oku_kerek_tagy_byr_ret

Description

Computer Science Quiz on oku_kerek_tagy_byr_ret, created by Daniyar Adilkhanov on 17/05/2018.
Daniyar Adilkhanov
Quiz by Daniyar Adilkhanov, updated more than 1 year ago
Daniyar Adilkhanov
Created by Daniyar Adilkhanov almost 6 years ago
138
1

Resource summary

Question 1

Question
A message is authentic and digitally signed if sent with:
Answer
  • a message digest/hash encrypted with the receiver’s public key
  • a message digest/hash encrypted with the receiver’s private key
  • a message digest/hash encrypted with the sender’s public key
  • a message digest/hash encrypted with the sender’s private key

Question 2

Question
Which of the following issues is not addressed by Kerberos:
Answer
  • availability.
  • privacy.
  • integrity.
  • authentication.

Question 3

Question
In Asymmetric-Key Cryptography, two keys, e and d, have a special relationship to
Answer
  • Others
  • Data
  • Keys
  • Each other

Question 4

Question
Substitutional cipers are
Answer
  • Monoalphabatic
  • Semialphabetic
  • Polyalphabetic
  • None of the above
  • Both monoalphabatic and polyalphabetic

Question 5

Question
Heart of Data Encryption Standard (DES), is the
Answer
  • Cipher
  • Rounds
  • Encryption
  • DES function

Question 6

Question
DES stands for
Answer
  • Data Encryption Standard
  • Data Encryption Subscription
  • Data Encryption Solutions
  • Data Encryption Slots

Question 7

Question
In symmetric key cryptography, key used by sender and receiver is
Answer
  • Shared
  • Different
  • two keys are used
  • None

Question 8

Question
In symmetric-key cryptography, key(s) used for encryption and decryption is/are
Answer
  • Same
  • Different
  • Private
  • Public

Question 9

Question
Keys used in cryptography are
Answer
  • secret key
  • private key
  • public key
  • All of them
  • None of them

Question 10

Question
Cryptography can provide
Answer
  • entity authentication
  • nonrepudiation of messages
  • confidentiality
  • None of them
  • All of them

Question 11

Question
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Answer
  • Data Size
  • Round Size
  • Key Size
  • Encryption Size

Question 12

Question
Cryptography algorithms (ciphers) are divided into
Answer
  • two groups
  • four groups
  • one single group
  • None

Question 13

Question
In Cryptography, original message, before being transformed, is called
Answer
  • Simpletext
  • Plaintext
  • Emptytext
  • Filledtext

Question 14

Question
SHA-l has a message digest of
Answer
  • 160 bits
  • 512 bits
  • 628 bits
  • 820 bits

Question 15

Question
A hash function guarantees integrity of a message. It guarantees that message has not be
Answer
  • Replaced
  • Over view
  • Changed
  • Left

Question 16

Question
To check integrity of a message, or document, receiver creates the
Answer
  • Cipher text
  • Hash
  • Hyper Text
  • Finger Print

Question 17

Question
A digital signature needs a
Answer
  • private-key
  • shared-key
  • public-key
  • All of them
  • None of them

Question 18

Question
Encryption and decryption provide secrecy, or confidentiality, but not
Answer
  • Authentication
  • Integrity
  • Keys
  • Frames
  • Confidentiality

Question 19

Question
When data must arrive at receiver exactly as they were sent, it is called
Answer
  • Message Confidentiality
  • Message Integrity
  • Message Splashing
  • Message Sending

Question 20

Question
In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
Answer
  • 512 Bit Blocks
  • 1023 Bit Blocks
  • 1001 Bit Blocks
  • 1510 Bit Blocks
  • 2024 Bit Blocks

Question 21

Question
Message privacy means that sender and receiver expect
Answer
  • Integrity
  • Confidentiality
  • Authentication
  • Nonrepudiation

Question 22

Question
Message must be encrypted at sender site and decrypted at the
Answer
  • Sender Site
  • Site
  • Receiver site
  • Conferencing

Question 23

Question
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if message is
Answer
  • Short
  • Huge
  • Complex
  • Thin
  • None of them

Question 24

Question
An encryption algorithm transforms plaintext into
Answer
  • Cipher text
  • Simple Text
  • Plain Text
  • Empty Text

Question 25

Question
A transposition cipher reorders (permutes) symbols in a
Answer
  • block of packets
  • block of slots
  • block of signals
  • block of symbols

Question 26

Question
Ciphers of today are called round ciphers because they involve
Answer
  • Single Round
  • Double Rounds
  • Multiple Round
  • Round about

Question 27

Question
RSA stands for
Answer
  • Rivest, Shamir, Adleman
  • Roger, Shamir, Adrian
  • Robert, Shamir, Anthoney
  • Rivest, Shaw, Adleman

Question 28

Question
_______ is the science and art of transforming messages to make them secure and immune to attacks.
Answer
  • Cryptography
  • Cryptoanalysis
  • Crypt
  • Encryption
  • None of them

Question 29

Question
The _______ is a number or a set of numbers on which the cipher operates.
Answer
  • cipher
  • nonce
  • secret
  • key
  • none of the above

Question 30

Question
In a(n) ________ cipher, the same key is used by both the sender and receiver.
Answer
  • symmetric-key
  • asymmetric-key
  • Public-key cryptography
  • RSA algorithm
  • None of them

Question 31

Question
In a(n) ________, the key is called the secret key.
Answer
  • symmetric-key
  • asymmetric-key
  • Public-key cryptography
  • All of them
  • None of them

Question 32

Question
In a(n) ________ cipher, a pair of keys is used
Answer
  • symmetric-key
  • asymmetric-key
  • Private-key cryptography
  • DES algorithm

Question 33

Question
The Caesar cipher is a _______cipher that has a key of 3.
Answer
  • transposition
  • additive
  • asymmetric
  • substitution
  • none of the above

Question 34

Question
The ________ cipher reorders the plaintext characters to create a ciphertext.
Answer
  • transposition
  • additive
  • asymmetric
  • substitution
  • shift

Question 35

Question
A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream.
Answer
  • S-box
  • P-box
  • T-box
  • none of the above
  • SP-boxes

Question 36

Question
A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.
Answer
  • S-box
  • P-box
  • T-box
  • none of the above
  • SP-boxes

Question 37

Question
DES is a(n) ________ method adopted by the U.S. government.
Answer
  • symmetric-key
  • asymmetric-key
  • decryption
  • encryption
  • None of them

Question 38

Question
DES has an initial and final permutation block and _________ rounds.
Answer
  • 14
  • 15
  • 12
  • 16
  • none of the above

Question 39

Question
DES uses a key generator to generate sixteen _______ round keys.
Answer
  • 32-bit
  • 48-bit
  • 56-bit
  • 42-bit
  • 64-bit

Question 40

Question
AES has _____ different configurations
Answer
  • two
  • three
  • four
  • five
  • AES has no configurations

Question 41

Question
One commonly used public-key cryptography method is the ______ algorithm.
Answer
  • RSS
  • RAS
  • RSA
  • RAA
  • DSS

Question 42

Question
The ________ method provides a one-time session key for two parties.
Answer
  • Diffie-Hellman
  • RSA
  • DES
  • AES
  • DSA

Question 43

Question
In symmetric cryptography, which of the following MUST be true:
Answer
  • The same key is used for encryption and decryption
  • Encryption and decryption take the same amount of time
  • Different algorithms are used for encryption and decryption
  • Cryptographic operations are one‐way, and not reversible

Question 44

Question
Message _____ means that the data must arrive at the receiver exactly as sent.
Answer
  • confidentiality
  • integrity
  • authentication
  • availability
  • none of the above

Question 45

Question
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
Answer
  • confidentiality
  • integrity
  • availability
  • authentication
  • none of the above

Question 46

Question
________ means to prove the identity of the entity that tries to access the system's resources.
Answer
  • Message authentication
  • Entity authentication
  • Message confidentiality
  • Message integrity
  • none of the above

Question 47

Question
Digital signature cannot provide ________ for the message.
Answer
  • integrity
  • confidentiality
  • nonrepudiation
  • authentication
  • availability

Question 48

Question
Challenge-response authentication can be done using ________.
Answer
  • symmetric-key ciphers
  • asymmetric-key ciphers
  • keyed hash function
  • keyless hash function
  • all of the above

Question 49

Question
A digital signature needs a(n)_________ system.
Answer
  • symmetric-key
  • asymmetric-key
  • both symmetric- and asymmetric-key cryptography
  • None of the above

Question 50

Question
The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
Answer
  • one-way property
  • collision-free property
  • both one-way and collision-free properties
  • none of the above

Question 51

Question
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Answer
  • Auditability
  • Confidentiality
  • Integrity
  • Availability
  • Identity

Question 52

Question
I have a company’s documents which are proprietary and a trade secret. How do I protect them from getting stolen?
Answer
  • Digitally sign the documents
  • Encrypt them using RSA or AES
  • Hash the data
  • Use decryption
  • None of them

Question 53

Question
Biometrics represents:
Answer
  • Something you know
  • Something you have
  • Something you are
  • All of the above
  • None of the above

Question 54

Question
In asymmetric encryption
Answer
  • same key is used for encryption and decryption
  • different keys are used encryption and decryption
  • no key is required for encryption and decryption
  • none of the mentioned

Question 55

Question
The sender “signs” a message as:
Answer
  • Digital Signature
  • Artificial Signature
  • Encrypted Signature
  • None of the above

Question 56

Question
In encryption:
Answer
  • Public key is used
  • Private key is used
  • Both public and private keys are used
  • None of the above

Question 57

Question
AES stands for:
Answer
  • Advanced Encryption Standard
  • Advanced Encryption System
  • Advanced Encryption Suggestion
  • None of the above

Question 58

Question
Authentication is:
Answer
  • Verification of user’s identification
  • Verification of the data
  • All answers are correct
  • No correct answer

Question 59

Question
The process to discover plaintext or key is known as
Answer
  • Cryptanalysis
  • Cryptography
  • Crypto design
  • Crypto processing
  • Cryptology

Question 60

Question
Output message in cryptography is called:
Answer
  • Plaintext
  • Ciphertext
  • Raw text
  • None of the above

Question 61

Question
Input message in cryptography is called:
Answer
  • Plaintext
  • Ciphertext
  • Encrypted text
  • None of the above

Question 62

Question
In cryptography
Answer
  • Information is transmitted from sender to receiver
  • No information is transmitted
  • Information is damaged
  • No correct answer

Question 63

Question
Secure hash algorithm(SHA) developed by:
Answer
  • National Institute of Standards and Technology (NIST) or NSA
  • IEEE
  • ANSI
  • None of the above

Question 64

Question
Conventional encryption is:
Answer
  • Symmetric encryption
  • Secret key encryption
  • Single key encryption
  • All of the above

Question 65

Question
In network security:
Answer
  • Data is protected from hackers
  • Data is protected from cracker
  • Both answers are possible
  • None of the above

Question 66

Question
DSS stands for:
Answer
  • Digital signature standard
  • Digital sound system
  • Digital simulation schemes
  • None of these

Question 67

Question
Cryptography ensures:
Answer
  • Confidentiality of data
  • Authentication of data
  • Integrity of data
  • All of the above

Question 68

Question
In network security:
Answer
  • Data is protected during transmission
  • Data is not protected during transmission
  • Data is changed
  • None of the above

Question 69

Question
Network security ensures:
Answer
  • Detecting attacks
  • Preventing attacks
  • Recovering attacks
  • All of the above

Question 70

Question
Encryption protects against:
Answer
  • Attacks
  • Viruses
  • Manipulation of data
  • All of the above

Question 71

Question
Authentication refers to:
Answer
  • Verification of user’s identity
  • Checking user’s privileges
  • Auditing user’s process
  • None of the above

Question 72

Question
The message is decrypted at ________ - side
Answer
  • Receiver
  • Sender
  • Broker
  • Attacker
  • All of the above

Question 73

Question
Cryptography relates to ______
Answer
  • Editing
  • Security
  • Testing
  • All of the above

Question 74

Question
Which of the following is not used for symmetric encryption?
Answer
  • RSA
  • DES
  • SHAI
  • RC4
  • MD5

Question 75

Question
Finding plaintext, without knowing key is know as:
Answer
  • Cryptography
  • Cryptanalysis
  • Cryptology
  • None of the above

Question 76

Question
Which of the following is a transposition cipher?
Answer
  • Caesar cipher
  • Vigenere cipher
  • One time pad
  • Playfair cipher

Question 77

Question
Which of the following is a monoalphabetic cipher?
Answer
  • Caesar Cipher
  • Lucifier cipher
  • Playfair cipher
  • No correct answer

Question 78

Question
RSA involves very large _____ numbers.
Answer
  • Prime
  • Even
  • Odd
  • Any random

Question 79

Question
Cryptology means
Answer
  • Cryptography + Cryptodesign
  • Cryptography + Cryptanalysis
  • Cryptography itself known as cryptology also
  • None of the above

Question 80

Question
Diffie-Hellman key exchange is vulnerable to:
Answer
  • Discrete logarithmic problem
  • Elliptic curve cryptography
  • Man-in-the-middle attack

Question 81

Question
None of these Which of the following is an example of a passive attack?
Answer
  • Modify
  • Denial of Service (DoS)
  • Masquerade
  • Traffic analysis

Question 82

Question
Which kind of service ensures that a message was received from the actual sender not from an attacker?
Answer
  • Confidentiality
  • Access Control
  • Integrity
  • Non-repudiation
  • Authentication

Question 83

Question
Which of the following is an active attack? I. Release of message contents; II. Traffic analysis; III. Modify; IV. Denial of Service
Answer
  • I and II
  • I and III
  • III and IV
  • II and IV
  • I, III and IV

Question 84

Question
The method of hiding the secret is called
Answer
  • Cryptography
  • Watermarking
  • Cryptanalysis
  • Steganography

