Practice Test: Question Set - 06
1. PGP makes use of which cryptographic algorithm?
- (A) DES
- (B) AES
- (C) RSA
- (D) Rabin
2. Hybrid attacks is _________
- (A) An
attempt to crack passwords using words that can be found in dictionary
- (B) An
attempt to crack passwords by replacing characters of a dictionary word with
numbers and symbols
- (C) An
attempt to crack passwords using a combination of characters, numbers, and
symbols
- (D) An
attempt to crack passwords by replacing characters with numbers and symbols
3. In the 1940s, a team of cryptanalysts from the United States successfully broke a Soviet code based upon a one-time pad in a project known as VENONA. What rule did the Soviets break that caused this failure?
- (A) Key
values must be random
- (B) Key
values must be the same length as the message
- (C) Key
values must be used only once
- (D) Key
values must be protected from physical disclosure
4. Which is the largest disadvantage of the symmetric Encryption?
- (A) More
complex and therefore more time-consuming calculations
- (B) Problem
of the secure transmission of the Secret Key
- (C) Less
secure encryption function
- (D) Isn’t
used any more
5. _________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
- (A) Malware
Analysis
- (B) Cryptography
- (C) Reverse
engineering
- (D) Exploit
writing
6. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
- (A) Fortezza
- (B) Anonymous
Diffie-Hellman
- (C) Fixed
Diffie Hellman
- (D) RSA
7. MD5 is a widely used hash function for producing hash value of
- (A) 64
bits
- (B) 128
bits
- (C) 512
bits
- (D) 1024
bits
8. PGP makes use of which cryptographic algorithm?
- (A) DES
- (B) AES
- (C) RSA
- (D) Rabin
9. Which of the following field in IPv4 datagram is not related to fragmentation?
- (A) Flags
- (B) Offset
- (C) TOS
- (D) Identifier
10. Which protocol is used to convey SSL related alerts to the peer entity?
- (A) Alert
Protocol
- (B) Handshake
Protocol
- (C) Upper-Layer
Protocol
- (D) Change
Cipher Spec Protocol
11. Which one of the following algorithm is not used in asymmetric-key cryptography?
- (A) rsa
algorithm
- (B) Diffie-hellman
algorithm
- (C) Electronic
code book algorithm
- (D) dsa
algorithm
12. _______ provides authentication at the IP level.
- (A) AH
- (B) ESP
- (C) PGP
- (D) SSL
13. ________ Moinitor User activity at on Internet and transmit it to someone else at background
- (A) Malware
- (B) Spyware
- (C) Addware
- (D) Worm
14. What is the best statement for taking advantage of a weakness in the security of an IT system?
- (A) Threat
- (B) Attack
- (C) Exploit
- (D) Vulnerability
15. Conventional cryptography is also known as __________ or symmetric-key encryption.
- (A) Secret-key
- (B) Public
key
- (C) Protected
key
- (D) Primary
key
Next Tests: