Information security and data protection

хомяк убийца
Quiz by , created over 1 year ago

- at Quiz on Information security and data protection, created by хомяк убийца on 05/12/2018.

1353
30
0
Tags No tags specified
хомяк убийца
Created by хомяк убийца over 1 year ago
Untitled
atanuroy505
Phrasel Verb (Prepositions IN, ON, UP and AT)
Dmitriy Lagutin
Metal Oxides, Metal Hydroxides & Ammonia
Tom Johnson
AAHI_S2_2019_Card set 6 (Terms of movement)
Tafe Teachers SB
Tricky words: Set one
barrie edmonds
Present continuos tense
anama_gordillo
UNIT 1
missbotch
DELIVERING AT PACE
Natalie West

Question 1

Question
What is the purpose of access control list?
Answer
  • to enforce a specified security policy
  • to prevent unauthorised access to data
  • to emphasize encryption
  • it is a key distribution center

Question 2

Question
Identify definition of authentication
Answer
  • establishes the identity of a subject
  • specifies and enforces that each object is accessed correctly and only by those that are allowed to do so
  • to enforce a specified security policy
  • to emphasize encryption

Question 3

Question
What does Access Control Information cover?
Answer
  • data, resources
  • AC policy
  • functions such as grant, deny
  • decisions

Question 4

Question
What does Access Control Enforcement cover?
Answer
  • data, resources
  • AC policy
  • functions such as grant, deny
  • decisions

Question 5

Question
What does Access Control Decision Function cover?
Answer
  • data, resources
  • AC policy
  • granting and denying access
  • decisions

Question 6

Question
Define a subject of Access Control List
Answer
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Question 7

Question
Define an object of Access Control List
Answer
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Question 8

Question
How many types of resource dependent access controls exist?
Answer
  • 1
  • 2
  • 3
  • 4

Question 9

Question
How many types of access control mechanisms exist
Answer
  • 1
  • 2
  • 3
  • 4

Question 10

Question
Find an example of resource dependent access for network access
Answer
  • append
  • execute
  • redirected
  • granted

Question 11

Question
Find an example of resource dependent access for file access
Answer
  • append
  • execute
  • redirected
  • granted

Question 12

Question
Find incorrect access control goal
Answer
  • invalid operations should be permitted
  • every actions should be checked
  • unnecessary access should not be allowed
  • all the above mentioned

Question 13

Question
What is a property of the capability ticket in access control list?
Answer
  • Specifies a given subject can perform what operations on what objects
  • Subjects does not grant rights to other subjects
  • Users have only one ticket
  • Access rights given to a subject are valid for forever

Question 14

Question
What is a property of the procedure oriented objects in access control list?
Answer
  • Objects are encapsulated, permitting only certain specified accesses via program execution
  • Specifies a given subject can perform what operations on what objects
  • Access rights given to a subject are valid for forever
  • Users have only one ticket

Question 15

Question
What is a property of the procedure oriented objects in access control list?
Answer
  • Enforces accesses to an object be done through a trusted interface
  • Specifies a given subject can perform what operations on what objects
  • Access rights given to a subject are valid for forever
  • Users have only one ticket

Question 16

Question
What does multilevel security mean?
Answer
  • Classification of information by the level of importance and permission of access by users with different security clearance
  • Classification of information by date and permission of access by users with different security clearance
  • Classification of information by the level of importance and permission of access by users name
  • Classification of information by date and permission of access by users name

Question 17

Question
How many levels are covered in multilevel security
Answer
  • 1
  • 2
  • 3
  • 4

Question 18

Question
No read up (read down) means
Answer
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Question 19

Question
No write down (write up) means
Answer
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Question 20

Question
Define a malware attacks
Answer
  • Malicious software causes data compromises
  • A browser helper object that detects changes to URL and logs
  • Users are tricked by fraudulent messages into giving out information
  • The lookup of host names is altered to send users to a fraudulent server

Question 21

Question
How many types of authentication schemes exist?
Answer
  • 1
  • 2
  • 3
  • 4

Question 22

Question
Define a change cipher spec
Answer
  • All data sent/received by software that uses SSL
  • used to carry handshake messages
  • used to indicates a change in the encryption and authentication of records
  • used to indicate when the connection is about to close

Question 23

Question
Define an alert
Answer
  • All data sent/received by software that uses SSL
  • used to carry handshake messages
  • used to indicates a change in the encryption and authentication of records
  • used to indicate when the connection is about to close

Question 24

Question
Which of the following is true about importance of hash functions i. High Computational Load ii. Message Overhead iii. Security Limitations
Answer
  • i only
  • none
  • All the mentioned
  • iii only

Question 25

Question
What does “computationally infeasible to find data mapping to specific hash” mean
Answer
  • One way property
  • Collision free property
  • Second way property
  • Collision property

Question 26

Question
Which of the following is not property of hash functions?
Answer
  • One wayness
  • Preimage resistance
  • Strong collision resistance
  • Long, unfixed output

Question 27

Question
How many types of hash constructions exist?
Answer
  • 1
  • 2
  • 3
  • 4

Question 28

Question
Output length for SHA-1
Answer
  • 128
  • 160
  • 512
  • 314

Question 29

Question
Input length for SHA-1
Answer
  • 512
  • 2014
  • 160
  • 314

Question 30

Question
Which construction method support SHA?
Answer
  • Schnorr
  • Diffie-Hellman
  • Merkle-Damgard
  • Alice & Bob

Question 31

Question
How many rounds in general hold SHA-1?
Answer
  • 50
  • 60
  • 70
  • 80

Question 32

Question
How many stages hold SHA-1?
Answer
  • 1
  • 2
  • 3
  • 4

Question 33

Question
How many rounds support one stage?
Answer
  • 10
  • 20
  • 80
  • 79

Question 34

Question
Name of the function that SHA-1 use
Answer
  • Merkle-Damgard
  • Feistel
  • Schnorr
  • Diffie-Hellman

Question 35

Question
How many types of SHA exist ?
Answer
  • 1
  • 2
  • 3
  • 4

Question 36

Question
How many rounds MD5 hold in general?
Answer
  • 64
  • 80
  • 512
  • 160

Question 37

Question
Which of the following does not refer to security requirements of Hash functions?
Answer
  • Preimage resistance
  • Second preimage resistance
  • Collision resistance
  • High Computational Load

Question 38

Question
The purpose of hash function is to
Answer
  • Create a message
  • Compress a message
  • Divide a message
  • Conquer a message

Question 39

Question
How many constant keys support SHA algorithm ?
Answer
  • 1
  • 2
  • 3
  • 4

Question 40

Question
Which of the following refers requirement of digital signature?
Answer
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be computationally infeasible to forge

Question 41

Question
Which of the following refers requirement of digital signature?
Answer
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be practical to save digital signature in storage

Question 42

Question
What is the property of direct digital signature?
Answer
  • Assumed receiver has sender’s private key
  • Involves only sender
  • Can encrypt using receiver’s public key
  • Assumed sender has receiver’s private key

Question 43

Question
Which of the following does not refer to characteristics of digital signature?
Answer
  • Private/public is generated by receiver
  • A durable private/public key pair
  • A disposable private/public key pair
  • Signature is two numbers, depending on message hash and secret information

Question 44

Question
How many message authentication functions exist?
Answer
  • 1
  • 2
  • 3
  • 4

Question 45

Question
If public key encryption is used
Answer
  • Encryption provides no confidence of sender
  • Encryption provides with some level of confidence of sender
  • Encryption provides fully confidence of sender
  • Encryption does not provided at all

Question 46

Question
In public key cryptography sender signs message using their
Answer
  • Public key
  • Shared key
  • Private key
  • Third key

Question 47

Question
In public key cryptography sender signs message using their private key, then encrypts with recipient’s
Answer
  • Private key
  • Public key
  • Single key
  • Key

Question 48

Question
What is authentication?
Answer
  • The process of verifying a claimed identity
  • Identification of user
  • Access control
  • Accounting of service

Question 49

Question
Define AAA.(triple A)
Answer
  • Access After Anyone
  • Authentication Authorization Accounting
  • Authentication Authorization Access
  • Authentication Access Accounting

Question 50

Question
Which of the term refers to authorization?
Answer
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity
  • Accounting of service

Question 51

Question
Which of the term refers to accounting?
Answer
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity
  • Accounting of service

Question 52

Question
PIN, passwords refer to
Answer
  • Something you have
  • Something you know
  • Something you are
  • Combined method

Question 53

Question
Keys, soft tokens refer to
Answer
  • Something you have
  • Something you know
  • Something you are
  • Combined method

Question 54

Question
Fingerprint, iris, palm recognition refer to
Answer
  • Something you have
  • Something you know
  • Something you are
  • Combined method

Question 55

Question
Combined or multiple methods of authentication are used for
Answer
  • Lower level assurance
  • Medium level assurance
  • Higher level assurance
  • Not used at all

Question 56

Question
How many phases are exist in biometric?
Answer
  • 1
  • 2
  • 3
  • 4

Question 57

Question
When fingerprint was developed?
Answer
  • 1988
  • 1888
  • 1887
  • 1987

Question 58

Question
What is minutia ?
Answer
  • Time
  • comparisons of one print with another can be made
  • comparison of eyes
  • comparison of palms

Question 59

Question
What is TTP?
Answer
  • TTP certifies trustworthiness of binding public key with its rightful owner’s identity
  • TTP certifies trustworthiness of binding private key with its rightful owner’s
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Question 60

Question
Define X.509
Answer
  • TTP certifies trustworthiness of binding public key with its rightful owner’s identity
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Question 61

Question
Define a Kerberos
Answer
  • Trusted third party authentication system and makes no use of public key cryptography
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Question 62

Question
Which of the following does not refer for Kerberos property
Answer
  • Impeccability
  • Containment
  • Transparency
  • Viciousness
  • Подписываемся на мой инстаграм @beketoo

Question 63

Question
What is a security?
Answer
  • The protection of information assets through the use of technology, processes, and training
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit
  • Ensures that computer-related assets are accessed only by authorized parties

Question 64

Question
What is a vulnerability?
Answer
  • The protection of information assets through the use of technology, processes, and training
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attack
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit
  • Ensures that computer-related assets are accessed only by authorized parties

Question 65

Question
What is an attack?
Answer
  • The protection of information assets through the use of technology, processes, and training
  • Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks.
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit

Question 66

Question
Types of Threats
Answer
  • Interception, Interruption, Modification, Fabrication
  • Method, Opportunity, Motive
  • Confidentiality, Integrity, Availability, Authentication
  • Non-repudiation, Authorisation/Access control, Destruction

Question 67

Question
How to protect?
Answer
  • Encryption, Software control, Hardware control, Policies and Procedures,Physical control
  • Method, Opportunity, Motive
  • Confidentiality, Integrity, Availability, Authentication
  • Non-repudiation, Authorisation/Access control, Destruction

Question 68

Question
Interception is __
Answer
  • Asset lost, unusable,unavailable
  • Unauthorized access
  • Unauthorized change, tamper of data
  • Ex. Unauthorized add data to a DB

Question 69

Question
Security goals are:
Answer
  • CIA
  • CEA
  • CLA
  • CDD

Question 70

Question
Confidentiality means
Answer
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Question 71

Question
Deterrence is
Answer
  • Punishment makes attackers think twice –Examples include laws and organisational policy
  • Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
  • Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
  • Punishment by taking money

Question 72

Question
Defence is
Answer
  • Punishment makes attackers think twice –Examples include laws and organisational policy
  • Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
  • Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
  • Punishment by taking money

Question 73

Question
Detection is
Answer
  • Punishment makes attackers think twice –Examples include laws and organisational policy
  • Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
  • Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
  • Punishment by taking money

Question 74

Question
Integrity means
Answer
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Question 75

Question
Authentication means
Answer
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Question 76

Question
Non-repudiation means
Answer
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • determining the identity of entities involved in message exchanges
  • ensures that parties cannot deny having sent messages

Question 77

Question
DES stands for
Answer
  • Demand Encryption Standard
  • Data Encryption Standard
  • Digital Encryption Standard
  • Database Encryption Standard

Question 78

Question
When DES released?
Answer
  • 1977
  • 1974
  • 1960
  • 1965

Question 79

Question
Who introduced idea of substitution-permutation (S-P) networks?
Answer
  • Shannon
  • Feistal
  • Lucifer
  • Rijndael

Question 80

Question
In how many rounds DES encryption is handled?
Answer
  • 16
  • 8
  • 32
  • 4

Question 81

Question
_____ process messages in blocks, each of which is then encrypted/decrypted?
Answer
  • block ciphers
  • stream ciphers
  • mode ciphers
  • code ciphers

Question 82

Question
What is the cryptography?
Answer
  • study about how hacker should behave
  • study of encryption principles/methods
  • study about message transformation
  • study of the computer system

Question 83

Question
Which cipher is described below: “Each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.”
Answer
  • Playfair Cipher
  • Vigenere Cipher
  • Caesar Cipher
  • Kerberos

Question 84

Question
How Cryptography is divided by the way in which plaintext is processed:
Answer
  • Substitution and Transposition
  • Single-key or Private key
  • Two- key or Public
  • Block and Stream

Question 85

Question
What is the Key Matrix size in Playfair
Answer
  • 3x3
  • 4x4
  • 5x5
  • 9x9

Question 86

Question
Using the Caesar cipher decrypt this message “Vwdb kxqjub, vwdb irrolvk” (key=2)
Answer
  • Stay hungry, stay foolish
  • Never give up
  • Dance as if no one sees
  • With the great power comes great responsibility

Question 87

Question
3 Ds of Security: (DDD)
Answer
  • Defence, Deterrence, Detection
  • Data, Development, Device
  • Database, Data, Deadline
  • Demand, Design, Decision

Question 88

Question
MOM stands for ____
Answer
  • Method, Opportunity, Motive
  • Modification, Operation, Motto
  • Malfunction, Opinion, Management
  • Messages, Opportunity, Monitoring

Question 89

Question
DES is a symmetric cipher
Answer
  • True
  • False

Question 90

Question
Block size of DES
Answer
  • 256-bits
  • 128-bits
  • 64-bits
  • 32-bits

Question 91

Question
AES stands for
Answer
  • Advanced Encryption Standard
  • Advanced Encryption System
  • American Encryption Standard
  • Alias Encryption Standard

Question 92

Question
Advanced Encryption Standard(AES) also known like
Answer
  • Rassul
  • Rijndael
  • Feistel

Question 93

Question
Who introduce idea of substitution-permutation?
Answer
  • David Shannon
  • Andre Shannon
  • Petre Shannon
  • Claude Shannon

Question 94

Question
In which year was introduced idea of substitution-permutation?
Answer
  • 1949
  • 1948
  • 1950
  • 1951

Question 95

Question
What is the plaintext?
Answer
  • Original Message
  • Coded Message
  • Algorithm for transforming text
  • Secret key

Question 96

Question
What is not the model of the symmetric cipher?
Answer
  • conventional / private-key / single-key
  • sender and recipient share a common key
  • all classical encryption algorithms are private-key
  • was only type prior to invention of public- key in 1982’s

Question 97

Question
What is the Cipher ?
Answer
  • algorithm for transforming plaintext to ciphertext
  • coded message
  • original message
  • study of encryption principles/methods

Question 98

Question
What is the cryptanalysis (codebreaking ) ?
Answer
  • algorithm for transforming plaintext to cipher text
  • study of principles/methods of deciphering cipher text without knowing key
  • original message
  • study of encryption principles/methods

Question 99

Question
What is the cryptology?
Answer
  • field of both cryptography & cryptanalysis
  • original message
  • study of encryption principles/methods
  • algorithm for transforming plaintext to cipher text

Question 100

Question
What are the general approaches for Cryptanalysis?
Answer
  • cryptanalytic attack/brute force attack
  • substitution/transposition
  • permutation/transposition
  • substitution/permutation

Question 101

Question
What is Ciphertext only?
Answer
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext

Question 102

Question
How many types of threats exist?
Answer
  • 1
  • 2
  • 3
  • 4

Question 103

Question
Authorisation means
Answer
  • messages exchanged across network remains private
  • contents of messages are not modified while in transit
  • defining the identity of entities involved in message exchanges
  • determining the resources that an entities are allowed to access and in what manner

Question 104

Question
CIA means
Answer
  • Confidentiality, invalid, availability
  • Confidentiality, interact, access
  • Certain, integrity,availability
  • Confidentiality, integrity, availability

Question 105

Question
What is Threat?
Answer
  • The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks. A weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage
  • Typical threats include unauthorised access, destruction, system overrun and takeover, propagation of malicious code, data thieving and fabrication;
  • Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
  • Occurs when a system is compromised based on a vulnerability by an unknown exploit

Question 106

Question
What is ciphertext?
Answer
  • coded message
  • original message
  • algorithm for transforming plaintext to ciphertext
  • info used in cipher known only to sender/receiver

Question 107

Question
What is a key?
Answer
  • converting plaintext to ciphertext
  • recovering ciphertext from
  • info used in cipher known only to sender/receiver
  • algorithm for transforming plaintext to ciphertext

Question 108

Question
What is encipher (encrypt)?
Answer
  • study of encryption principles/methods
  • study of principles/ methods of deciphering ciphertext without knowing key
  • original message
  • converting plaintext to ciphertext

Question 109

Question
What is decipher (decrypt)?
Answer
  • converting plaintext to ciphertext
  • recovering ciphertext from plaintext
  • coded message
  • original message
  • recovering plaintext from ciphertext

Question 110

Question
Mostly used symmetric cipher
Answer
  • AES
  • DES
  • RSA
  • SHA-1

Question 111

Question
Possible length of AES key
Answer
  • 128 156 198
  • 128 192 256
  • 128 184 228
  • 128 164 256

Question 112

Question
How many stages has final round of AES?
Answer
  • 1
  • 2
  • 3
  • 4

Question 113

Question
RSA uses
Answer
  • two keys - private & publiс
  • one key - only private
  • one key - only public
  • no correct answer

Question 114

Question
What is TRUE about RSA? Each user generates a public/private key pair by:
Answer
  • selecting two large primes at random: p, q
  • selecting two small primes at random: p, q
  • selecting three large primes at random: p, q, r
  • selecting only one number at random: p

Question 115

Question
In RSA security relies on a ___ difference in difficulty between ___ (en/decrypt) and ___ (cryptanalyse) problems
Answer
  • large enough, easy, hard
  • small enough, hard, easy
  • small enough, easy, hard
  • large enough, hard, easy

Question 116

Question
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Answer
  • Data Size
  • Round Size
  • Key Size
  • Encryption Size

Question 117

Question
_______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
Answer
  • RSA
  • Karberos
  • Caesar
  • AES

Question 118

Question
In asymmetric key cryptography, the private key is kept by
Answer
  • sender
  • receiver
  • sender and receiver
  • all the connected devices to the network
  • none of these

Question 119

Question
RSA was developed by:
Answer
  • Dr.Tahir El-Gamal
  • Diffie-Hellman
  • Shannon
  • Rivest, Shamir, Adleman

Question 120

Question
Encryption by receiver with sender’s public key:
Answer
  • C = Me mod N
  • M=Cd mod N
  • Ya=Xa mod Q
  • C=Km mod Q

Question 121

Question
RSA was founded in:
Answer
  • 1975
  • 1976
  • 1977
  • 1974

Question 122

Question
Decryption by sender with sender’s public key:
Answer
  • C=Me mod N
  • M=Cd mod N
  • Ya=Xa mod Q
  • C=Km mod Q

Question 123

Question
Calculate n and φ, if p = 3, and q = 11 (RSA)
Answer
  • n = 33, φ = 20
  • n = 20, φ = 33
  • n = 33, φ = 33
  • n = 33, φ = 22

Question 124

Question
Calculate n and φ, if p = 17, and q = 11 (RSA)
Answer
  • n = 187, φ = 160
  • n = 160, φ = 187
  • n = 187, φ = 187
  • n = 187, φ = 170

Question 125

Question
Calculate C (ciphertext), if p = 3, q = 11, e = 7, M = 2 (RSA)
Answer
  • C = 29
  • C = 3
  • C = 22
  • C = 2

Question 126

Question
Calculate M (plaintext), if p = 3, q = 11, d = 3, C = 29 (RSA)
Answer
  • M = 2
  • M = 29
  • M = 30
  • M = 1

Question 127

Question
Block size of AES plaintext:
Answer
  • 192
  • 164
  • 128
  • 256

Question 128

Question
Maximum AES number of rounds:
Answer
  • 10
  • 12
  • 14
  • 16

Question 129

Question
AES size of output(output parameter):
Answer
  • 192
  • 128
  • 164
  • 256

Question 130

Question
First public-key type scheme proposed by Diffie & Hellman in
Answer
  • 1971
  • 1976
  • 1981
  • 1986

Question 131

Question
Value of key depends on the: (Diffie & Hellman)
Answer
  • Participants
  • Keys
  • Message
  • Algorithm

Question 132

Question
If Alice and Bob subsequently communicate, they will have the____ key
Answer
  • Same
  • Different
  • Private
  • Public

Question 133

Question
Which of these are true about “a public-key distribution scheme ”?
Answer
  • cannot be used to exchange an arbitrary message
  • rather it can establish a common key
  • known only to the two participants
  • all of above

Question 134

Question
When by Diffie & Hellman along with the exposition of public key concepts?
Answer
  • 1977
  • 1978
  • 1979
  • none of them

Question 135

Question
Which of them uses two keys( public and private):
Answer
  • RSA
  • Caesar
  • Vigenere
  • Playfair

Question 136

Question
A related private-key, known
Answer
  • only to the recipient
  • only to the sender
  • none of them
  • to everyone

Question 137

Question
The key must be kept secret for
Answer
  • needed security
  • encryption and decryption
  • encryption
  • decryption

Question 138

Question
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
Answer
  • man-in-the-middle
  • ciphertext attack
  • plaintext attack
  • none of the above

Question 139

Question
“Using only a subset of letters/words in a longer message marked in some way ” is__
Answer
  • Caesar Cipher
  • RSA
  • DES
  • Steganography

Question 140

Question
For which cipher an example is given: “Say hi to IITU” After encrypt “Yas ih ot UTII”
Answer
  • Playfair Cipher
  • Transposition Cipher
  • Route Cipher
  • Steganography

Question 141

Question
Polyalphabetic substitution ciphers improve security using multiple cipher alphabets
Answer
  • True
  • False

Question 142

Question
For RSA to work, value of P must be less than value of:
Answer
  • P
  • Q
  • n
  • r

Question 143

Question
In symmetric key cryptography, key used by sender and receiver is:
Answer
  • shаrеd
  • Different
  • Two keys are used
  • None

Question 144

Question
In symmetric-key cryptography, same key is used by:
Answer
  • One Party
  • Multi Party
  • Third Party
  • Both Party

Question 145

Question
RSA stands for
Answer
  • Rivеst, Shаmir,, Аdlеmаn
  • Roger, Shamir, Adrian
  • Robert, Shamir, Anthoney
  • Rivest, Shaw, Adleman

Question 146

Question
Which of them is first public-key type scheme?
Answer
  • Diffiе & Hеllmаn
  • Elgamal
  • RSA
  • AES

Question 147

Question
When Diffie & Hellman protocol was invented?
Answer
  • 1976
  • 1975
  • 1980
  • 1990

Question 148

Question
In Diffie & Hellman key exchange a public key is known only to the two participants
Answer
  • True
  • False

Question 149

Question
In Diffie & Hellman key exchange a public key is cannot be used to exchange an arbitrary message
Answer
  • True
  • False

Question 150

Question
Diffie & Hellman key exchange based on exponentiation in a finite (Galois) fields
Answer
  • True
  • False

Question 151

Question
In Diffie & Hellman protocol when the user A generates their key a secret key should be
Answer
  • XА < q
  • generated randomly
  • given by user B
  • none

Question 152

Question
Choose the correct formula for computing public key YA in Diffie & Hellman protocol
Answer
  • YА= а mod q
  • BA = a + b
  • CA = a – b
  • DA = a * b

Question 153

Question
Choose the correct formula for computing secret key K by user A in Diffie & Hellman protocol
Answer
  • K = (YА)^X А mod q
  • S = a + b
  • D = a * b
  • L = a * b + 2

Question 154

Question
Elgamal cryptography uses exponentiation in a finite (Galois) fields
Answer
  • True
  • False

Question 155

Question
In the Elgamal cryptography when the user A generates their key a secret key should be
Answer
  • 1 < XА < q-1
  • generated randomly
  • given by user
  • none

Question 156

Question
Choose the correct formula for computing public key YA in Elgamal cryptography
Answer
  • YА = аXА mod q
  • K = YАk mod q
  • K = (YА)^X А mod q
  • YА= а mod q

Question 157

Question
Choose the correct formula for computing one-time key K in Elgamal cryptography
Answer
  • K = YАk mod q
  • S = a + b + 1
  • D = a * b + 2
  • L = a * b + 3

Question 158

Question
Choose the correct formula for computing C1 in Elgamal cryptography
Answer
  • C1 = аk mod q
  • C3 = a mod b
  • C = z + 2 + 5
  • C5 = a * b +2

Question 159

Question
Choose the correct formula for computing C2 in Elgamal cryptography
Answer
  • C2 = KM mod q
  • C = MK
  • C3 = AK
  • C4 = AA

Question 160

Question
In Elgamal cryptography public key cryptosystem related to D-H
Answer
  • True
  • False

Question 161

Question
Known plaintext is...
Answer
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • Attacker selects plaintext or ciphertext to en/decrypt

Question 162

Question
Chosen plaintext is...
Answer
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • Attacker selects plaintext or ciphertext to en/decrypt

Question 163

Question
Chosen ciphertext is...
Answer
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • Attacker selects plaintext or ciphertext to en/decrypt

Question 164

Question
Chosen text is ...
Answer
  • attacker knows suspects plaintext/ciphertext
  • only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
  • attacker selects plaintext and gets ciphertext
  • attacker selects ciphertext and gets plaintext
  • attacker selects plaintext or ciphertext to en/decrypt