Professional Documents
Culture Documents
MBA Semester IV MCQ Information Security IV
MBA Semester IV MCQ Information Security IV
1. _____ Moinitor User activity at on Internet and transmit it to someone else at background
A : Malware
B : Spyware
C : addware
D : worm
Ans:B
Ans:C
A : Passive attack
B : Active attack
D : Scanned
Ans:A
A : Spamming
B : Identify Theft
C : Impersonation
D : Scanning
Ans:C
B : An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols.
Ans:B
6. What is the best statement for taking advantage of a weakness in the security of an IT system?
A : Threat
B : Attack
C : Exploit
D : Vulnerability
Ans:C
A : Message authentication
B : Entity authentication
C : Message confidentiality
D : Nonrepudiation
Ans:B
A : Malfunctioned Software
B : Multipurpose Software
C : Malicious Software
D : Malfunctioning of Security
Ans:C
9.When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.
Ans:D
10. This is the model designed for guiding the policies of Information security within a company, firm or organization.
What is “this” referred to here?
A : Confidentiality
B : Non-repudiation
C : CIA Triad
D : Authenticity
Ans:C
11. In general how many key elements constitute the entire security structure?
A:1
B:2
C:3
D:4
Ans:4
12:Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
Ans:C
13.This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack
referred to here?
A : SQL injection
B : HTML Injection
Ans:C
A : Eavesdropping
B : MAC Spoofing
C : Wireless Hijacking
D : Phishing
Ans:D
A : Keyhijacking
B : Keyjacking
C : Keylogging
D : Keyboard monitoring
Ans:C
16.These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and
actions over a digital medium
A : Malware
C : Keyloggers
D : Spyware
Ans:D
17.In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained
later?
A : Scanning
B : Maintaining control
C : Maintaining access
D : Gaining access
Ans:C
18.Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
A : Rootkits
B : Backdoors
C : Trojans
D : Wireshark
Ans:D
19.DES follows
A : Hash Algorithm
B : Caesars Cipher
C : Feistel Cipher Structure
D : SP Networks
Ans:C
A : 128 Bits
B : 32 Bits
C : 64 Bits
D : 16 Bits
Ans:C
A : ABANDONED LOCK
B : ENCRYPTED TEXT
C : ABANDONED TEXT
D : ENCRYPTED LOCK
Ans:C
A:2
B:3
C : 2 or 3
D : 3 or 4
Ans: C
A : sender
B : receiver
Ans: B
A : transpositional ciphers
B : substitution ciphers
D : quadratic ciphers
Ans: A
25. _____ Data Encryption Standard (DES) operating modes can be used for large messages with the assurance that
an error early in the encryption/decryption process won’t spoil results throughout the communication?
Ans: D
B : Hill cipher
C : Playfair cipher
D : Additive cipher
Ans: D
A : meet-in-the-middle
B : Linear cryptanalysis
C : Differential cryptanalysis
D : Statistical cryptanalysis
Ans:A
A : The key indicates which funcion is used for encryption. Thereby it is more difficult to decrypt a intercepted
message as the function is unknown.
B : The key contains the secret function for encryption including parameters. Only a password can activate the key.
C : All functions are public, only the key is secret. It contains the parameters used for the encryption resp.
decryption.
D : The key prevents the user of having to reinstall the software at each change in technology or in the functions for
encryption.
Ans: C
29. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.
A : 23
B : 46
C : 11
D : 54
Ans: C
A : 32
B : 56
C : 48
D : 96
Ans:
Ans: A
A : ECB
B : CFB
C : CBF
D : CBC
Ans:C
33.For the AES-128 algorithm there are __________ similar rounds and _________ round is different.
B : 9 ; the last
D : 10 ; no
Ans: B
34.On comparing AES with DES, which of the following functions from DES does not have an equivalent AES
function?
A : f function
B : permutation p
C : swapping of halves
Ans: C
35.What is the length of the cryptographic key used in the Data Encryption Standard (DES) cryptosystem?
A : 56 bits
B : 128 bits
C : 192 bits
D : 256 bits
Ans:A
36.In the 1940s, a team of cryptanalysts from the United States successfully broke a Soviet code based upon a one-
time pad in a project known as VENONA. What rule did the Soviets break that caused this failure?
Ans: A
37.When a hash function is used to provide message authentication, the hash function value is referred to as
A : Message Field
B : Message Digest
C : Message Score
D : Message Leap
Ans: B
D : A scheme in which the password is passed through a PRF, which is then stored
Ans: C
39. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the
following cipher systems?
A : Fortezza
B : Anonymous Diffie-Hellman
D : RSA
Ans: C
40.Which of the following are used to generate a message digest by the network security protocols?
Ans: B
41. Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
Ans: A
A : 22n
B : 2n
C : 2-n
D : 2-2n
Ans: B
43.Certificate extensions fall into 3 categories. Which one of the following is not a Certificate extensions category?
A : Subject and Issuer attributes
Ans: D
A : transport layer
B : network layer
C : application layer
D : presentation layer
Ans: B
45.Typically, ______ can receive application data from any application layer protocol, but the protocol is normally
HTTP.
A : SSL
B : TLS
D : none of above
Ans: C
A : Flags
B : Offset
C : TOS
D : Identifier
Ans: C
A : Alert Protocol
B : Handshake Protoco
C : Alarm Protocol
Ans: A
48. Encapsulating Security Payload (ESP) belongs to which Internet Security Protocol?
B : Secure IP Protocol
Ans: B
49.Which protocol is used to convey SSL related alerts to the peer entity?
A : Alert Protocol
B : Handshake Protocol
C : Upper-Layer Protocol
Ans: A
50. Which of the statements are not true to classify VPN systems?
Ans: C