Practice Test: Question Set - 01
1. _________ means knowledge obtained from investigation, study, intelligence, new facts.
- (A) Security
- (B) Data
- (C) Information
- (D) None
of these
2. Conversion of Ciphertext to plain text?
- (A) Encryption
- (B) Decryption
- (C) Simple
text
- (D) None
of these
3. A digital signature needs ________ system
- (A) Symmetric-key
- (B) Asymmetric-key
- (C) Either
(a) or (b)
- (D) Neither
(a) nor (b)
4. In the handshake protocol which is the message type first sent between client and server?
- (A) Server_hello
- (B) Client_hello
- (C) Hello_request
- (D) Certificate_request
5. ________is used to create the organization’s overall security program.
- (A) Program
policy
- (B) Purpose
- (C) Security
- (D) None
of these
6. What types of protocols are used in VPNs?
- (A) Application
level protocols
- (B) Tunneling
protocols
- (C) Network
protocols
- (D) Mailing
protocols
7. In Symmetric schemes requires both parties to share how many secret key?
- (A) One
- (B) Two
- (C) Three
- (D) Four
8. IPSec is designed to provide security at the _________
- (A) Transport
layer
- (B) Network
layer
- (C) Application
layer
- (D) Session
layer
9. What is the key size allowed in PGP?
- (A) 1024-1056
- (B) 1024-4056
- (C) 1024-4096
- (D) 1024-2048
10. A ________network is used inside an organization.
- (A) Private
- (B) Public
- (C) Semi-private
- (D) Semi-public
11. Protection against Denial by one of these parties in a communication refers to?
- (A) Non-Repudiation
- (B) Data
integrity
- (C) Authentication
- (D) None
of these
12. _______ uses the idea of certificate trust levels.
- (A) X509
- (B) PGP
- (C) KDC
- (D) None
of the above
13. An act of protecting information from unauthorized disclosure to an entity.
- (A) Integrity
- (B) Arability
- (C) Confidentiality
- (D) None
of these
14. Blum Blum Shub Generator is based on which Algorithm?
- (A) Private
key
- (B) Public
key
- (C) Both
(a) & (b)
- (D) None
of these
15. ECC encryption system is _________
- (A) Symmetric
key encryption algorithm
- (B) Asymmetric
key encryption algorithm
- (C) Not
an encryption algorithm
- (D) Block
cipher method
Next Tests: