The document provides information about various topics related to cryptography and cybersecurity through a series of questions and answers. Some key points covered include:
- Cryptography is the process of encrypting plain text into unreadable cipher-text and decrypting cipher-text back to plain text. It aims to achieve goals like confidentiality, integrity, authentication and non-repudiation.
- There are different types of cryptosystems like symmetric-key, public key, hash functions and steganography. Classical cryptography operates on letters and digits while modern cryptography operates on binary bits.
- Cryptanalysis involves cracking cipher-text without the key. Encryption disguises plain text into cipher-text while decryption reverts
The document provides information about various topics related to cryptography and cybersecurity through a series of questions and answers. Some key points covered include:
- Cryptography is the process of encrypting plain text into unreadable cipher-text and decrypting cipher-text back to plain text. It aims to achieve goals like confidentiality, integrity, authentication and non-repudiation.
- There are different types of cryptosystems like symmetric-key, public key, hash functions and steganography. Classical cryptography operates on letters and digits while modern cryptography operates on binary bits.
- Cryptanalysis involves cracking cipher-text without the key. Encryption disguises plain text into cipher-text while decryption reverts
The document provides information about various topics related to cryptography and cybersecurity through a series of questions and answers. Some key points covered include:
- Cryptography is the process of encrypting plain text into unreadable cipher-text and decrypting cipher-text back to plain text. It aims to achieve goals like confidentiality, integrity, authentication and non-repudiation.
- There are different types of cryptosystems like symmetric-key, public key, hash functions and steganography. Classical cryptography operates on letters and digits while modern cryptography operates on binary bits.
- Cryptanalysis involves cracking cipher-text without the key. Encryption disguises plain text into cipher-text while decryption reverts
_________________ is the process or mechanism used for converting ordinary
plain text into garbled non-human readable text & vice-versa.
A) Malware Analysis B) Exploit writing C) Reverse engineering D) Cryptography ANSWER: D ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. A) Malware Analysis B) Cryptography C) Reverse engineering D) Exploit writing ANSWER: B When plain text is converted to unreadable format, it is termed as _____________ A) rotten text B) raw text C) cipher-text D) ciphen-text ANSWER: C Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data. A) secret key B) external programs C) add-ons D) secondary key ANSWER: A Cryptography can be divided into ______ types. A) 5 B) 4 C) 3 D) 2 ANSWER: D Data which is easily readable & understandable without any special algorithm or method is called _________________ A) cipher-text B) plain text C) raw text D) encrypted text ANSWER: B Plain text are also called _____________ A) cipher-text B) raw text C) clear-text D) encrypted text ANSWER: C Conventional cryptography is also known as _____________ or symmetric-key encryption. A) secret-key B) public key C) protected key D) primary key ANSWER: A Data Encryption Standard is an example of a _____________ cryptosystem. A) conventional B) public key C) hash key D) asymmetric-key ANSWER: A _______________ cryptography deals with traditional characters, i.e., letters & digits directly. A) Modern B) Classic C) Asymmetric D) Latest ANSWER: B A _____________ cryptography operates on binary-bit series and strings. A) Modern B) Classic C) Traditional D) Primitive ANSWER: A __________ cryptography has always been focussing on the concept of ‘security through obscurity’. A) Modern B) Asymmetric C) Classic D) Latest ANSWER: C ________________ cryptography is based on publicly known mathematically designed algorithms to encrypt the information. A) Modern B) Classic C) Traditional D) Primitive ANSWER: A _____________________ is the art & science of cracking the cipher-text without knowing the key. A) Cracking B) Cryptanalysis C) Cryptography D) Crypto-hacking ANSWER: B The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is called _________________ A) cryptanalysis B) decryption C) reverse engineering D) encryption ANSWER: D The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as ________________ A) cryptanalysis B) decryption C) reverse engineering D) encryption ANSWER: B Which of the following is not the primary objective of cryptography? A) Confidentiality B) Data Integrity C) Data Redundancy D) Authentication ANSWER: C Which of the following is not the primary objective of cryptography? A) Confidentiality B) Data Redundancy C) Non-repudiation D) Authentication ANSWER: B Cryptography offers a set of required security services. Which of the following is not among that 4 required security services? A) Encryption B) Message Authentication codes C) Hash functions D) Steganography ANSWER: D A cryptosystem is also termed as ______________ A) secure system B) cipher system C) cipher-text D) secure algorithm ANSWER: B ______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext. A) Encryption Algorithm B) Decryption Algorithm C) Hashing Algorithm D) Tuning Algorithm ANSWER: A A set of all probable decryption keys are collectively termed as ____________ A) key-stack B) key bunch C) key space D) key pack ANSWER: A Encryption-decryption in cryptosystem is done in ______ ways. A) 4 B) 3 C) 5 D) 2 ANSWER: D In _____________________ same keys are implemented for encrypting as well as decrypting the information. A) Symmetric Key Encryption B) Asymmetric Key Encryption C) Asymmetric Key Decryption D) Hash-based Key Encryption ANSWER: A In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information. A) Symmetric Key Encryption B) Asymmetric Key Encryption C) Asymmetric Key Decryption D) Hash-based Key Encryption ANSWER: B ____________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another letter in creating the cipher- text. A) Polyalphabetic Cipher B) Caesar Cipher C) Playfair Cipher D) Monoalphabetic Cipher ANSWER: B The procedure to add bits to the last block is termed as _________________ A) decryption B) hashing C) tuning D) padding ANSWER: D DES stands for ________________ A) Data Encryption Security B) Data Encrypted Standard C) Device Encryption Standard D) Data Encryption Standard ANSWER: D
There are _________ types of computer virus.
A) 5 B) 7 C) 10 D) 12 ANSWER: C Which of the following is not a type of virus? A) Boot sector B) Polymorphic C) Multipartite D) Trojans ANSWER: D A computer ________ is a malicious code which self-replicates by copying itself to other programs. A) program B) virus C) application D) worm ANSWER: B 4. Which of them is not an ideal way of spreading the virus? A) Infected website B) Emails C) Official Antivirus CDs D) USBs ANSWER: C In which year Apple II virus came into existence? A) 1979 B) 1980 C) 1981 D) 1982 ANSWER: C In mid-1981, the 1st virus for Apple computers with the name _________ came into existence. A) Apple I B) Apple II C) Apple III D) Apple Virus ANSWER: B The virus hides itself from getting detected by ______ different ways. A) 2 B) 3 C) 4 D) 5 ANSWER: B _______________ infects the master boot record and it is challenging and a complex task to remove this virus. A) Boot Sector Virus B) Polymorphic C) Multipartite D) Trojans ANSWER: A ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects. A) Boot Sector Virus B) Direct Action Virus C) Polymorphic Virus D) Multipartite Virus ANSWER: B Direct Action Virus is also known as ___________ A) Non-resident virus B) Boot Sector Virus C) Polymorphic Virus D) Multipartite Virus ANSWER: A ______________ infects the executables as well as the boot sectors. A) Non-resident virus B) Boot Sector Virus C) Polymorphic Virus D) Multipartite Virus ANSWER: D ______________ are difficult to identify as they keep on changing their type and signature. A) Non-resident virus B) Boot Sector Virus C) Polymorphic Virus D) Multipartite Virus ANSWER: C ____________ deletes all the files that it infects. A) Non-resident virus B) Overwrite Virus C) Polymorphic Virus D) Multipartite Virus ANSWER: B _____________ is also known as cavity virus. A) Non-resident virus B) Overwrite Virus C) Polymorphic Virus D) Space-filler Virus ANSWER: D Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus? A) Research purpose B) Pranks C) Identity theft D) Protection ANSWER: D In public key cryptosystem _____ keys are used for encryption and decryption. A) Same B) Different C) Encryption Keys D) None of the mentioned ANSWER: B In public key cryptosystem which is kept as public? A) Encryption keys B) Decryption keys C) Encryption & Decryption keys D) None of the mentioned ANSWER: A Pretty good privacy program is used for A) Electronic mails B) File encryption C) Electronic mails & File encryption D) None of the mentioned ANSWER: C PGP system uses A) Private key system B) Public key system C) Private & Public key system D) None of the mentioned ANSWER: C Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption. A) Messages, session key B) Session key, messages C) Can be used for both D) None of the mentioned ANSWER: A Which are called the block ciphers? A) IDEA B) CAST C) Triple-DES D) All of the mentioned ANSWER: D Which has a key length of 128 bits? A) IDEA B) Triple-DES C) IDEA & Triple-DES D) None of the mentioned ANSWER: A Which algorithm can be used to sign a message? A) Public key algorithm B) Private key algorithm C) Public & Private key algorithm D) None of the mentioned ANSWER: A A set of numbers is called as super increasing if A) Each element is greater than previous element B) Each element greater than sum of all the previous elements C) Each element greater than the average of all elements D) Each element lesser than the sum of all the elements ANSWER: B Knapsack problem can be solved by A) Public key cryptosystem B) Private key cryptosystem C) Public & Private key cryptosystem D) None of the mentioned ANSWER: A How many basic processes or steps are there in ethical hacking? A) 4 B) 5 C) 6 D) 7 ANSWER: C ____________ is the information gathering phase in ethical hacking from the target user. A) Reconnaissance B) Scanning C) Gaining access D) Maintaining access ANSWER: A Which of the following is not a reconnaissance tool or technique for information gathering? A) Hping B) NMAP C) Google Dorks D) Nexpose ANSWER: D There are ______ subtypes of reconnaissance. A) 2 B) 3 C) 4 D) 5 ANSWER: A Which of the following is an example of active reconnaissance? A) Searching public records B) Telephone calls as a help desk or fake customer care person C) Looking for the target’s details in the database D) Searching the target’s details in paper files ANSWER: B Which of the following is an example of passive reconnaissance? A) Telephonic calls to target victim B) Attacker as a fake person for Help Desk support C) Talk to the target user in person D) Search about target records in online people database ANSWER: D ________ phase in ethical hacking is known as the pre-attack phase. A) Reconnaissance B) Scanning C) Gaining access D) Maintaining access ANSWER: B While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking. A) Reconnaissance B) Scanning C) Gaining access D) Maintaining access ANSWER: B Which of them does not comes under scanning methodologies? A) Vulnerability scanning B) Sweeping C) Port Scanning D) Google Dorks ANSWER: D Which of them is not a scanning tool? A) NMAP B) Nexpose C) Maltego D) Nessus ANSWER: C A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase. A) security officer B) malicious hacker C) security auditor D) network analyst ANSWER: B In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later? A) Scanning B) Maintaining access C) Maintaining Access D) Gaining access ANSWER: C _______ is the tool used for this purpose. A) Powersploit B) Aircrack – ng C) Snort D) Nmap ANSWER: A Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system? A) Rootkits B) Backdoors C) Trojans D) Wireshark ANSWER: D In _______ phase, the hackers try to hide their footprints. A) Scanning B) Tracks clearing C) Reconnaissance D) Gaining access ANSWER: B Which of them is not a track clearing technique? A) Altering log files B) Tunnelling C) Port Scanning D) Footprint removing ANSWER: C __________ is the last phase of ethical hacking process. A) Scanning B) Tracks clearing C) Reconnaissance D) Reporting ANSWER: D Which of the following is not a footprint-scanning tool? A) SuperScan B) TcpView C) Maltego D) OWASP Zed ANSWER: C __________ is a popular tool used for discovering networks as well as in security auditing. A) Ettercap B) Metasploit C) Nmap D) Burp Suit ANSWER: C Wireshark is a ____________ tool. A) network protocol analysis B) network connection security C) connection analysis D) defending malicious packet-filtering ANSWER: A Which of the below-mentioned tool is used for Wi-Fi hacking? A) Wireshark B) Nessus C) Aircrack-ng D) Snort ANSWER: C _____________ is a popular IP address and port scanner. A) Cain and Abel B) Snort C) Angry IP Scanner D) Ettercap ANSWER: C Divide [HAPPY]26 by [SAD]26. We get quotient – A) KD B) LD C) JC D) MC ANSWER: A Dividing [11001001] by [100111] gives remainder – A) 11 B) 111 C) 101 D) 110 ANSWER: D pi in terms of base 26 is A) C.DRS B) D.SQR C) D.DRS D) D.DSS ANSWER: C The time required to convert a k-bit integer to its representation in the base 10 in terms of big-O notation is A) O[log2n] B) O[log2n] C) O[log22n] D) O[2logn] ANSWER: A Division of 131B6C3 base 16 by lA2F base 16 yeilds – A) 1AD B) DAD C) BAD D) 9AD ANSWER: D The estimated computations required to crack a password of 6 characters from the 26 letter alphabet is- A) 308915776 B) 11881376 C) 456976 D) 8031810176 ANSWER: A SSM stands for A) Secure Security Module B) Session Security Module C) Service Session Module D) Session Service Module ANSWER: B