#2 Information security and data protection

хомяк убийца
Quiz by хомяк убийца, updated more than 1 year ago
865
21
0

Description

- at Quiz on #2 Information security and data protection, created by хомяк убийца on 05/13/2018.

Resource summary

Question 1

Question
This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Answer
  • Conditional access
  • Authentication
  • Identification
  • Anonymizer
  • Authorization

Question 2

Question
In the original description, the Diffie-Hellman exchange by itself does not provide ____ of the communicating parties and is thus vulnerable to a man-in-the-middle attack
Answer
  • Password
  • Two factor authentication
  • Security token
  • Authentication

Question 3

Question
Why would reusing a ticket as a replay attack is Kerberos not be successful?
Answer
  • The tickets are encrypted
  • The tickets are digitally signed
  • The tickets are used a token
  • The tickets are time stamped

Question 4

Question
What is Man in the middle attack?
Answer
  • The attackers catch our employee in the middle of them and start applying physical pressure on them
  • The attacker (man) hides inside (in the middle of) a crowd to sneak past the guards and cameras
  • The hacker jacks in a network and records all the information sent over the network

Question 5

Question
What is encryption strength is based on? Please select the best answer
Answer
  • The strength of the algorithm, the length of the key, and the secrecy of the key
  • The length of the key, the type of algorithm, and the strength of the key
  • The privacy of the key, the length of the algorithm, and the strength of the key
  • The strength of the key, the length of the algorithm, and the privacy of the key

Question 6

Question
One form of ‘something you have’ is the _____ and USB tokens
Answer
  • Fingerprint
  • Tokens
  • Identification
  • Password
  • Digital signatures

Question 7

Question
The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as (Please select the best answer)
Answer
  • Password authentication
  • Physical authentication
  • Fingerprint authentication
  • Biometric authentication

Question 8

Question
What is a good way to make users in a network safer in the internet
Answer
  • Get a slow connection so they cannot download too much
  • Deny all internet access
  • All of the above
  • None of the above
  • Set up a filtering proxy server so you can check all the incoming traffic

Question 9

Question
When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a
Answer
  • It is known as the Man in the middle attack
  • It is known as the TCP/IP spoofing attack
  • It is known as the Back door attack
  • It is known as the Replay attack

Question 10

Question
In which of the following attack does the attacker capture a portion of the communication between two parties, modifies it, and inserts
Answer
  • Man-in-the-middle attack
  • Spoofing
  • Sniffing
  • Denial-of-service

Question 11

Question
A password represents
Answer
  • Something you have
  • None of the above
  • Something you are
  • Something you know
  • All of the above

Question 12

Question
List the main aspects of information security: I. Confidentiality II. Integrity III. Availability IV. Consistency
Answer
  • I-III-IV
  • I-III
  • I-II-III
  • I only
  • II-III-IV

Question 13

Question
Which of the following describes the challenge-response
Answer
  • A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number)
  • A workstation or system that generates a random ID that the user enters when prompted along with the proper PIN (Personal Identification Number)
  • A special hardware device that is used to generate random text in a cryptography system
  • The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.

Question 14

Question
Consider the Diffie-Hellman scheme with a common prime p=7 and primitive root (generator) g=3 if the user A has private key XA = 3, what is A’s public key RA?
Answer
  • 6
  • 8
  • 9
  • 16

Question 15

Question
Suppose Bob wants to send a secret message to Alice using public key cryptography. Then Bob should
Answer
  • Encrypt the message with Alice’s public key and send Alice the message
  • Encrypt the message with Alice’s private key and send the encrypted message to Alice
  • Encrypt the message with his public key and send Alice the message
  • Encrypt the message with his private key and send the encrypted message to Alice

Question 16

Question
Suppose Bob wants to send Alice a digital signature for the message m. To create the digital signature
Answer
  • Bob applies a hash function to m and then encrypts the result with his private key
  • Bob applies a hash function to m and then encrypts the result with his public key
  • Bob applies a hash function to m and then encrypts the result with Alice’s public key
  • Bob encrypts m with his private key and then applies a hash function to the result

Question 17

Question
Suppose Alice receives from Bob a message m along with a digital signature for the message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Answer
  • Applies Bob's public key to the digital signature, applies the has function to m, and compares the results of the two operations;
  • Applies Bob's public key to the digital signature, then a de-hashing function to the result. She then compares the results of this last operation with the message m;
  • Applies a de-hashing function to the digital signature and compare the result to m;
  • No correct answer;

Question 18

Question
Suppose a CA contains Bob's certificate, which binds Bob's public key to Bob. This certificate is signed with
Answer
  • The CA's private key
  • Bob’s public key
  • The CA's public key
  • Bob’s private key

Question 19

Question
A well designed and configured ____ is like having a single point of entry into your building with a security guard at the door allowing only authorized personnel into the building.
Answer
  • Network Adapter
  • Antivirus Software
  • Intrusion Detection System
  • Firewall

Question 20

Question
Which security action should be finished before access is given to the network?
Answer
  • Identification and authorization
  • Identification and authentication
  • Authentication and authorization
  • Authentication and password

Question 21

Question
Which of the following types of encryption would BEST to use for a large amount of data?
Answer
  • Asymmetric
  • Symmetric
  • RSA
  • Hash

Question 22

Question
Which statement correctly describes the difference between a secure cipher and a secure hash?
Answer
  • A hash produces a variable output for any input size; a cipher does not.
  • A cipher can be reversed; a hash cannot.
  • A cipher produces the same size output for any input size; a hash does not.

Question 23

Question
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.
Answer
  • Decryption
  • Cryptanalysis
  • Cryptography
  • Brute force cracking

Question 24

Question
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Answer
  • Auditability
  • Availability
  • Integrity
  • Confidentiality

Question 25

Question
Which of the following appears when an asset of the system become lost, unavailable or unusable?
Answer
  • Interception
  • Interruption
  • Interpretation
  • Modification
  • Fabrication

Question 26

Question
Show incorrect kind of threats
Answer
  • Interception
  • Interruption
  • Interpretation
  • Modification
  • Fabrication

Question 27

Question
Bock cipher maps each plaintext block to :
Answer
  • Same length cipher text block
  • Different length cipher text block
  • The same letter
  • No answer

Question 28

Question
What is vulnerability?
Answer
  • A weakness in the security system
  • A Method which uses flaws to have more access, privileges or resources to the system
  • A method which used to eliminate or reduce threats
  • A kind of auth to system

Question 29

Question
A(n) _____ application monitors all incoming and outgoing network traffic and block unauthorized packets from getting through
Answer
  • Antivirus
  • Intrusion Detection System (IDS)
  • Personal Firewall
  • Network Monitor

Question 30

Question
What is assumed by cipher in cryptography ?
Answer
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Question 31

Question
What is assumed by ciphertext in cryptography?
Answer
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Question 32

Question
What is assumed by plaintext in cryptography?
Answer
  • Algorithm for performing encryption and decryption
  • Encrypted message
  • None of mentioned
  • Raw message
  • All of mentioned

Question 33

Question
In cryptography, what is key?
Answer
  • Info used to cipher, known only to sender and receiver
  • Algorithm for transforming plaintext to ciphertext
  • Encrypted message
  • Recovering plaintext from ciphertext
  • Converting plaintext to ciphertext

Question 34

Question
What is cryptoanalysis?
Answer
  • Study of principles/methods deciphering ciphertext without knowing key
  • Info used to cipher, known only to sender and receiver
  • Algorithm for transforming plaintext to ciphertext
  • Recovering plaintext from ciphertext
  • Converting plaintext to ciphertext

Question 35

Question
In asymmetric key cryptography, the public key for decryption is kept by:
Answer
  • Sender
  • Receiver
  • Sender and receiver
  • Everyone in the network
  • All the connected devices to the network

Question 36

Question
Which of these are threats against to modern computer?
Answer
  • Network attacks, firewall and worms
  • Viruses, worms and encryption
  • Network attacks, viruses and worms
  • Viruses, network encryptions and worms

Question 37

Question
How the industry solves the threats ?
Answer
  • Firewall, IDS, Kerberos, blogs
  • IDS, firewall, authentication, policies
  • Virus, worms, attacks, web-sites
  • Network attacks, IDS, worms, virus

Question 38

Question
Which one of the following algorithm is not used in asymmetric key cryptography?
Answer
  • RSA algorithm
  • Diffle-Hellman algorithm
  • DES algorithm
  • DSA algorithm

Question 39

Question
In cryptography, the order of the order of the letters in a message in rearranged by
Answer
  • Transpositionalcip ciphers
  • substitution ciphers
  • All kinds of the ciphers
  • None of the mentioned

Question 40

Question
What is data encryption standard (DES)?
Answer
  • Block cipher
  • stream cipher
  • bit cipher
  • none of the mentioned

Question 41

Question
Cryptanalysis is used:
Answer
  • To find some insecurity in cryptographic scheme
  • to increase the speed
  • to encrypt the data
  • none of the mentioned

Question 42

Question
Cryptographic hash function takes an arbitrary block of data and returns
Answer
  • Fixed site bit string
  • variable size bit string
  • none of the mentioned
  • both of the mentioned

Question 43

Question
A substitution cipher substitutions one symbol with
Answer
  • Keys
  • Others
  • Multi Parties
  • Single Party

Question 44

Question
An asymmetric-key(or public key ) cipher uses
Answer
  • 1 key
  • 2 key
  • 3 key
  • 4 key

Question 45

Question
In the computer industry the “What you have” method is use of?
Answer
  • Passwords
  • Smart cards
  • Digital certificates’

Question 46

Question
A smartcard represents
Answer
  • None of the above
  • Something you are
  • All of the above
  • Something you have
  • Something you know

Question 47

Question
Convert one symbol of plaintext immediately into a symbol of cipher text (example:Caesar cipher)
Answer
  • Encryption
  • Plaintext
  • Block cipher
  • stream ciphers

Question 48

Question
Interruption is
Answer
  • Asset lost, unusable, unavailable
  • Unauthorized access
  • Unauthorized change, tamper of data
  • Ex. Unauthorized add data to a DB

Question 49

Question
Modification is
Answer
  • Unauthorized change, tamper of data
  • Asset lost, unusable, unavailable
  • Unauthorized access
  • Ex. Unauthorized add data to a DB

Question 50

Question
Which are the examples of DEFENCE?
Answer
  • Firewalls, router access control list, spam filters, virus scanners
  • Employee communication, policy on company Intranet
  • Audit logs, intrusion detection system, network traffic monitoring
  • Network attacks, IDS, worms, virus

Question 51

Question
Which are the examples of DETERRENCE?
Answer
  • Employee communication, policy on company Intranet
  • Firewalls, router access control list, spam filters, virus scanners
  • Audit logs, intrusion detection system, network traffic monitoring
  • Network attacks, IDS, worms, virus

Question 52

Question
Which are the examples of DETECTION?
Answer
  • Audit logs, intrusion detection system, network traffic monitoring
  • Employee communication, policy on company Intranet
  • Firewalls, router access control list, spam filters, virus scanners
  • Network attacks, IDS, worms, virus

Question 53

Question
What is encryption?
Answer
  • Is the process of encoding a message so that its meaning is not obvious
  • Is the reverse process, transforming an encrypted message back into its normal, original form
  • Is the process of preventing any attacks from the hackers

Question 54

Question
In password protection, this is a random string of data or number used to modify a password hash
Answer
  • Nonce
  • Ssl
  • One time password
  • Secret key
  • Public key

Question 55

Question
Using public key cryptography suppose Bob wants to send a secret message to Alice and Alice wants to be sure that the message was indeed sent by Bob. Then Bob should:
Answer
  • Encrypt the message with his private key, encrypt the result with Ailce’s public key and then send Alice the message
  • • Encrypt the message with his private key , encrypt yhe result with alices’ private key, and then send Alicce the message
  • • Encrypt the message with his public key, encrypt the result with Alice’s public key, and then send Alice the message

Question 56

Question
Which statement correctly describes the difference between a secure cipher and a secure hash?
Answer
  • Cipher can be reversed, hash cannot
  • A hash can be reversed, a cipher cannot
  • A hash production a variable output fot any input size, a cipher does not
  • A cipher produces the same size output for any input size, a hash does not

Question 57

Question
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies
Answer
  • • Brute force cracking
  • • Decryption
  • • Cryptoanalysis
  • • Cryptography

Question 58

Question
A well designed and configured _____ is like having single point of entry into your building with a security guard at the door allowing only authorized personnel into the building
Answer
  • Firewall
  • Network adapter
  • Antivirus software
  • Intrusion detection system

Question 59

Question
Suppose a CA contains Bob’s certificate, which binds Bob’s public key to Bob. This certificate is signed with
Answer
  • The CA’s private key
  • Bobs public key
  • The CAs public key
  • Bobs private key

Question 60

Question
Suppose Alice receives from Bob a message m with digital signature for one message m. To verify that the message was not changed and that Bob indeed sent the message, Alice
Answer
  • Applies Bob’s public key to the digital signature applies to the hash function to m, and compares the results of the two operations.
  • Applies bobs public key to the digital signature, then a de-hashing function to the result. She then compares the result of this operation with the message m
  • Applies a de-hashing function to the digital signature and compares the result m
  • No correct answer
Show full summary Hide full summary

Similar

Tricky words: Set one
barrie edmonds
Present continuos tense
anama_gordillo
DELIVERING AT PACE
Natalie West
UNIT 1
missbotch
ANTT
Gaffer Ji
Untitled
atanuroy505
Phrasel Verb (Prepositions IN, ON, UP and AT)
Dmitriy Lagutin
Preposition
jizaco0508
Reisinger
Yochanan reis
LOGARITHMS
pelumi opabisi