Information and Cyber Security MCQ Questions and Answers pdf - ObjectiveBooks

Information and Cyber Security MCQ Questions and Answers pdf

Practice Test: Question Set - 06


1. PGP makes use of which cryptographic algorithm?
    (A) DES
    (B) AES
    (C) RSA
    (D) Rabin

2. Hybrid attacks is _________
    (A) An attempt to crack passwords using words that can be found in dictionary
    (B) An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
    (C) An attempt to crack passwords using a combination of characters, numbers, and symbols
    (D) An attempt to crack passwords by replacing characters with numbers and symbols

3. In the 1940s, a team of cryptanalysts from the United States successfully broke a Soviet code based upon a one-time pad in a project known as VENONA. What rule did the Soviets break that caused this failure?
    (A) Key values must be random
    (B) Key values must be the same length as the message
    (C) Key values must be used only once
    (D) Key values must be protected from physical disclosure

4. Which is the largest disadvantage of the symmetric Encryption?
    (A) More complex and therefore more time-consuming calculations
    (B) Problem of the secure transmission of the Secret Key
    (C) Less secure encryption function
    (D) Isn’t used any more

5. _________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
    (A) Malware Analysis
    (B) Cryptography
    (C) Reverse engineering
    (D) Exploit writing

6. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
    (A) Fortezza
    (B) Anonymous Diffie-Hellman
    (C) Fixed Diffie Hellman
    (D) RSA

7. MD5 is a widely used hash function for producing hash value of
    (A) 64 bits
    (B) 128 bits
    (C) 512 bits
    (D) 1024 bits

8. PGP makes use of which cryptographic algorithm?
    (A) DES
    (B) AES
    (C) RSA
    (D) Rabin

9. Which of the following field in IPv4 datagram is not related to fragmentation?
    (A) Flags
    (B) Offset
    (C) TOS
    (D) Identifier

10. Which protocol is used to convey SSL related alerts to the peer entity?
    (A) Alert Protocol
    (B) Handshake Protocol
    (C) Upper-Layer Protocol
    (D) Change Cipher Spec Protocol

11. Which one of the following algorithm is not used in asymmetric-key cryptography?
    (A) rsa algorithm
    (B) Diffie-hellman algorithm
    (C) Electronic code book algorithm
    (D) dsa algorithm

12. _______ provides authentication at the IP level.
    (A) AH
    (B) ESP
    (C) PGP
    (D) SSL

13. ________ Moinitor User activity at on Internet and transmit it to someone else at background
    (A) Malware
    (B) Spyware
    (C) Addware
    (D) Worm

14. What is the best statement for taking advantage of a weakness in the security of an IT system?
    (A) Threat
    (B) Attack
    (C) Exploit
    (D) Vulnerability

15. Conventional cryptography is also known as __________ or symmetric-key encryption.
    (A) Secret-key 
    (B) Public key
    (C) Protected key 
    (D) Primary key

Show and hide multiple DIV using JavaScript View All Answers

 Next Tests: