Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

_________________ is the process or mechanism used for converting ordinary

plain text into garbled non-human readable text & vice-versa.


A) Malware Analysis
B) Exploit writing
C) Reverse engineering
D) Cryptography
ANSWER: D
______________ is a means of storing & transmitting information in a
specific format so that only those for whom it is planned can understand
or process it.
A) Malware Analysis
B) Cryptography
C) Reverse engineering
D) Exploit writing
ANSWER: B
When plain text is converted to unreadable format, it is termed as
_____________
A) rotten text
B) raw text
C) cipher-text
D) ciphen-text
ANSWER: C
Cryptographic algorithms are based on mathematical algorithms where these
algorithms use ___________ for a secure transformation of data.
A) secret key
B) external programs
C) add-ons
D) secondary key
ANSWER: A
Cryptography can be divided into ______ types.
A) 5
B) 4
C) 3
D) 2
ANSWER: D
Data which is easily readable & understandable without any special
algorithm or method is called _________________
A) cipher-text
B) plain text
C) raw text
D) encrypted text
ANSWER: B
Plain text are also called _____________
A) cipher-text
B) raw text
C) clear-text
D) encrypted text
ANSWER: C
Conventional cryptography is also known as _____________ or symmetric-key
encryption.
A) secret-key
B) public key
C) protected key
D) primary key
ANSWER: A
Data Encryption Standard is an example of a _____________ cryptosystem.
A) conventional
B) public key
C) hash key
D) asymmetric-key
ANSWER: A
_______________ cryptography deals with traditional characters, i.e.,
letters & digits directly.
A) Modern
B) Classic
C) Asymmetric
D) Latest
ANSWER: B
A _____________ cryptography operates on binary-bit series and strings.
A) Modern
B) Classic
C) Traditional
D) Primitive
ANSWER: A
__________ cryptography has always been focussing on the concept of
‘security through obscurity’.
A) Modern
B) Asymmetric
C) Classic
D) Latest
ANSWER: C
________________ cryptography is based on publicly known mathematically
designed algorithms to encrypt the information.
A) Modern
B) Classic
C) Traditional
D) Primitive
ANSWER: A
_____________________ is the art & science of cracking the cipher-text
without knowing the key.
A) Cracking
B) Cryptanalysis
C) Cryptography
D) Crypto-hacking
ANSWER: B
The process of disguising plaintext in such a way that its substance gets
hidden (into what is known as cipher-text) is called _________________
A) cryptanalysis
B) decryption
C) reverse engineering
D) encryption
ANSWER: D
The method of reverting the encrypted text which is known as cipher text
to its original form i.e. plain text is known as ________________
A) cryptanalysis
B) decryption
C) reverse engineering
D) encryption
ANSWER: B
Which of the following is not the primary objective of cryptography?
A) Confidentiality
B) Data Integrity
C) Data Redundancy
D) Authentication
ANSWER: C
Which of the following is not the primary objective of cryptography?
A) Confidentiality
B) Data Redundancy
C) Non-repudiation
D) Authentication
ANSWER: B
Cryptography offers a set of required security services. Which of the
following is not among that 4 required security services?
A) Encryption
B) Message Authentication codes
C) Hash functions
D) Steganography
ANSWER: D
A cryptosystem is also termed as ______________
A) secure system
B) cipher system
C) cipher-text
D) secure algorithm
ANSWER: B
______________ is the mathematical procedure or algorithm which produces a
cipher-text for any specified plaintext.
A) Encryption Algorithm
B) Decryption Algorithm
C) Hashing Algorithm
D) Tuning Algorithm
ANSWER: A
A set of all probable decryption keys are collectively termed as
____________
A) key-stack
B) key bunch
C) key space
D) key pack
ANSWER: A
Encryption-decryption in cryptosystem is done in ______ ways.
A) 4
B) 3
C) 5
D) 2
ANSWER: D
In _____________________ same keys are implemented for encrypting as well
as decrypting the information.
A) Symmetric Key Encryption
B) Asymmetric Key Encryption
C) Asymmetric Key Decryption
D) Hash-based Key Encryption
ANSWER: A
In __________________ 2 different keys are implemented for encrypting as
well as decrypting that particular information.
A) Symmetric Key Encryption
B) Asymmetric Key Encryption
C) Asymmetric Key Decryption
D) Hash-based Key Encryption
ANSWER: B
____________ is a mono-alphabetic encryption code wherein each & every
letter of plain-text is replaced by another letter in creating the cipher-
text.
A) Polyalphabetic Cipher
B) Caesar Cipher
C) Playfair Cipher
D) Monoalphabetic Cipher
ANSWER: B
The procedure to add bits to the last block is termed as _________________
A) decryption
B) hashing
C) tuning
D) padding
ANSWER: D
DES stands for ________________
A) Data Encryption Security
B) Data Encrypted Standard
C) Device Encryption Standard
D) Data Encryption Standard
ANSWER: D

There are _________ types of computer virus.


A) 5
B) 7
C) 10
D) 12
ANSWER: C
Which of the following is not a type of virus?
A) Boot sector
B) Polymorphic
C) Multipartite
D) Trojans
ANSWER: D
A computer ________ is a malicious code which self-replicates by copying
itself to other programs.
A) program
B) virus
C) application
D) worm
ANSWER: B
4. Which of them is not an ideal way of spreading the virus?
A) Infected website
B) Emails
C) Official Antivirus CDs
D) USBs
ANSWER: C
In which year Apple II virus came into existence?
A) 1979
B) 1980
C) 1981
D) 1982
ANSWER: C
In mid-1981, the 1st virus for Apple computers with the name _________
came into existence.
A) Apple I
B) Apple II
C) Apple III
D) Apple Virus
ANSWER: B
The virus hides itself from getting detected by ______ different ways.
A) 2
B) 3
C) 4
D) 5
ANSWER: B
_______________ infects the master boot record and it is challenging and a
complex task to remove this virus.
A) Boot Sector Virus
B) Polymorphic
C) Multipartite
D) Trojans
ANSWER: A
________________ gets installed & stays hidden in your computer’s memory.
It stays involved to the specific type of files which it infects.
A) Boot Sector Virus
B) Direct Action Virus
C) Polymorphic Virus
D) Multipartite Virus
ANSWER: B
Direct Action Virus is also known as ___________
A) Non-resident virus
B) Boot Sector Virus
C) Polymorphic Virus
D) Multipartite Virus
ANSWER: A
______________ infects the executables as well as the boot sectors.
A) Non-resident virus
B) Boot Sector Virus
C) Polymorphic Virus
D) Multipartite Virus
ANSWER: D
______________ are difficult to identify as they keep on changing their
type and signature.
A) Non-resident virus
B) Boot Sector Virus
C) Polymorphic Virus
D) Multipartite Virus
ANSWER: C
____________ deletes all the files that it infects.
A) Non-resident virus
B) Overwrite Virus
C) Polymorphic Virus
D) Multipartite Virus
ANSWER: B
_____________ is also known as cavity virus.
A) Non-resident virus
B) Overwrite Virus
C) Polymorphic Virus
D) Space-filler Virus
ANSWER: D
Which of the below-mentioned reasons do not satisfy the reason why people
create a computer virus?
A) Research purpose
B) Pranks
C) Identity theft
D) Protection
ANSWER: D
In public key cryptosystem _____ keys are used for encryption and
decryption.
A) Same
B) Different
C) Encryption Keys
D) None of the mentioned
ANSWER: B
In public key cryptosystem which is kept as public?
A) Encryption keys
B) Decryption keys
C) Encryption & Decryption keys
D) None of the mentioned
ANSWER: A
Pretty good privacy program is used for
A) Electronic mails
B) File encryption
C) Electronic mails & File encryption
D) None of the mentioned
ANSWER: C
PGP system uses
A) Private key system
B) Public key system
C) Private & Public key system
D) None of the mentioned
ANSWER: C
Private key algorithm is used for _____ encryption and public key
algorithm is used for _____ encryption.
A) Messages, session key
B) Session key, messages
C) Can be used for both
D) None of the mentioned
ANSWER: A
Which are called the block ciphers?
A) IDEA
B) CAST
C) Triple-DES
D) All of the mentioned
ANSWER: D
Which has a key length of 128 bits?
A) IDEA
B) Triple-DES
C) IDEA & Triple-DES
D) None of the mentioned
ANSWER: A
Which algorithm can be used to sign a message?
A) Public key algorithm
B) Private key algorithm
C) Public & Private key algorithm
D) None of the mentioned
ANSWER: A
A set of numbers is called as super increasing if
A) Each element is greater than previous element
B) Each element greater than sum of all the previous elements
C) Each element greater than the average of all elements
D) Each element lesser than the sum of all the elements
ANSWER: B
Knapsack problem can be solved by
A) Public key cryptosystem
B) Private key cryptosystem
C) Public & Private key cryptosystem
D) None of the mentioned
ANSWER: A
How many basic processes or steps are there in ethical hacking?
A) 4
B) 5
C) 6
D) 7
ANSWER: C
____________ is the information gathering phase in ethical hacking from
the target user.
A) Reconnaissance
B) Scanning
C) Gaining access
D) Maintaining access
ANSWER: A
Which of the following is not a reconnaissance tool or technique for
information gathering?
A) Hping
B) NMAP
C) Google Dorks
D) Nexpose
ANSWER: D
There are ______ subtypes of reconnaissance.
A) 2
B) 3
C) 4
D) 5
ANSWER: A
Which of the following is an example of active reconnaissance?
A) Searching public records
B) Telephone calls as a help desk or fake customer care person
C) Looking for the target’s details in the database
D) Searching the target’s details in paper files
ANSWER: B
Which of the following is an example of passive reconnaissance?
A) Telephonic calls to target victim
B) Attacker as a fake person for Help Desk support
C) Talk to the target user in person
D) Search about target records in online people database
ANSWER: D
________ phase in ethical hacking is known as the pre-attack phase.
A) Reconnaissance
B) Scanning
C) Gaining access
D) Maintaining access
ANSWER: B
While looking for a single entry point where penetration testers can test
the vulnerability, they use ______ phase of ethical hacking.
A) Reconnaissance
B) Scanning
C) Gaining access
D) Maintaining access
ANSWER: B
Which of them does not comes under scanning methodologies?
A) Vulnerability scanning
B) Sweeping
C) Port Scanning
D) Google Dorks
ANSWER: D
Which of them is not a scanning tool?
A) NMAP
B) Nexpose
C) Maltego
D) Nessus
ANSWER: C
A _________ can gain access illegally to a system if the system is not
properly tested in scanning and gaining access phase.
A) security officer
B) malicious hacker
C) security auditor
D) network analyst
ANSWER: B
In which phase, the hackers install backdoors so that his/her ownership
with the victim’s system can be retained later?
A) Scanning
B) Maintaining access
C) Maintaining Access
D) Gaining access
ANSWER: C
_______ is the tool used for this purpose.
A) Powersploit
B) Aircrack – ng
C) Snort
D) Nmap
ANSWER: A
Which of the following hacking tools and techniques hackers’ do not use
for maintaining access in a system?
A) Rootkits
B) Backdoors
C) Trojans
D) Wireshark
ANSWER: D
In _______ phase, the hackers try to hide their footprints.
A) Scanning
B) Tracks clearing
C) Reconnaissance
D) Gaining access
ANSWER: B
Which of them is not a track clearing technique?
A) Altering log files
B) Tunnelling
C) Port Scanning
D) Footprint removing
ANSWER: C
__________ is the last phase of ethical hacking process.
A) Scanning
B) Tracks clearing
C) Reconnaissance
D) Reporting
ANSWER: D
Which of the following is not a footprint-scanning tool?
A) SuperScan
B) TcpView
C) Maltego
D) OWASP Zed
ANSWER: C
__________ is a popular tool used for discovering networks as well as in
security auditing.
A) Ettercap
B) Metasploit
C) Nmap
D) Burp Suit
ANSWER: C
Wireshark is a ____________ tool.
A) network protocol analysis
B) network connection security
C) connection analysis
D) defending malicious packet-filtering
ANSWER: A
Which of the below-mentioned tool is used for Wi-Fi hacking?
A) Wireshark
B) Nessus
C) Aircrack-ng
D) Snort
ANSWER: C
_____________ is a popular IP address and port scanner.
A) Cain and Abel
B) Snort
C) Angry IP Scanner
D) Ettercap
ANSWER: C
Divide [HAPPY]26 by [SAD]26. We get quotient –
A) KD
B) LD
C) JC
D) MC
ANSWER: A
Dividing [11001001] by [100111] gives remainder –
A) 11
B) 111
C) 101
D) 110
ANSWER: D
pi in terms of base 26 is
A) C.DRS
B) D.SQR
C) D.DRS
D) D.DSS
ANSWER: C
The time required to convert a k-bit integer to its representation in the
base 10 in terms of big-O notation is
A) O[log2n]
B) O[log2n]
C) O[log22n]
D) O[2logn]
ANSWER: A
Division of 131B6C3 base 16 by lA2F base 16 yeilds –
A) 1AD
B) DAD
C) BAD
D) 9AD
ANSWER: D
The estimated computations required to crack a password of 6 characters
from the 26 letter alphabet is-
A) 308915776
B) 11881376
C) 456976
D) 8031810176
ANSWER: A
SSM stands for
A) Secure Security Module
B) Session Security Module
C) Service Session Module
D) Session Service Module
ANSWER: B

You might also like