C) Protecting Assets of A Computer System
C) Protecting Assets of A Computer System
B) Hardware components
C) Software applications
A) Security management
B) Security service
C) Security cost
D) Security support
A) Message modification
B) Denial of service
C) Eavesdropping
D) Message creation
A) Easy to detect
B) Difficult to detect
C) Always preventable
A) Eavesdropping
B) Network scanning
C) Message replay
D) Encryption
A) Modification of messages
B) Replay attacks
D) Masquerade
D) Encrypt data
C) Replay attacks
D) Data encryption
A) Availability
B) Access control
C) Integrity checks
D) Data confidentiality
A) Public-key infrastructure
A) Identical
B) Public only
C) Different
D) Used interchangeably
16. A hash function in network security is used to:
A) Encrypt data
B) Authenticate entities
C) Data replication
D) Message encoding
A) Entity authentication
C) Access control
D) Data encryption
B) IP blocking
C) Password verification
D) Data encryption
20. To detect and recover from active attacks, a common defense mechanism includes:
A) Encryption only
A) To hide plaintext
D) To encrypt data
24. In a brute-force attack, how much of the key space needs to be tried on average?
25. Which key size would take the longest time to break at 1 decryption per microsecond?
A) 32 bits
B) 56 bits
C) 128 bits
D) 168 bits
Ahmed Al-Mamouri
26. Which attack type only has access to the ciphertext?
A) Ciphertext-only attack
B) Known-plaintext attack
C) Chosen-plaintext attack
D) Chosen-ciphertext attack
29. What did US cryptanalysts prove by sending a plain message about low water supply in Midway?
30. What type of cipher replaces each element of plaintext with another element?
A) Transposition cipher
B) Substitution cipher
C) Product cipher
D) Ciphertext-only cipher
31. What is diffusion in terms of cipher properties?
A) Claude Shannon
B) Kerkhoff
C) Alan Turing
D) Albert Einstein
33. Which of the following ciphers uses both substitutions and transpositions?
A) Substitution cipher
B) Transposition cipher
C) Product cipher
35. Which cipher property hides the relationship between ciphertext and key?
A) Diffusion
B) Transposition
C) Substitution
D) Confusion
36. What is the primary purpose of encryption?
A) To store data
38. In a symmetric cipher model, what is used for both encryption and decryption?
C) No key at all
A) The ciphertext
B) The plaintext
A) Cipher block
B) Key stream
C) Key space
D) Plaintext space
45. What is the term for a process that converts ciphertext back into plaintext?
A) Encryption
B) Deciphering or decryption
C) Cryptanalysis
D) Encoding
46. An example of an active attack is:
A) Eavesdropping
B) Network scanning
C) Message replay
D) Encryption
A) Availability
B) Access control
C) Integrity checks
D) Data confidentiality
A) Public-key infrastructure
C) Data replication
D) Message encoding
Ahmed Al-Mamouri