Question 85

Question
It is the art of breaking the cipher
Answer
  • Cryptanalysis
  • Watermarking
  • Cryptography
  • Steganography

Question 86

Question
The field which deals with _____ called cryptography
Answer
  • Keys
  • Encryption techniques and secure systems
  • Firewalls, Kerberos and Intrusion detection systems
  • Operating systems

Question 87

Question
What would be the number of rounds in AES, if the key size is 24 bytes?
Answer
  • 10
  • 12
  • 14
  • 26

Question 88

Question
What would be the number of rounds in AES, if the key size is 32 bytes?
Answer
  • 10
  • 12
  • 14
  • 16

Question 89

Question
Which of the following step is absent in the last round of AES?
Answer
  • Shift row
  • Mix columns
  • Byte substitution
  • Add subkey

Question 90

Question
DES algorithm uses total ______ subkeys
Answer
  • 10
  • 12
  • 14
  • 16
  • 24

Question 91

Question
The total number of rounds in DES algorithm.
Answer
  • 10
  • 12
  • 14
  • 16
  • 24

Question 92

Question
Which of the following method provides a one-time session key for two parties?
Answer
  • Diffie-Hellman
  • RSA
  • DES
  • AES

Question 93

Question
What is the size of round key for DES algorithm?
Answer
  • 32-bit
  • 48-bit
  • 64-bit
  • 128-bit

Question 94

Question
What is the purpose of access control list?
Answer
  • to enforce a specified security policy
  • to prevent unauthorised access to data
  • to emphasize encryption
  • it is a key distribution center

Question 95

Question
Define a subject of Access Control List
Answer
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Question 96

Question
Define an object of Access Control List
Answer
  • an active entity requesting for resource access
  • a passive entity and target of the protection
  • an access control decision function
  • an access control information function

Question 97

Question
What does multilevel security mean?
Answer
  • Classification of information by the level of importance and permission of access by users with different security clearance
  • Classification of information by date and permission of access by users with different security clearance
  • Classification of information by the level of importance and permission of access by users name
  • Classification of information by date and permission of access by users name

Question 98

Question
How many levels are covered in multilevel security
Answer
  • 1
  • 2
  • 3
  • 4

Question 99

Question
No read up (read down) means
Answer
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Question 100

Question
No write down (write up) means
Answer
  • A subject can only read an object of less or equal security level
  • A subject can only write into an object of greater or equal security level
  • A subject can only read an object of more or equal security level
  • A subject can only write into an object of less or equal security level

Question 101

Question
What does “computationally infeasible to find data mapping to specific hash” mean?
Answer
  • One way property
  • Collision free property
  • Second way property
  • Collision property

Question 102

Question
Which of the following is not property of hash functions?
Answer
  • One wayness
  • Preimage resistance
  • Strong collision resistance
  • Long, unfixed output

Question 103

Question
The purpose of hash function is to
Answer
  • Create a message
  • Compress a message
  • Divide a message
  • Conquer a message

Question 104

Question
Which of the following refers requirement of digital signature?
Answer
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be computationally infeasible to forge

Question 105

Question
Which of the following refers requirement of digital signature?
Answer
  • Must be relatively hard to produce
  • Must be relatively hard to recognize
  • Must depend on the message verified
  • Must to be practical to save digital signature in storage

Question 106

Question
What is the property of direct digital signature?
Answer
  • Assumed receiver has sender’s private key
  • Involves only sender
  • Can encrypt using receiver’s public key
  • Assumed sender has receiver’s private key

Question 107

Question
Define AAA.
Answer
  • Access After Anyone
  • Authentication Authorization Accounting
  • Authentication Authorization Access
  • Authentication Access Accounting

Question 108

Question
Which of the term refers to authorization?
Answer
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity
  • Accounting of service

Question 109

Question
Which of the term refers to accounting?
Answer
  • The user identity is a parameter in access control decisions
  • The user identity is recorded when logging security
  • The process of verifying a claimed identity

Question 110

Question
Define X.509
Answer
  • TTP certifies trustworthiness of binding public key with its rightful owner’s identity
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Question 111

Question
Define a Kerberos
Answer
  • Trusted third party authentication system and makes no use of public key cryptography
  • TTP certifies trustworthiness of binding private key with its rightful owner’s identity
  • To enable the validation and to give legal meaning to digital signature
  • Answers for supporting encryption/decryption algorithms

Question 112

Question
Which of the following does not refer for Kerberos property
Answer
  • Impeccability
  • Containment
  • Transparency
  • Viciousness

Question 113

Question
How BruteForce works
Answer
  • аttаckеr triеs еvеry possiblе combinаtion of chаrаctеrs
  • Install viruses
  • Attacker sends more data to an application than is expected
  • Attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability
Show full summary Hide full summary

Similar

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr