod d)

  • M = c^n(mod e)

Explicação

Questão 23 de 96

1

One objective of cryptography is property of being accessible and usable upon demand by an authorized entity

Selecione uma das seguintes:

  • availability

  • denial of service

  • confidentiality

  • reliability

  • authentication

Explicação

Questão 24 de 96

1

The vigenere cipher is which of the following types

Selecione uma das seguintes:

  • polyalphabetic

  • monoalphabetic

  • none of the statements

  • asymmetric

  • diaplhabetic

Explicação

Questão 25 de 96

1

The word asymmetric in public key cryptography means

Selecione uma das seguintes:

  • The key to encrypt is different to the key to decrypt

  • The algorithm to encrypt is different from the algorithm to decrypt

  • None of the listed answers

  • The key to encrypt is the same with the key to decrypt

  • The algorithm to encrypt is the same with the algorithm to decrypt

Explicação

Questão 26 de 96

1

A _________ cipher replaces one character with another character.

Selecione uma das seguintes:

  • Substitution

  • Transposition

  • Reversing

  • Cultivation

  • Multiplication

Explicação

Questão 27 de 96

1

Which one of the statement is a formula to find cipher in RSA

Selecione uma das seguintes:

  • C =m^e(mod n)

  • C =m^n(mod d)

  • C =m^d(mod n)

  • C =m^n(mod e)

  • C =m^e(mod d)

Explicação

Questão 28 de 96

1

In the rsa key the public key of a given user is e=31, n=3599. What is the value of p and q

Selecione uma das seguintes:

  • P= 61, Q= 59

  • P= 1, Q= 3599

  • P= Q = N= 3599

  • P= Q= E = 31

  • P= 62, Q= 60

Explicação

Questão 29 de 96

1

Preencha o espaço em branco para completar o texto.

Find d using rsa algorithm, if p = 5, q= 11, e = 3; M = 9

Explicação

Questão 30 de 96

1

Preencha o espaço em branco para completar o texto.

In a public – key system using rsa you intercept the ciphertext C = 10 sent to a user whose public key is e = 5 ; n = 35 what is the fi(n)?

Explicação

Questão 31 de 96

1

Which of the following statement is properties of public key encryption

Selecione uma das seguintes:

  • the sender and receiver must each have one of the matched pair of keys(not the same one)

  • one algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption

  • one of the two keys must be kept secret

  • the sender and receiver must share the algorithm and the key

  • the same algorithm with the same key is used for encryption and decryption

Explicação

Questão 32 de 96

1

If a wrong key is entered to decrypt a message what will happen

Selecione uma das seguintes:

  • The output will be gibberish

  • The output will not be visible

  • There is an error message

  • The cryptosystem will stop working

  • Nothing will happen

Explicação

Questão 33 de 96

1

A ___ - level proxy inspects the entire packet and makes access decisions based on the contents of the packet

Selecione uma das seguintes:

  • Application

  • Physical

  • Server

  • Proxy

  • Circuit

Explicação

Questão 34 de 96

1

One objective of cryptography is keeping information secret from all but those who are authorised to see it. The term referring to this is:

Selecione uma das seguintes:

  • Confidentiality

  • Secrecy

  • Witnessing

  • Authorisation

  • Anonymity

Explicação

Questão 35 de 96

1

Preencha o espaço em branco para completar o texto.

One of the keys used in an asymmetric encryption system. The public key is made public to be used in conjunction with a corresponding private key

Explicação

Questão 36 de 96

1

A program that secretly takes over another internet attached computer and then uses that computer to lunch attacks that are difficult to trace to the creator

Selecione uma das seguintes:

  • Zombie

  • Virus

  • Logical Bomb

  • OPSEC

  • Worm

Explicação

Questão 37 de 96

1

According to DAD triad, _______ attempts to defeat availability

Selecione uma das seguintes:

  • Destruction

  • Availability

  • Disclosure

  • Alteration

  • Confidentiality

Explicação

Questão 38 de 96

1

The process of verifying and identify claimed by or for a system entity

Selecione uma das seguintes:

  • Authentication

  • Timestamping

  • Confirmation

  • Processing

  • Validation

Explicação

Questão 39 de 96

1

______ is a form of cryptosystem in which encryption and decryption are performed using two different keys one a public key and one a private key

Selecione uma das seguintes:

  • Asymmetric encryption

  • Symmetric encryption

  • Synchronous encryption

  • None of the statements

  • Asynchronous encryption

Explicação

Questão 40 de 96

1

One objective of cryptography is conveyance, to another entity, of official sanction to do or be something. The term referring to this is:

Selecione uma das seguintes:

  • Authorisation

  • Entity authentication

  • Validation

  • Certificate

  • Confirmation

Explicação

Questão 41 de 96

1

Preencha o espaço em branco para completar o texto.

If the encrypted message is XBPG and deciphered text is QUIZ using the Caesar cipher, what is the value of key

Explicação

Questão 42 de 96

1

A pair of key that have been selected so that if one is used for encryption, the other is used for decryption in Public-key cryptosystem

Selecione uma das seguintes:

  • public and private keys

  • plain and cipher keys

  • none of the statements

  • public and cipher keys

  • encryption and decryption keys

Explicação

Questão 43 de 96

1

Set of hacker tools after attacker has broken into a computer system and gained root-level access

Selecione uma das seguintes:

  • rootkits

  • root-level hack

  • assets

  • zombie

  • virus

Explicação

Questão 44 de 96

1

Which of the following statement is ingredients for a public key encryption scheme

Selecione uma das seguintes:

  • all of the statements

  • encryption/decryption algorithm

  • plaintext

  • public/private keys

  • ciphertext

Explicação

Questão 45 de 96

1

In a public-key system using RSA you intercept the ciphertext C = 10 sent to a user whose public key is e = 5; n = 35. What is the value of p and q?

Selecione uma das seguintes:

  • P=5; q=7

  • P=6; q=8

  • P=q=e=5

  • P=1; q=35

  • p = q= n = 35

Explicação

Questão 46 de 96

1

which of the following statement is not true

Selecione uma das seguintes:

  • the public key can be used to derive the private key

  • the foundation of public-key algorithm is a one way function

  • all of the listed answers are true

  • the private key operates as a trap door that allows the owner to recover the original data

  • reversing the process of encryption is virtually impossible without the private key

Explicação

Questão 47 de 96

1

Consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security

Selecione uma das seguintes:

  • virtual private network

  • demilitarized zone

  • anti-spoofing

  • firewalls

  • network address translation

Explicação

Questão 48 de 96

1

you can use _________ to protect your computer from outsiders

Selecione uma das seguintes:

  • antivirus software and personal firewall programs

  • system restore and antivirus software

  • personal firewall programs and system restore

  • antivirus software and the Recycle Bin

  • firewall programs and the Recycle Bin

Explicação

Questão 49 de 96

1

One objective of cryptography is ensuring information has not been altered by unauthorised or unknown means. The term referring to this is:

Selecione uma das seguintes:

  • data integrity

  • message authentication

  • confirmation

  • authorisation

  • validation

Explicação

Questão 50 de 96

1

Preencha o espaço em branco para completar o texto.

encrypt the message WELCOME! Using Caesar cipher with the key = 5

Explicação

Questão 51 de 96

1

A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption

Selecione uma das seguintes:

  • Symmetric encryption

  • One key encryption

  • Private key encryption

  • Asymmetric encryption

  • Same key encryption

Explicação

Questão 52 de 96

1

Preencha o espaço em branco para completar o texto.

In a public key system using RSA you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n =35. What will be the fi(n)?

Explicação

Questão 53 de 96

1

A secret data value usually a character string that’s used as authentication information

Selecione uma das seguintes:

  • password

  • secret key

  • key

  • OPSEC

  • DMZ

Explicação

Questão 54 de 96

1

code embedded within a program that causes a copy of itself to be inserted in one of more other programs. Usually performs some unwanted function

Selecione uma das seguintes:

  • virus

  • zombie

  • all of the statements

  • worm

  • firewall

Explicação

Questão 55 de 96

1

Preencha o espaço em branco para completar o texto.

In public-key system using rsa, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M

Explicação

Questão 56 de 96

1

Secret undocumented entry point into a program, used to grant access without normal methods of access authentication

Selecione uma das seguintes:

  • Trapdoor

  • Virus

  • Trojan Horse

  • Logic Bomb

  • Worm

Explicação

Questão 57 de 96

1

One objective of cryptography is identifying and acknowledging the identity of entity. The term referring to this is:

Selecione uma das seguintes:

  • identification

  • message authentication

  • confirmation

  • validation

  • witnessing

Explicação

Questão 58 de 96

1

Preencha o espaço em branco para completar o texto.

Decipher the ciphertext QMHXIVQ using Caesar Cipher with the key = 4

Explicação

Questão 59 de 96

1

Weakness of a system that could be accidentally or intentionally exploited to damage assets

Selecione uma das seguintes:

  • Vulnerabilities

  • DMZ

  • Risk

  • Treats

  • Assets

Explicação

Questão 60 de 96

1

Some _____ firewalls are able to examine the contents of packets as well as the headers for signs that they ate legitimate.

Selecione uma das seguintes:

  • Stateful

  • Personal

  • Stateless

  • Boundary

Explicação

Questão 61 de 96

1

provides a user with protection against discovery and misuse of his or her identity by other users

Selecione uma das seguintes:

  • privacy

  • misuse

  • identification

  • ptotection

  • all of the statements

Explicação

Questão 62 de 96

1

Preencha o espaço em branco para completar o texto.

Use the playfair cipher with the keyword “PLAYFAIR” to encrypt the message “GOTO”

Explicação

Questão 63 de 96

1

Preencha o espaço em branco para completar o texto.

In a public key system using rsa you intercept the ciphertext C = 10 sent to user whose public key is e = 5; n = 35. What is the value of d?

Explicação

Questão 64 de 96

1

Base elements of information such as numbers, letters, symbols and so on which are processed or carried out by human (or by some machine)

Selecione uma das seguintes:

  • Data

  • Context

  • Bytes

  • Information

  • Bits

Explicação

Questão 65 de 96

1

What does firewall do

Selecione uma das seguintes:

  • Protects your computer from internet intrusion

  • Restores lost data on your computer

  • Checks floppy or CDs for corrupted files

  • Scans for viruses on your system

  • Protects against power surges

Explicação

Questão 66 de 96

1

Preencha o espaço em branco para completar o texto.

Perform decryption using the rsa algorithm if p = 5; q = 11, e = 3; c =14

Explicação

Questão 67 de 96

1

Which of the statement is true

Selecione uma das seguintes:

  • The larger the key size the greater the range of possible values a key can be

  • The larger the key size the smaller the range of possible values a key can be

  • The larger the key size the range of possible values a key can be remains the same

  • The smaller the key size the greater the range of possible values a key can be

  • The smaller the key size the range of possible values a key can be remains the same

Explicação

Questão 68 de 96

1

What of the following statements is true

Selecione uma das seguintes:

  • Public key algorithms are slow compared to symmetric cryptography

  • None of the listed answers

  • Public key algorithms are used to hash the password

  • Public key algorithms are used to encrypt the message

  • Public key algorithms are used to encrypt the key encryption key

Explicação

Questão 69 de 96

1

what is decryption algorithm

Selecione uma das seguintes:

  • takes the ciphertext and the secret key and produces the original plaintext

  • none of the statements are true

  • the original intelligible message or data that is fed into the algorithm as input

  • the scrambled message produced as output

  • performs various substitutions and transformations on the plaintext

Explicação

Questão 70 de 96

1

A stateful firewall maintains a ______ , which is a list of active connections

Selecione uma das seguintes:

  • State table

  • Connection table

  • Hub table

  • Routing table

  • Bridging table

Explicação

Questão 71 de 96

1

Possibility of an incident or attack to cause damage to your enterprise

Selecione uma das seguintes:

  • Risk

  • Virus

  • Security

  • Assets

  • Malware

Explicação

Questão 72 de 96

1

According to dad triad, _______ attempts to defeat confidentiality

Selecione uma das seguintes:

  • disclosure

  • alteration

  • confidentiality

  • availability

  • destruction

Explicação

Questão 73 de 96

1

Preencha o espaço em branco para completar o texto.

Find d using rsa algorithm, if p = 3, q= 11, e = 7; M = 5

Explicação

Questão 74 de 96

1

According to dad triad, _______ attempts to defeat integrity

Selecione uma das seguintes:

  • Alteration

  • Confidentiality

  • Availability

  • Destruction

  • Disclosure

Explicação

Questão 75 de 96

1

One objective of cryptography is prevention of authorized access to resources or the delaying of time-critical operations

Selecione uma das seguintes:

  • Denial of service

  • Confidentiality

  • Availability

  • Authentication

  • Reliability

Explicação

Questão 76 de 96

1

A public key encryption algorithm based on exponentiation in modular arithmetic. It is the only algorithm generally accepted as practical and secure for public key encryption

Selecione uma das seguintes:

  • RSA

  • Caesar cipher

  • Playfair Cipher

  • Vigenere Cipher

  • Hill Cipher

Explicação

Questão 77 de 96

1

Which of the following statements are types of firewalls?

Selecione uma ou mais das seguintes:

  • Application level gateways

  • Packet – filtering

  • Circuit-level gateways

  • Session-level gateways

  • Internet-level gateways

Explicação

Questão 78 de 96

1

Preencha o espaço em branco para completar o texto.

What will be the value of key in Caesar Cipher if initially key = 65

Explicação

Questão 79 de 96

1

The key used in a symmetric encryption system. Both participants must share the same key and this key must remain secret to protect communication

Selecione uma das seguintes:

  • Secret key

  • Symmetric key

  • Public key

  • Private key

  • Asymmetric key

Explicação

Questão 80 de 96

1

if you encrypt a ciphertext using right key, you will get

Selecione uma das seguintes:

  • gibberish

  • ciphertext

  • plaintext

  • error message

  • key

Explicação

Questão 81 de 96

1

Which one of the statement is equation for fi(n)?

Selecione uma das seguintes:

  • Fi(n) = (p-1)(q-1)

  • Fi(n) = (p-1)(q)

  • Fi(n) = (p-q)(q-1)

  • Fi(n) = pq

  • Fi(n) = (p)(q-1)

Explicação

Questão 82 de 96

1

Which of the following statement(s) is(are) the Security Principles

Selecione uma das seguintes:

  • All of the statements

  • Separation of privileges

  • Least privilege

  • Defense in depth

  • Security through obscurity (the inadvisability thereof)

Explicação

Questão 83 de 96

1

Preencha o espaço em branco para completar o texto.

In a public key system using RSA you intercept the plaintext M=25 sent to user whose public key is e = 5; n =35. What will be the ciphertext C?

Explicação

Questão 84 de 96

1

The Caesar cipher is a _______ cipher that has a key of 3

Selecione uma das seguintes:

  • Shift

  • Transposition

  • Additive

  • Subtractive

  • Multiplicative

Explicação

Questão 85 de 96

1

Secret undocumented entry point into a program, used to grant access without normal methods of access authentication

Selecione uma das seguintes:

  • Trapdoor

  • Virus

  • Worm

  • Trojan Horse

  • Logic Bomb

Explicação

Questão 86 de 96

1

Preencha o espaço em branco para completar o texto.

One of the two keys used on an asymmetric encryption system. For secure communication, the private key should only be known to its creator

Explicação

Questão 87 de 96

1

Which of these is not considered as a symmetric key algorithm

Selecione uma das seguintes:

  • rsa

  • playfair cipher

  • hill cipher

  • caesar cipher

  • vigenere cipher

Explicação

Questão 88 de 96

1

The quality of state of being genuine or original rather than a reproduction or fabrication

Selecione uma das seguintes:

  • Authenticity

  • Availability

  • Authentication

  • Confidentiality

  • Accuracy

Explicação

Questão 89 de 96

1

Preencha o espaço em branco para completar o texto.

Perform encryption using the rsa algorithm if p = 3 q= 11 e = 7 M = 5

Explicação

Questão 90 de 96

1

A process of identifying, analysing and controlling critical information

Selecione uma das seguintes:

  • OPSEC

  • Firewall

  • Scanning

  • DMZ

  • Anti-virus

Explicação

Questão 91 de 96

1

____ is another term for a packet of digital information

Selecione uma das seguintes:

  • datagram

  • data

  • bits

  • header

  • footer

Explicação

Questão 92 de 96

1

________ is the science and art of transforming messages to make them secure and immune to attacks

Selecione uma das seguintes:

  • Cryptography

  • Cryptosystem

  • None of the statements

  • Cryptoanalysis

  • Confidentiality

Explicação

Questão 93 de 96

1

Which of the statement(s) is(are) properties for p an q

Selecione uma das seguintes:

  • p an q are prime

  • p an q are distinct

  • p = q -1

  • p is greater than q

  • p and q should be of similar bit length

Explicação

Questão 94 de 96

1

Preencha o espaço em branco para completar o texto.

The translation of encrypted text or data (called ciphertext) into original text or data (called plaintext). Also called deciphering

Explicação

Questão 95 de 96

1

Which of these is not considered as a symmetric key algorithm

Selecione uma das seguintes:

  • RSA

  • Hill Cipher

  • Playfair Cipher

  • Caesar cipher

  • Vigenere Cipher

Explicação

Questão 96 de 96

1

A combination of an encryption algorithm and decryption is called a _____

Selecione uma das seguintes:

  • Cipher

  • Key

  • Polyalphabetic cipher

  • Secret

  • Substitution

Explicação