is the art & science of cracking the cipher-text without knowing the key.
1.cracking
2.cryptanalysis
3.cryptography
4.crypto-hacking
of information means, only authorised users are capable of accessing the information.
1.confidentiality
2.integrity
3.non-repudiation
4. availability
is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
1.network security
2.database security
3.information security
4.physical security
In asymmetric key cryptography, the private key is kept by ____
1.sender
2.receiver
3.sender and receiver
4.all the connected devices to the network
ElGamal encryption system is __________
1.symmetric key encryption algorithm
2.asymmetric key encryption algorithm
3.not an encryption algorithm
4.block cipher method
HTTPS is abbreviated as _________
1.hypertexts transfer protocol secured
2.secured hyper text transfer protocol
3.hyperlinked text transfer protocol secured
4.hyper text transfer protocol secure
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
1. release of message content-passive attack
2. traffic analysis -passive attacks
3. release of message content- active attacks
4. traffic analysis -active attacks
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
1.release of message content-passive attack
2. traffic analysis -passive attacks
3.release of message content- active attacks
4. traffic analysis -active attacks
In the above figure from left to right, the correct order of the shaded levels are
1.network level, application level, transport level
2.application level, network level, transport level
3.transport level, application level, network level
4. network level, transport level, application level
In the above figure, which of the above shaded block is transparent to end users and applications?
1. ip/ipsec
2.ssl
3.kerberos
4.s/mime
Which one of the following is a cryptographic protocol used to secure HTTP connection?
1.stream control transmission protocol (sctp)
2.transport layer security (tls)
3.explicit congestion notification (ecn)
4.resource reservation protocol
Which protocol is used for the purpose of copying the pending state into the current state?
1. alert protocol
2. handshake protocol
3.upper-layer protocol
4.change cipher spec protocol
_______ is used for encrypting data at network level D. s/mime
1.ipsec
2.https
3.smtp
4.s/mime
. In cryptography, the order of the letters in a message is rearranged by __________
1. A. transpositional ciphers
2.substitution ciphers
3.both transpositional ciphers and substitution ciphers
4.quadratic ciphers
A unique piece of information that is used in encryption.
1.cipher
2.plain text
3.key
4. cipher
An attack in which the user receives unwanted amount of e- mails.
1.smurfing
2.denial of service
3.e-mail bombing
4. ping storm
CIA triad is also known as
1.nic (non-repudiation, integrity, confidentiality)
2.aic (availability, integrity, confidentiality)
3. ain (availability, integrity, non-repudiation)
4.aic (authenticity, integrity, confidentiality)
Conventional cryptography is also known as or symmetric-key encryption.
1.secret-key
2.public key
3.protected key
4.primary key
Cryptanalysis is used
1. to find some insecurity in a cryptographic scheme
2.to increase the speed
3.to encrypt the data
4. to make new ciphers
Cryptanalysis is used __________
1.to find some insecurity in a cryptographic scheme
2.to increase the speed
3.to encrypt the data
4. to make new ciphers
Cryptographic hash function takes an arbitrary block of data and returns _________
1. fixed size bit string
2.variable size bit string
3.both fixed size bit string and variable size bit string
4. variable sized byte string
Data integrity gets compromised when and are taken control off.
1.access control, file deletion
2.network, file permission
3.access control, file permission
4.network, system
Data is used to ensure confidentiality.
1.encryption
2.locking
3.deleting
4.backup
Diffie-Hellman algorithm is widely known as_________
1.key exchange algorithm
2.key agreement algorithm
3.only
4. both a and b
ECC stands for
1. A. elliptic curve cryptography
2.elliptic cryptography curve
3.error correcting code
4.none of the above
Firewalls can be of _______ kinds.
1.1
2.2
3.3
4.4
From the options below, which of them is not a threat to information security?
1.disaster
2.eavesdropping
3.information leakage
4.unchanged default password
Hash function is used for________
1.message authentication
2.digital signature
3.both a and b
4.only a
In layer, vulnerabilities are directly associated with physical access to networks and hardware.
1. physical
2.data-link
3.network
4.application
In same keys are implemented for encrypting as well as decrypting the information.
1.symmetric key encryption
2.asymmetric key encryption
3.asymmetric key decryption
4.hash-based key encryption
In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
1.select, alarm
2. alert, alarm
3.warning, alarm
4.warning, fatal
In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
1. 216
2.232
3.214
4.212
IPSec provides ....protocols for network layer
1.7
2.1
3.3
4.4
length of the IPv6 acddress is ....
1.32 bits
2.64 bits
3.16 bits
4.128 bit
length of the IPv6 header is....
1. 64 bits
2.16 bits
3.32 bits
4.8 bits
RSA algorithm is best example of_______
1.asymmetric key cryptography
2.symmetric key cryptography
3.elliptic curve cryptography
4.All of the above
SSL primarily focuses on _______
1. integrity and authenticity
2. integrity and non-repudiation
3.authenticity and privacy
4.confidentiality and integrity
Study of creating a d using encryption and decryption techniques.
1.cipher
2.cryptography
3.encryption
4.decryption
The full form of OSI is OSI model is
1.open systems interconnection
2.open software interconnection
3.open systems internet
4. open software internet
The full form of SSL is
1.serial session layer
2.secure socket layer
3.session secure layer
4.series socket layer
Transport layer Protocol consists of ... main components
1.2
2.1
3.3
4.4
When integrity is lacking in a security system, occurs.
1.database hacking
2.data deletion
3.data tampering
4.data leakage
When you use the word it means you are protecting your data from getting disclosed.
1.confidentiality
2.integrity
3.authentication
4.non-repudiation
Which of the following is not a secured mail transferring methodology?
1.pop3 .
2.ssmtp
3. mail using pgp
4.s/mime
Which one of the following is not a higher –layer SSL protocol?
1.alert protocol
2.handshake protocol
3.alarm protocol
4.change cipher spec protocol
Which protocol consists of only 1 bit?
1. alert protocol
2.handshake protocol
3.upper-layer protocol
4. change cipher spec protocol
Which protocol is used to convey SSL related alerts to the peer entity?
1.alert protocol
2. handshake protocol
3.upper-layer protocol
4.change cipher spec protocol
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
1. they help understanding hacking better
2. they are key elements to a security breach
3. they help understands security and its components better
4. they help to understand the cyber-crime better
_____ is used for encrypting data at network level.
1. ipsec
2.https
3.smtp
4.s/mime
__________ is the kind of firewall is connected between the device and the network connecting to internet.
1. hardware firewall
2.software firewall
3.stateful inspection firewall
4.microsoft firewall