0% found this document useful (0 votes)
23 views12 pages

C) Protecting Assets of A Computer System

Uploaded by

zzk9014
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views12 pages

C) Protecting Assets of A Computer System

Uploaded by

zzk9014
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

1. What is computer security primarily concerned with?

A) Protecting hardware only

B) Protecting software only

C) Protecting assets of a computer system

D) Protecting internet speed

2. Network security focuses on protecting:

A) Data during transmission

B) Hardware components

C) Software applications

D) Physical access points

3. The ITU-T Recommendation X.800 describes network security aspects including:

A) Security management

B) Security service

C) Security cost

D) Security support

4. Which of the following is a passive attack?

A) Message modification

B) Denial of service

C) Eavesdropping

D) Message creation

5. A characteristic of passive attacks is that they are:

A) Easy to detect

B) Difficult to detect

C) Always preventable

D) Legal under some laws


6. An example of an active attack is:

A) Eavesdropping

B) Network scanning

C) Message replay

D) Encryption

7. Which of these is NOT a category of active attacks?

A) Modification of messages

B) Replay attacks

C) Data origin authentication

D) Masquerade

8. Data confidentiality aims to:

A) Prevent unauthorized disclosure of data

B) Ensure data modification

C) Enable data replication

D) Control data access timing

9. The primary goal of data integrity is to:

A) Detect non-integrity of data

B) Authorize data changes

C) Confirm data availability

D) Encrypt data

10. Entity authentication ensures that:

A) Data is received correctly

B) The identity of a party is as claimed

C) Messages are encrypted

D) Data is checked for integrity


11. Non-repudiation prevents:

A) Denial of sending or receiving a message

B) Unauthorized data access

C) Replay attacks

D) Data encryption

12. Which mechanism aims to prevent unauthorized use of a resource?

A) Availability

B) Access control

C) Integrity checks

D) Data confidentiality

13. The security goal of availability ensures that systems are:

A) Used by anyone freely

B) Accessible to legitimate users when needed

C) Constantly online without breaks

D) Prone to passive attacks

14. Symmetric-key encryption involves:

A) Public-key infrastructure

B) The same key for encryption and decryption

C) Multiple public keys for data transfer

D) Only digital signatures

15. In public-key encryption, the encryption and decryption keys are:

A) Identical

B) Public only

C) Different

D) Used interchangeably
16. A hash function in network security is used to:

A) Encrypt data

B) Authenticate entities

C) Produce a fixed-size string from data

D) Manage network traffic

17. Digital signatures help in achieving:

A) Data confidentiality only

B) Non-repudiation and authentication

C) Data replication

D) Message encoding

18. Message authentication codes (MACs) are primarily used for:

A) Entity authentication

B) Message integrity and authenticity

C) Access control

D) Data encryption

19. An example of an entity authentication protocol is:

A) Denial of service prevention

B) IP blocking

C) Password verification

D) Data encryption

20. To detect and recover from active attacks, a common defense mechanism includes:

A) Encryption only

B) Detection and response protocols

C) Avoiding internet use

D) Using passive monitoring techniques


21. What is the objective of cryptanalysis?

A) To hide plaintext

B) To recover plaintext or the secret key

C) To create new ciphers

D) To encrypt data

22. According to Kerkhoff's principle, what is known by the adversary?

A) Only the ciphertext

B) Only the encryption algorithm

C) Everything except the secret key

D) The plaintext and key

23. What is the brute-force attack method?

A) Guessing the plaintext directly

B) Trying every possible key to decrypt ciphertext

C) Using statistical analysis to decrypt

D) None of the above

24. In a brute-force attack, how much of the key space needs to be tried on average?

A) All possible keys

B) Half of all possible keys

C) Only a quarter of the keys

D) Just one key

25. Which key size would take the longest time to break at 1 decryption per microsecond?

A) 32 bits

B) 56 bits

C) 128 bits

D) 168 bits
Ahmed Al-Mamouri
26. Which attack type only has access to the ciphertext?

A) Ciphertext-only attack

B) Known-plaintext attack

C) Chosen-plaintext attack

D) Chosen-ciphertext attack

27. What is a known-plaintext attack?

A) Attacker has only the ciphertext

B) Attacker has pairs of plaintext and ciphertext

C) Attacker has plaintext messages of their choice

D) None of the above

28. In a chosen-plaintext attack, what advantage does the attacker have?

A) Choosing the key

B) Access to ciphertext only

C) Ability to select plaintexts to be encrypted

D) Deciphering without the key

29. What did US cryptanalysts prove by sending a plain message about low water supply in Midway?

A) They cracked the Japanese code

B) They located the Japanese fleet

C) 'AF' referred to Midway Island

D) They intercepted all Japanese messages

30. What type of cipher replaces each element of plaintext with another element?

A) Transposition cipher

B) Substitution cipher

C) Product cipher

D) Ciphertext-only cipher
31. What is diffusion in terms of cipher properties?

A) Hiding the relationship between plaintext and key

B) Rearranging the plaintext elements

C) Hiding statistical relationships between ciphertext and plaintext

D) Encrypting using substitution boxes

32. Who introduced the concepts of confusion and diffusion in cryptography?

A) Claude Shannon

B) Kerkhoff

C) Alan Turing

D) Albert Einstein

33. Which of the following ciphers uses both substitutions and transpositions?

A) Substitution cipher

B) Transposition cipher

C) Product cipher

D) None of the above

34. In a chosen-ciphertext attack, the attacker has control over:

A) Choosing plaintexts to decrypt

B) Choosing ciphertexts to decrypt

C) Choosing the encryption key

D) No control over plaintext or ciphertext

35. Which cipher property hides the relationship between ciphertext and key?

A) Diffusion

B) Transposition

C) Substitution

D) Confusion
36. What is the primary purpose of encryption?

A) To store data

B) To convert plaintext into ciphertext

C) To delete data securely

D) To make data larger in size

37. What is plaintext?

A) The original message to be encrypted

B) The key used in encryption

C) The algorithm for decryption

D) The encrypted message

38. In a symmetric cipher model, what is used for both encryption and decryption?

A) Different keys for encryption and decryption

B) The same key for encryption and decryption

C) No key at all

D) A public and private key pair

39. What is a block cipher?

A) A cipher that encrypts data one bit at a time

B) A cipher that encrypts data in blocks (e.g., 64 or 128 bits)

C) A cipher that uses a different key for each bit of data

D) A cipher without keys

40. Which of the following statements is true about asymmetric encryption?

A) It uses the same key for encryption and decryption

B) It uses different keys for encryption and decryption

C) It is not used for data encryption

D) It is the only type of cipher


41. In symmetric encryption, what does 'K' represent in the formula?

A) The ciphertext

B) The plaintext

C) The secret key

D) The encryption algorithm

42. What is cryptanalysis?

A) The science of creating cryptographic algorithms

B) The science of breaking or analyzing cryptographic systems

C) The study of symmetric encryption only

D) The development of new encryption keys

43. Which term describes a set of all possible keys?

A) Cipher block

B) Key stream

C) Key space

D) Plaintext space

44. In cryptographic communication, who are Alice and Bob?

A) Programmers creating encryption algorithms

B) Two characters used to demonstrate secure communication over an insecure channel

C) Attackers trying to break encryption

D) Devices used in encryption processes

45. What is the term for a process that converts ciphertext back into plaintext?

A) Encryption

B) Deciphering or decryption

C) Cryptanalysis

D) Encoding
46. An example of an active attack is:

A) Eavesdropping

B) Network scanning

C) Message replay

D) Encryption

47. Which mechanism aims to prevent unauthorized use of a resource?

A) Availability

B) Access control

C) Integrity checks

D) Data confidentiality

48. The security goal of availability ensures that systems are:

A) Used by anyone freely

B) Accessible to legitimate users when needed

C) Constantly online without breaks

D) Prone to passive attacks

49. Symmetric-key encryption involves:

A) Public-key infrastructure

B) The same key for encryption and decryption

C) Multiple public keys for data transfer

D) Only digital signatures

50. Digital signatures help in achieving:

A) Data confidentiality only

B) Non-repudiation and authentication

C) Data replication

D) Message encoding
Ahmed Al-Mamouri

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy