CS707 Network Security Solved MCQs
Q1 _______________ is a symmetric block cipher, uses a 64 bit key, puts the data through 16 rounds of transposition and substitution, and has 5 different modes of operation.
· AES
· DES
· Blowfish
· None of above
Q2 Examples of asymmetric key algorithms are:
· Diffie Hellman, RSA and El-Gamal
· RC4, RC5, and RC6
· DES, 3DES, and AES
· MD4, MD5, and MD6
Q3 The standard used in digital certificates that defines its structure, fields, and values is
· Kerberos
· End-to-end encryption
· X.509
· The standard used in IPsec VPNs
Q4 A cryptosystem consists of:
· Software, algorithms, protocols, and keys
· PGP
· An algorithm used for encryption and decryption
· Is software used for testing security of applications
Q5 Cryptanalysis is:
· The practice of analyzing secret codes but not breaking them
· The technique used by forensic investigators to trace the source of malware infection
· The science related to research and development of cryptography
· The practice of breaking cryptic systems
· Q6 An electro-mechanical cipher machine used by the Germans in World War II is _________________
· MAC
· Enigma
· Skytale
· All above
Q7 A digital signature is best described as:
· An electronic verification system used for transactional integrity in banking
· A hash value encrypted by the sender’s private key
· An electronic verification system used for encryption and hashing
· A hash value encrypted with the DES, 3DES, or AES algorithms
Q8 A practice of Choosing a key that is extremely random and the algorithm should use the full range of the key-space is called ______________________.
· Cipher management
· Key combination
· Key management
· None of above
Q9 _____________________ uses two instances of the same key while encrypting and decrypting messages.
· Skytale
· Symmetric Cryptography
· Asymmetric Cryptography
· SSL
Q10 _______________ is a program and protocol used to log in securely to another device or system on a network.
· Secure Shell (SSH)
· SSL
· HTTP
· PGP
Q:11 In Network Security CIA stands for:
· Confidentiality, integrity, and. availability
· Central Investigation Agency
· Confidentiality, Intelligence, and Accountability
· Ciphers, Initiation Vectors, Algorithms
Q:12 Examples of asymmetric key algorithms are:
· Diffie Hellman, RSA and El-Gamal
· RC4, RC5, and RC6
· DES, 3DES, and AES
· MD4, MD5, and MD6
Q:13 A mathematical function that is easier to compute in one direction than in the other direction, and forms the basis for all asymmetric algorithms
· One-Way Function
· Two Way Function
· A mathematical function used in cryptanalysis
· A technique used by forensic experts to lock all hard disk sectors of a computer
Q:14 A hash value encrypted by the sender’s private key is ______________
· AES
· Digital signature
· DES
· 3DES algorithms
Q:15 Cryptanalysis is:
The practice of analyzing secret codes but not breaking them
· The technique used by forensic investigators to trace the source of malware infection
· The science related to research and development of cryptography
· The practice of breaking cryptic systems
Q:16 Key management is a practice that requires:
· Choosing a key that is extremely random and the algorithm should use the full range of the key-space
· Labeling keys so that they are not lost or stolen
· Returning the key to the CA after it has completed its lifetime
· At least two senior officers of the company to issue and maintain a record of the keys
Q:17 In end-to-end encryption:
· only the header is encrypted, not the payload
· Packets do not need to be decrypted and then encrypted at each hop
· Only decryption takes place at each hop
· The data link and physical layers are involved
Q:18 Rootkits are a type of ____________________.
· Virus
· Worm.
· Trojan Horse
· None of above
Q:19 Diffie Hellman is an example of _____________ key algorithms.
· Symmetric
· Asymmetric
· Skytale
· Enigma
Q:20 The standard used in digital certificates that defines its structure, fields, and values is ____________________.
· X.509
· Kerberose
· Cryptography
· PKI
No comments: