Professional Documents
Culture Documents
2 - امنية المعلومات - إمتحان تجريبي، الترم الأول - للعام 1445 ه
2 - امنية المعلومات - إمتحان تجريبي، الترم الأول - للعام 1445 ه
(1 - 7)
27/10/2023 :ﺍﻟﺘﺄﺭﻳﺦ ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ
ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ:ﺍﻟﻤﻘﺮﺭ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ
ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ. ﺩ:ﺍﻟﻤﺪﺭﺱ ﺍﻷﻣﻦ ﺍﻟﺴﻴﺒﺮﺍﻧﻲ ﻭﺍﻟﺸﺒﻜﺎﺕ
ﺍﺭﺑﻊ ﺳﺎﻋﺎﺕ:ﺍﻟﺰﻣﻦ
a. signature.
b. encoder.
c. obfuscation.
d. decoder.
3. OPENSSL is a cryptographic ........... for applications that can protect communications from sniffing.
a. toolkit.
b. plan.
c. system.
d. algorithm.
4. ......... is developed to avoid larger cryptographic private and public key usage.
a. Quantum Cryptography.
b. Digatal Signature Algorithm.
c. Homomorphic Encryption.
d. Elliptic Curve Cryptography.
5. HPKP stands for ................ key pinning
a. HUB Private.
b. HTTP Public.
c. HTTP private.
d. HUB Public.
6. A modern technology that used for record and store the history of transactions in the form of blocks.
a. ChainBlock.
b. Blockchain.
c. BlockCypher.
d. Cypherchain.
7. what is the most basic form of authentication
a. PAP.
b. CHAP.
c. CAP.
d. HAP.
8. DER is a bingary encoding digital certificate format that used for both certificates and ............. keys
a. short.
b. public.
c. long.
d. private.
9. HPKP allows a web client to associate a specific .... key certificate with a particular server to minize the
risk of ........... attacks
a. MITE.
b. MITM.
c. MTIM.
d. TIME.
10. In DLT, multiple transactions are processed using multiple ........... which are linked togehter.
a. blocks.
b. chains.
c. files.
d. commands.
11. The techniques of hiding a secret message with a normal message.
a. Hashing.
b. Cryptography.
c. Blockchain.
d. Stegnography.
12. ............ encryption is a type of encryption that uses a key by sender and differnet key by reciver.
a. symmetric.
b. public.
c. asymmetric.
d. private.
13. A truest model, in which one master CA is the initial point of trust.
a. Hierarchical .
b. hybrid.
c. bridge.
d. peer-to-peer.
14. public key encryption is used ................. amount of data.
a. best.
b. bad.
c. small.
d. large.
(2 - 7)
27/10/2023 :ﺍﻟﺘﺄﺭﻳﺦ ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ
ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ:ﺍﻟﻤﻘﺮﺭ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ
ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ. ﺩ:ﺍﻟﻤﺪﺭﺱ ﺍﻷﻣﻦ ﺍﻟﺴﻴﺒﺮﺍﻧﻲ ﻭﺍﻟﺸﺒﻜﺎﺕ
ﺍﺭﺑﻊ ﺳﺎﻋﺎﺕ:ﺍﻟﺰﻣﻦ
(3 - 7)
27/10/2023 :ﺍﻟﺘﺄﺭﻳﺦ ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ
ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ:ﺍﻟﻤﻘﺮﺭ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ
ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ. ﺩ:ﺍﻟﻤﺪﺭﺱ ﺍﻷﻣﻦ ﺍﻟﺴﻴﺒﺮﺍﻧﻲ ﻭﺍﻟﺸﺒﻜﺎﺕ
ﺍﺭﺑﻊ ﺳﺎﻋﺎﺕ:ﺍﻟﺰﻣﻦ
a. RSA.
b. AES.
c. ECC.
d. DSA.
28. Hiding the content of data is one of crytpography goals by using ..................... techniques.
a. decryption.
b. lightweight.
c. obfuscation.
d. encryption .
29. ................... is designed to encipher and decipher blocks of data consisting of 64 bits and 56 bit key.
a. CR6.
b. AES.
c. CR5.
d. DES.
30. Key management controls the complete ............. of the keys used in cryptosystem
a. usages.
b. lifecyle.
c. process.
d. exchange.
31. Private key encryption is used ................. amount of data.
a. small.
b. bad.
c. best.
d. large.
32. Digital Certificate expiry date could be known by an attribute called valid ..............
a. in.
b. by.
c. from.
d. to.
33. SHA is a hash function, is an abbriviation of .............................. algorithm
a. saving digest.
b. secure hashing.
c. saver hashing.
d. secure digest.
34. DSA and RSA are both ......................... algorithm
a. symmetric.
b. asymmetric.
c. de-facto.
d. standard.
35. Message hash code, private key and signature function are used for generating ...................
a. data cetrtification.
b. hash function.
c. message digest.
d. digital signature .
36. Thmubprint algorithm specifies the hashing algorithm used for digital .........................
a. encryption.
b. certification.
c. hashing.
d. signature.
37. The scramble code that results from the conversion of data is called .......
a. encryption.
b. plaintext.
c. decryption.
d. ciphertext.
38. In Key Escrow a certified third-party is keep secret keys which is useful as a ..................... for
cryptographic keys.
a. recovery.
b. intermediary.
c. backup.
d. mangement .
39. Has functions are not deployed for ..............
a. digital signature applications.
b. file integrity checking.
c. storing passwords.
d. plaintext data ecncryption .
(4 - 7)
27/10/2023 :ﺍﻟﺘﺄﺭﻳﺦ ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ
ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ:ﺍﻟﻤﻘﺮﺭ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ
ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ. ﺩ:ﺍﻟﻤﺪﺭﺱ ﺍﻷﻣﻦ ﺍﻟﺴﻴﺒﺮﺍﻧﻲ ﻭﺍﻟﺸﺒﻜﺎﺕ
ﺍﺭﺑﻊ ﺳﺎﻋﺎﺕ:ﺍﻟﺰﻣﻦ
a. cryptoanalysis.
b. stagnography.
c. cryptography.
d. ciphertext.
41. Digital signature is used to protect data ........................
a. secrecy.
b. privacy.
c. integrity.
d. availability.
42. ................... cryptography algorihms are aimed at low-complexity applications such as RFID tags.
a. lightcost.
b. heavyweight.
c. lightweight.
d. highweight.
43. A parameterized algorithm with a variable block size, variable key size, and variable number of rounds.
a. RC6.
b. RC4.
c. RC3.
d. RC5.
44. Key stretching is the process of ................. a key that might be too .......... usally by making it ................
a. strenghening, longer, weak.
b. longer, weak, strenghening.
c. strenghening, weak, longer.
d. weak, strenghening, longer,.
45. A digital certificate type that used for protect multiple websites with a single SSL certificate
a. code signing.
b. sel-signed.
c. wildcard.
d. SAN.
46. A derivation of the .................. algorihm is converted to hashing algorithm to hash a password and add
salt to it for key stetching purposes.
a. blowfish .
b. nanofish.
c. microfish.
d. bluefish.
47. One of the following is not an objective of cryptography.
a. spamming.
b. authentication .
c. integrity.
d. confidentiality.
............ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﻟﺸﺒﻜﺎﺕ ﻭﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻳﺤﺘﺎﺝ ﺇﻟﻰ ﺷﺨﺺ ﻋﻨﺪﻩ ﺧﺒﺮﺓ ﻛﺒﻴﺮﺓ ﻓﻲ.48
a. ..
b. ..
c. .....
d. ..
49. A chain of trust established by a set of certificates starting from the server certificates and ending with
the root certificates
a. Certificate Escrow.
b. Certificate chaining.
c. Key Escrow.
d. Key chaining.
50. 3DES ciphers are used instade of DES, due to the inherent ................ of DES.
a. weakness.
b. fastness.
c. strength.
d. slowness.
51. Digatal signature used two functions, .................. function and ............. function.
a. creating, verification.
b. signature, hashing.
c. creating, hashing.
d. signature, verification.
52. The process of data conversion into scrambled code that sent across private and public network.
(5 - 7)
27/10/2023 :ﺍﻟﺘﺄﺭﻳﺦ ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ
ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ:ﺍﻟﻤﻘﺮﺭ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ
ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ. ﺩ:ﺍﻟﻤﺪﺭﺱ ﺍﻷﻣﻦ ﺍﻟﺴﻴﺒﺮﺍﻧﻲ ﻭﺍﻟﺸﺒﻜﺎﺕ
ﺍﺭﺑﻊ ﺳﺎﻋﺎﺕ:ﺍﻟﺰﻣﻦ
a. decoding.
b. encryption .
c. decryption .
d. encoding .
53. ............ is an internet encryption and authentication system that its algorithm was developed by three
scientists and it takes thier names first letters.
a. DSA.
b. DES.
c. RSA.
d. AES.
54. The digital certificates are used for protecting transmission of .................. keys securely
a. short.
b. public.
c. long.
d. private.
55. .... is a symmetric key block cipher derived from .......... with two additional features.
a. RC6, RC5.
b. RC5, RC6.
c. RC4, RC3.
d. RC3, RC4.
56. A trust model, in which everyone in the network is a certificate authority.
a. bridge trust model.
b. hybrid trust model.
c. Hierarchical trust model.
d. web of trust model.
57. An advanced cryptographic algorithm designed to protect security for both conventional and quantum
computers.
a. elliptic curve cryptography.
b. homomorphic encryption .
c. post-quantum cryptography.
d. quantum cryptography.
58. sending a challeng message to the peer is used in the challenge-handshake ........... protocol
a. adminstration.
b. authentication .
c. authorization.
d. controling.
59. An asymmetric algorithm inwhich encryption and decryption are done by the same key holder.
a. Homomorphic Encryption.
b. Elliptic Curve Cryptography.
c. Quantum cryptography.
d. Digital Signature Algorithm.
60. One of the following is not a public key encryption algorithm.
a. ECC.
b. AES.
c. RSA.
d. DSA.
61. certificate revocation list is used for checking the certificate status, which also may done using
....................
a. OSPC.
b. CRL.
c. OCSP.
d. RCL.
62. ............ encryption is a type of encryption that uses the same key by sender and reciver.
a. public .
b. private.
c. asymmetric.
d. symmetric.
63. Substitution cipher is one of ......................... ciphers
a. modern .
b. strong.
c. excelent.
d. classical .
64. ..................... is a symmetric alogrithm that may has a 128-bit block size with key sizes of 128 bits for
.......-128 version or longer.
(6 - 7)
27/10/2023 :ﺍﻟﺘﺄﺭﻳﺦ ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ
ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ:ﺍﻟﻤﻘﺮﺭ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺗﻜﻨﻮﻟﻮﺟﻴﺎ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ
ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ. ﺩ:ﺍﻟﻤﺪﺭﺱ ﺍﻷﻣﻦ ﺍﻟﺴﻴﺒﺮﺍﻧﻲ ﻭﺍﻟﺸﺒﻜﺎﺕ
ﺍﺭﺑﻊ ﺳﺎﻋﺎﺕ:ﺍﻟﺰﻣﻦ
a. TSL.
b. DES.
c. AES.
d. SSL.
65. ............ takes a message as the input and then outputs a 128-bits fingerprint or message digest of the
input.
a. MD5.
b. MD4.
c. MD7.
d. MD6.
66. Hash value may called .........................
a. message digest.
b. memory digest.
c. footprinting.
d. lightprinting.
67. It is recommended to use modern algorihm than MD5 due to it non ............. resistant.
a. collision.
b. attacks.
c. encryption.
d. obfuscation.
68. An alternative version of the common method for determining the revocation status of SSL certificates.
a. certificate status.
b. certificate response.
c. certificate stapling.
d. certificate pinning.
69. An algorithm that can be used in the generation and verification of digital signatures for sensitive
applications.
a. DES.
b. RSA.
c. AES.
d. DSA.
70. Sponge construction is used for solving the problem of block size in .......................
a. SHA-3.
b. SHA-1.
c. SHA-2.
d. SHA-4.
71. One of the following is not from the limitations of cryptography
a. computational overhead.
b. entropy.
c. speed.
d. lightweight devices.
72. The SPAP is a ........... version of PAP
a. proprietary.
b. asymmerty.
c. symmetry.
d. public.
73. In peer-to-peer trust model, clients depend on their ........... CAs
a. intermediary.
b. local.
c. root.
d. global.
74. In internet key exchange second phase, a host negotiates SA security ............ to be used with IPsec.
a. parameters .
b. methods.
c. connections.
d. protocols.
(7 - 7)