1. |
An algorithm in encryption is called _____________. |
A. | Algorithm |
B. | Procedure |
C. | Cipher |
D. | Module |
Answer» C. Cipher |
2. |
The information that gets transformed in encryption is ____________. |
A. | Plain text |
B. | Parallel text |
C. | Encrypted text |
D. | Decrypted text |
Answer» A. Plain text |
3. |
In brute force attack, on average half of all possible keys must be tried to achieve success. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
4. |
A (n) ______ algorithm transforms ciphertext to plaintext. |
A. | Encryption |
B. | Decryption |
C. | Either (a) or (b) |
D. | Neither (a) nor (b) |
Answer» B. Decryption |
5. |
The ________ is the message after transformation. |
A. | Ciphertext |
B. | Plaintext |
C. | Secret-text |
D. | None of the above |
Answer» A. Ciphertext |
6. |
Which of the following is not a type of virus? |
A. | Boot sector |
B. | Polymorphi |
C. | C Multipartite |
D. | Troj |
Answer» A. Boot sector |
7. |
A computer ________ is a malicious code which self-replicates by copying itself to other programs. |
A. | Program |
B. | Virus |
C. | Application |
D. | Worm |
Answer» B. Virus |
8. |
_______________ infects the master boot record and it is challenging and a complex task to remove this virus. |
A. | Boot Sector Virus |
B. | Polymorphi |
C. | C Multipartite |
D. | Troj |
Answer» A. Boot Sector Virus |
9. |
______________ infects the executable as well as the boot sectors. |
A. | Non-resident virus |
B. | Boot Sector Virus |
C. | Polymorphic Virus |
D. | Multipartite Virus |
Answer» D. Multipartite Virus |
10. |
Trojan creators do not look for _______________. |
A. | Deleting Data |
B. | Protecting Data |
C. | Modifying Data |
D. | Copying Data |
Answer» B. Protecting Data |
11. |
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system. |
A. | Virus, Cyber-Criminals |
B. | Malware, Penetration Testers |
C. | Trojans, Cyber-Criminals |
D. | Virus, Penetration Testers |
Answer» C. Trojans, Cyber-Criminals |
12. |
During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted. |
A. | Network |
B. | System |
C. | Website |
D. | Router |
Answer» C. Website |
13. |
The intent of a __________ is to overkill the targeted server’s bandwidth and other resources of the target website. |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» B. DoS attack |
14. |
In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware. |
A. | URL Redirection |
B. | DOS |
C. | Phishing |
D. | MiTM attack |
Answer» C. Phishing |
15. |
Trojan creators do not look for _______________. |
A. | Credit card information |
B. | Confidential data |
C. | Important documents |
D. | Securing systems with such programs |
Answer» D. Securing systems with such programs |
16. |
1. When one participant in a communication pretends to be someone else, it is called _________? |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Masquerade |
Answer» D. Masquerade |
17. |
________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities. |
A. | Message Authentication Code |
B. | Steganography |
C. | Whale phishing |
D. | A cipher |
Answer» C. Whale phishing |
18. |
Compromising confidential information comes under _________. |
A. | Bug |
B. | Threat |
C. | Vulnerability |
D. | Attack |
Answer» B. Threat |
19. |
When an attacker sends unsolicited communication, it is an example of_____. |
A. | Spoofing |
B. | Spamming |
C. | Crackers |
D. | Sniffers |
Answer» A. Spoofing |
20. |
Masquerading is _______. |
A. | Attempting to hack a system through backdoors to an operating system or application. |
B. | Pretending to be an authorized user |
C. | Always done through IP spoofing |
D. | Applying a subnet mask to an internal IP range |
Answer» B. Pretending to be an authorized user |
21. |
Integrity is protection of data from all of the following except ________. |
A. | Unauthorized changes |
B. | Accidental changes |
C. | Data analysis |
D. | Intentional manipulation |
Answer» C. Data analysis |
22. |
A security program cannot address which of the following business goals? |
A. | Accuracy of information |
B. | Change control |
C. | User expectations |
D. | Prevention of fraud |
Answer» A. Accuracy of information |
23. |
The absence of a fire-suppression system would be best characterized as_______. |
A. | Exposure |
B. | Threat |
C. | Vulnerability |
D. | Risk |
Answer» C. Vulnerability |
24. |
Asymmetric key cryptography is used for all of the following except_______. |
A. | Encryption of data |
B. | Access control |
C. | Nonrepudiation |
D. | Steganography |
Answer» D. Steganography |
25. |
Firewalls are to protect against________. |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Unauthorized Attacks |
Answer» D. Unauthorized Attacks |
We're developing a website for study materials for students.
We would love to hear your answers to some of the questions.