McqMate
1. |
An algorithm in encryption is called _____________. |
A. | Algorithm |
B. | Procedure |
C. | Cipher |
D. | Module |
Answer» C. Cipher |
2. |
The information that gets transformed in encryption is ____________. |
A. | Plain text |
B. | Parallel text |
C. | Encrypted text |
D. | Decrypted text |
Answer» A. Plain text |
3. |
In brute force attack, on average half of all possible keys must be tried to achieve success. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
4. |
A (n) ______ algorithm transforms ciphertext to plaintext. |
A. | Encryption |
B. | Decryption |
C. | Either (a) or (b) |
D. | Neither (a) nor (b) |
Answer» B. Decryption |
5. |
The ________ is the message after transformation. |
A. | Ciphertext |
B. | Plaintext |
C. | Secret-text |
D. | None of the above |
Answer» A. Ciphertext |
6. |
Which of the following is not a type of virus? |
A. | Boot sector |
B. | Polymorphi |
C. | C Multipartite |
D. | Troj |
Answer» A. Boot sector |
7. |
A computer ________ is a malicious code which self-replicates by copying itself to other programs. |
A. | Program |
B. | Virus |
C. | Application |
D. | Worm |
Answer» B. Virus |
8. |
_______________ infects the master boot record and it is challenging and a complex task to remove this virus. |
A. | Boot Sector Virus |
B. | Polymorphi |
C. | C Multipartite |
D. | Troj |
Answer» A. Boot Sector Virus |
9. |
______________ infects the executable as well as the boot sectors. |
A. | Non-resident virus |
B. | Boot Sector Virus |
C. | Polymorphic Virus |
D. | Multipartite Virus |
Answer» D. Multipartite Virus |
10. |
Trojan creators do not look for _______________. |
A. | Deleting Data |
B. | Protecting Data |
C. | Modifying Data |
D. | Copying Data |
Answer» B. Protecting Data |
11. |
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system. |
A. | Virus, Cyber-Criminals |
B. | Malware, Penetration Testers |
C. | Trojans, Cyber-Criminals |
D. | Virus, Penetration Testers |
Answer» C. Trojans, Cyber-Criminals |
12. |
During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted. |
A. | Network |
B. | System |
C. | Website |
D. | Router |
Answer» C. Website |
13. |
The intent of a __________ is to overkill the targeted server’s bandwidth and other resources of the target website. |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» B. DoS attack |
14. |
In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware. |
A. | URL Redirection |
B. | DOS |
C. | Phishing |
D. | MiTM attack |
Answer» C. Phishing |
15. |
Trojan creators do not look for _______________. |
A. | Credit card information |
B. | Confidential data |
C. | Important documents |
D. | Securing systems with such programs |
Answer» D. Securing systems with such programs |
16. |
1. When one participant in a communication pretends to be someone else, it is called _________? |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Masquerade |
Answer» D. Masquerade |
17. |
________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities. |
A. | Message Authentication Code |
B. | Steganography |
C. | Whale phishing |
D. | A cipher |
Answer» C. Whale phishing |
18. |
Compromising confidential information comes under _________. |
A. | Bug |
B. | Threat |
C. | Vulnerability |
D. | Attack |
Answer» B. Threat |
19. |
When an attacker sends unsolicited communication, it is an example of_____. |
A. | Spoofing |
B. | Spamming |
C. | Crackers |
D. | Sniffers |
Answer» B. Spamming |
20. |
Masquerading is _______. |
A. | Attempting to hack a system through backdoors to an operating system or application. |
B. | Pretending to be an authorized user |
C. | Always done through IP spoofing |
D. | Applying a subnet mask to an internal IP range |
Answer» B. Pretending to be an authorized user |
21. |
Integrity is protection of data from all of the following except ________. |
A. | Unauthorized changes |
B. | Accidental changes |
C. | Data analysis |
D. | Intentional manipulation |
Answer» C. Data analysis |
22. |
A security program cannot address which of the following business goals? |
A. | Accuracy of information |
B. | Change control |
C. | User expectations |
D. | Prevention of fraud |
Answer» A. Accuracy of information |
23. |
The absence of a fire-suppression system would be best characterized as_______. |
A. | Exposure |
B. | Threat |
C. | Vulnerability |
D. | Risk |
Answer» C. Vulnerability |
24. |
Asymmetric key cryptography is used for all of the following except_______. |
A. | Encryption of data |
B. | Access control |
C. | Nonrepudiation |
D. | Steganography |
Answer» D. Steganography |
25. |
Firewalls are to protect against________. |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Unauthorized Attacks |
Answer» D. Unauthorized Attacks |
26. |
The first computer virus is__________. |
A. | The famous |
B. | HARLIE |
C. | PARAM |
D. | Creeper |
Answer» D. Creeper |
27. |
_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction. |
A. | Network Security |
B. | Database Security |
C. | Information Security |
D. | Physical Security |
Answer» C. Information Security |
28. |
From the options below, which of them is not a vulnerability to information security? |
A. | Without deleting data, disposal of storage media |
B. | Latest patches and updates not done |
C. | Floo |
D. | D Unchanged default password |
Answer» C. Floo |
29. |
Possible threat to any information cannot be ________________. |
A. | Ignored |
B. | Protected |
C. | Transferre |
D. | D Reduced |
Answer» A. Ignored |
30. |
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase. |
A. | Security officer |
B. | Malicious hacker |
C. | Security auditor |
D. | Network analyst |
Answer» B. Malicious hacker |
31. |
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. |
A. | Malware Analysis |
B. | Exploit writing |
C. | Reverse engineering |
D. | Cryptography |
Answer» D. Cryptography |
32. |
When plain text is converted to unreadable format, it is termed as _____________. |
A. | Rotten text |
B. | Raw text |
C. | Cipher-text |
D. | Cipher |
Answer» C. Cipher-text |
33. |
______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. |
A. | Malware Analysis |
B. | Cryptography |
C. | Reverse engineering |
D. | Exploit writing |
Answer» B. Cryptography |
34. |
Cryptography can be divided into ______ types. |
A. | 5 |
B. | 2 |
C. | 7 |
D. | 3 |
Answer» B. 2 |
35. |
Data which is easily readable & understandable without any special algorithm or method is called _________________. |
A. | Cipher-text |
B. | Plain text |
C. | Raw text |
D. | Encrypted text |
Answer» B. Plain text |
36. |
Plain text are also called _____________. |
A. | Encrypted text |
B. | Clear-text |
C. | Raw text |
D. | Cipher-text |
Answer» C. Raw text |
37. |
There are ________ types of cryptographic techniques used in general. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 |
38. |
Conventional cryptography is also known as _____________ or symmetric-key encryption. |
A. | Secret-key |
B. | Public key |
C. | Protected key |
D. | Primary key |
Answer» A. Secret-key |
39. |
Data Encryption Standard is an example of a _____________ cryptosystem. |
A. | Conventional |
B. | Public key |
C. | Hash key |
D. | Asymmetric-key |
Answer» A. Conventional |
40. |
_______ Cryptography deals with traditional characters, i.e., letters & digits directly. |
A. | Latest |
B. | Asymmetri |
C. | C Classic |
D. | Modern |
Answer» C. C Classic |
41. |
____________ Cryptography operates on binary-bit series and strings. |
A. | Modern |
B. | Classi |
C. | C Traditional |
D. | Primitive |
Answer» A. Modern |
42. |
____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text. |
A. | Polyalphabetic Cipher |
B. | Caesar Cipher |
C. | Playfair Cipher |
D. | Monoalphabetic Cipher |
Answer» B. Caesar Cipher |
43. |
________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity. |
A. | Rolling Cipher |
B. | Shift Cipher |
C. | Playfair Cipher |
D. | Block Cipher |
Answer» B. Shift Cipher |
44. |
In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext. |
A. | Rolling Cipher |
B. | Shift Cipher |
C. | Playfair Cipher |
D. | Block Cipher |
Answer» C. Playfair Cipher |
45. |
______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text. |
A. | Shift Cipher |
B. | Block Cipher |
C. | Playfair Cipher |
D. | Vigenere Cipher |
Answer» D. Vigenere Cipher |
46. |
The ________________ has piece of the keyword that has the same length as that of the plaintext. |
A. | One-time pad |
B. | Hash functions |
C. | Vigenere Cipher |
D. | Block Cipher |
Answer» A. One-time pad |
47. |
In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text. |
A. | Vigenere Cipher |
B. | Block Cipher |
C. | Stream cipher |
D. | One-time pad |
Answer» C. Stream cipher |
48. |
In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits. |
A. | Hash functions |
B. | Vigenere Cipher |
C. | One-time pa |
D. | D Block Cipher |
Answer» D. D Block Cipher |
49. |
The procedure to add bits to the last block is termed as _________________. |
A. | Padding |
B. | Hashing |
C. | Tuning |
D. | Decryption |
Answer» A. Padding |
50. |
Which of the following is not an example of a block cipher? |
A. | DES |
B. | Caesar cipher |
C. | Twofish |
D. | IDEA |
Answer» B. Caesar cipher |
51. |
DES stands for ________________. |
A. | Device Encryption Standard |
B. | Data Encrypted Standard |
C. | Data Encryption Security |
D. | Data Encryption Standard |
Answer» D. Data Encryption Standard |
52. |
____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES. |
A. | Twofish |
B. | IDEA |
C. | DES |
D. | AES |
Answer» D. AES |
53. |
AES stands for ________________. |
A. | Active Encryption Standard |
B. | Advanced Encrypted Standard |
C. | Advanced Encryption Standar |
D. | D Advanced Encryption Security |
Answer» C. Advanced Encryption Standar |
54. |
AES is at least 6-times faster than 3-DES. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
55. |
_____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data. |
A. | Chorography |
B. | Tomography |
C. | Steganography |
D. | Cryptography |
Answer» C. Steganography |
56. |
_____________ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files. |
A. | Steganography |
B. | Cryptography |
C. | Chorography |
D. | Tomography |
Answer» A. Steganography |
57. |
Steganography follows the concept of security through obscurity. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
58. |
The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”. |
A. | Tomography |
B. | Chorography |
C. | Steganography |
D. | Cryptography |
Answer» C. Steganography |
59. |
Which of the following is not a steganography tool? |
A. | Steghide |
B. | ReaperExploit |
C. | Image steganography |
D. | Xaio steganography |
Answer» B. ReaperExploit |
60. |
Which of the following is not a steganography tool? |
A. | rSteg |
B. | Crypture |
C. | SteganographX Plus |
D. | Burp Suite |
Answer» D. Burp Suite |
61. |
The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________. |
A. | Program file |
B. | Special file |
C. | Ordinary file |
D. | Encrypted file |
Answer» C. Ordinary file |
62. |
People will normally think it as a normal/regular file and your secret message will pass on without any _______________. |
A. | Cracking |
B. | Encryption |
C. | Suspicion |
D. | Decryption |
Answer» C. Suspicion |
63. |
By using ______________ you can diminish the chance of data leakage. |
A. | Steganography |
B. | Chorography |
C. | Tomography |
D. | Cryptography |
Answer» A. Steganography |
64. |
Which mode of operation has the worst “error propagation” among the following? |
A. | EC |
B. | B CB |
C. | C CBC |
D. | OFB |
Answer» A. EC |
65. |
Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution? |
A. | EC |
B. | B CB |
C. | C CTR |
D. | OFB |
Answer» C. C CTR |
66. |
Which mode requires the implementation of only the encryption algorithm? |
A. | OF |
B. | B CTR |
C. | CBC |
D. | ECB |
Answer» B. B CTR |
67. |
Which of the following modes of operation does not involve feedback? |
A. | OF |
B. | B CTR |
C. | CBC |
D. | ECB |
Answer» A. OF |
68. |
Which of the following is a natural candidates for stream ciphers? |
A. | OFB |
B. | ECB |
C. | CBC |
D. | CFB |
Answer» A. OFB |
69. |
Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent? |
A. | Rijndael |
B. | Serpent |
C. | Blowfish |
D. | JUPITER |
Answer» D. JUPITER |
70. |
Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm? |
A. | Rijndael |
B. | RC6 |
C. | Blowfish |
D. | MARS |
Answer» D. MARS |
71. |
How many rounds does the AES-192 perform? |
A. | 16 |
B. | 12 |
C. | 14 |
D. | 10 |
Answer» B. 12 |
72. |
What is the expanded key size of AES-192? |
A. | 60 words |
B. | 32 words |
C. | 52 words |
D. | 44 words |
Answer» C. 52 words |
73. |
The 4×4 byte matrices in the AES algorithm are called_______. |
A. | Permutations |
B. | Transitions |
C. | Words |
D. | States |
Answer» D. States |
74. |
In AES the 4×4 bytes matrix key is transformed into a keys of size __________. |
A. | 60 words |
B. | 32 words |
C. | 52 words |
D. | 44 words |
Answer» D. 44 words |
75. |
For the AES-128 algorithm there are __________ similar rounds and _________ round is different. |
A. | 9 ; the last |
B. | 8 ; the first and last |
C. | 10 ; no |
D. | 2 pair of 5 similar rounds ; every alternate |
Answer» A. 9 ; the last |
76. |
There is an addition of round key before the start of the AES round algorithms. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
77. |
How many computation rounds does the simplified AES consists of? |
A. | 10 |
B. | 8 |
C. | 2 |
D. | 5 |
Answer» C. 2 |
78. |
On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function? |
A. | Permutation P |
B. | Swapping of halves |
C. | XOR of subkey with function f |
D. | F function |
Answer» B. Swapping of halves |
79. |
What is the block size in the Simplified AES algorithm? |
A. | 36 bits |
B. | 16 bits |
C. | 40 bits |
D. | 8 bits |
Answer» C. 40 bits |
80. |
What is the key size in the S-AES algorithm? |
A. | 32 bits |
B. | 24 bits |
C. | 16 bits |
D. | None of the mentioned |
Answer» C. 16 bits |
81. |
Which of the following is a faulty S-AES step function? |
A. | Mix Columns |
B. | Add round key |
C. | Byte substitution |
D. | Shift rows |
Answer» C. Byte substitution |
82. |
How many step function do Round 1 and 2 each have in S-AES? |
A. | 1 and 4 |
B. | 3 and 4 |
C. | Both 4 |
D. | 4 and 3 |
Answer» D. 4 and 3 |
83. |
The inverse transformation matrix times the forward transformation matrix equals the identity matrix. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
84. |
How many round keys are generated in the AES algorithm? |
A. | 12 |
B. | 11 |
C. | 10 |
D. | 8 |
Answer» B. 11 |
85. |
DES follows_________. |
A. | SP Networks |
B. | Feistel Cipher Structure |
C. | Caesars Cipher |
D. | Hash Algorithm |
Answer» B. Feistel Cipher Structure |
86. |
The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key. |
A. | 16 |
B. | 9 |
C. | 12 |
D. | 18 |
Answer» A. 16 |
87. |
The DES algorithm has a key length of ______. |
A. | 16 Bits |
B. | 32 Bits |
C. | 64 Bits |
D. | 128 Bits |
Answer» C. 64 Bits |
88. |
In the DES algorithm the round key is __________ bit and the Round Input is ____________bits. |
A. | 48, 32 |
B. | 32, 32 |
C. | 56, 24 |
D. | 64,32 |
Answer» A. 48, 32 |
89. |
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________. |
A. | Addition of ones |
B. | Addition of zeros |
C. | Duplication of the existing bits |
D. | Scaling of the existing bits |
Answer» D. Scaling of the existing bits |
90. |
The Initial Permutation table/matrix is of size _____. |
A. | 4×8 |
B. | 8×8 |
C. | 12×8 |
D. | 16×8 |
Answer» B. 8×8 |
91. |
The number of unique substitution boxes in DES after the 48 bit XOR operation are___. |
A. | 4 |
B. | 8 |
C. | 12 |
D. | 16 |
Answer» B. 8 |
92. |
What is the number of possible 3 x 3 affine cipher transformations? |
A. | 840 |
B. | 168 |
C. | 1344 |
D. | 1024 |
Answer» C. 1344 |
93. |
The S-Box is used to provide confusion, as it is dependent on the unknown key. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
94. |
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT. |
A. | 64 |
B. | 11 |
C. | 54 |
D. | 23 |
Answer» B. 11 |
95. |
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text. |
A. | 122 |
B. | 143 |
C. | 111 |
D. | 88 |
Answer» D. 88 |
96. |
In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user? |
A. | 1023 |
B. | 2432 |
C. | 2412 |
D. | 3031 |
Answer» D. 3031 |
97. |
Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153). |
A. | 32432 |
B. | 19367 |
C. | 12543 |
D. | 35212 |
Answer» B. 19367 |
98. |
RSA is also a stream cipher like Merkel-Hellman. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
99. |
In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’? |
A. | p/q should give no remainder |
B. | p and q should be prime |
C. | p and q should be co-prime |
D. | p and q should be divisible by Ф(n) |
Answer» B. p and q should be prime |
100. |
In RSA, Ф(n) = _______ in terms of p and q. |
A. | (p+1)(q+1) |
B. | (p-1)(q-1) |
C. | (p)(q) |
D. | (p)/(q) |
Answer» B. (p-1)(q-1) |
Done Reading?