Обзор попытки 2

Question1

Баллов: 1

A program fragment or an independent program that, when executed, may produce one or more copies of itself to be activated later on the same system or some other system. is known as a(n) _______________.

  a. Malicious Software that do not replicate  
  b. Host dependent  
  c. Host independent  
  d. None of the statements  
  e. Malicious Software that replicates  

Верно

Question2

Баллов: 1

Cryptographic keys are measured in:

  a. Entorpy  
  b. Bits  
  c. Hertz  
  d. Pixels  
  e. Bytes  

Верно

Question3

Баллов: 1

Which software prevents Trojan horses from entering the
system through back doors?

  a. Virus  
  b. Cache  
  c. Trapdoor  
  d. Worm  
  e. Firewall  

Верно

Question4

Баллов: 1

An attack on the key by attempting all possible combinations is called:

  a. A random key attack  
  b. A cryptographic key attack  
  c. An all combinations attack  
  d. A systematic seed attack  
  e. A brute force attack  

Верно

Question5

Баллов: 1

Which of the following statement is NOT TRUE regarding key recovery via threshold schemes?

  a. It is probably the most common key recovery method  
  b. It is also called secret sharing or secret splitting  
  c. Almost any reasonable share and recovery count is possible  
  d. For key recovery, the secret is an RSA private key  
  e. A key is split into several shares, with all the shares must be combined to recover the secret  

Неверно

Question6

Баллов: 1

A two-letter sequence is called ______________.

  a. Digram  
  b. Letter  
  c. None of the statements  
  d. Bigram?!  
  e. Twogram  

Неверно

Question7

Баллов: 1

A function that maps a variable-length data block or message into a fixed-length value called a hash code. The function is designed in such a way that, when protected, it provides an authenticator to the data or message.

  a. Hybrid function  
  b. Encryption function  
  c. None of the statements  
  d. Diffie-Hellman  
  e. Message digest  

Верно

Question8

Баллов: 1

Which of these is possibly the worst password that user can choose?

  a. 14G:c*%3wM*-l6g_Bnp?d86  
  b. aLm4tyc?TY  
  c. a$tana8567  
  d. Nur$ultan_1612  
  e. k@zaKh  

Верно

Question9

Баллов: 1

Set of rules and procedures developed by management in conjunction with security professionals is known as a(n) ___________________.

  a. Security Threat  
  b. Security Mechanism  
  c. Security Attack  
  d. Security Policy  
  e. Security Service  

Неверно

Question10

Баллов: 1

A form of cryptosystem in which encryption and decryption are performed using the same key is known as ___________.

  a. Public-key encryption  
  b. The same key encryption  
  c. Two-key encryption  
  d. Symmetric cipher  
  e. Asymmetric cipher  

Верно

Question11

Баллов: 1

Indicate the definition for Confirmation.

  a. acknowledgement that services have been provided.  
  b. providing an entity with the legal right to use or transfer a resource to others.  
  c. acknowledgement that information has been received.  
  d. verifying the creation or existence of information by an entity other than the creator.  
  e. concealing the identity of an entity involved in some process.  

Верно

Question12

Баллов: 1

Suppose that your plaintext is 112 bytes long and you are using DES, how many bytes are needed for padding?

  a. 2  
  b. 8  
  c. 4  
  d. 6  
  e. 0  

Верно

Question13

Баллов: 1

An individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account

  a. Masquerader  
  b. Misfeasor  
  c. Crypto analyzer  
  d. Cryptologist  
  e. Clandestine user  

Верно

Question14

Баллов: 1

What are the essential ingredients of a symmetric cipher?
I. Plaintext

II. Secret key

II. Encryption algorithm

IV. Decryption algorithm

V. Ciphertext

  a. I and II  
  b. I, II, III and IV  
  c. II, III, IV and V  
  d. I, II, III, IV and V  
  e. I, III and V  

Неверно

Question15

Баллов: 1

Perform encryption using the RSA algorithm where
p = 5; q = 11, e = 3; M = 9

Ответ:

Неверно

Question16

Баллов: 1

Hardware or software that monitors transmission of packets of digital information that attempt to pass the perimeter of a network?

  a. Firewall  
  b. Kerberos  
  c. Anti-viruse software  
  d. Mandatory access control  
  e. Intrusion detection system  

Верно

Question17

Баллов: 1

Indicate the definition for Timestamping.

  a. providing timeliness of authorisation to use or manipulate information or resources  
  b. restricting access to resources to privileged entities  
  c. endorsement of information by a trusted entity  
  d. conveyance, to another entity, of official sanction to do or be something  
  e. recording the time of creation or existence of information  

Верно

Question18

Баллов: 1

Operation which maps elements of the plaintext into another is known as ___________.

  a. Transposition  
  b. Rearranging  
  c. None of the statements  
  d. Substitution  
  e. Mapping  

Неверно

Question19

Баллов: 1

Indicate the one of the purposes of salt used in the Unix password scheme.

  a. It prevents the users from creating passwords.  
  b. It prevents password from being corrupted by intruders.  
  c. It effectively decreases the length of the password without requiring the user to remember two additional characters.  
  d. It effectively increases the length of the password without requiring the user to remember two additional characters.  
  e. It is used as a secret key for encryption password.  

Верно

Question20

Баллов: 1

Using the Vigenère cipher, encrypt the word "nation" using the key leg.

Ответ:

Верно

Question21

Баллов: 1

Which of these is a mixing algorithm?

  a. DES  
  b. RSA  
  c. AES  
  d. MD5  
  e. RC4  

Верно

Question22

Баллов: 1

The word “asymmetric” in public-key cryptography means:

  a. None of the listed answers  
  b. The key to encrypt is the same with the key to decrypt  
  c. The algorithm to encrypt is the same with the algorithm to decrypt  
  d. The key to encrypt is different from the key to decrypt  
  e. The algorithm to encrypt is different from the algorithm to decrypt  

Верно

Question23

Баллов: 1

Find the key from the cipher text
CSY EVI XIVQMREXIH

given that the cipher is a simple substitution of the shift-by- n variety.

Ответ:

Верно

Question24

Баллов: 1

Which of the following are drawback of using Personal/Small Business Firewalls?

Выберите по крайней мере один ответ:

  a. Some firewalls don’t do outbound connection blocking  
  b. Most guard only against IP threats  
  c. Some let you establish rules as needed  
  d. All of the statements  
  e. Some firewalls are inconvenient to configure  

Верно

Question25

Баллов: 1

Choose the definition of Threat?

  a. Any action that compromises the security of information owned by an organization  
  b. A process that is designed to detect, prevent, or recover from a security attack.  
  c. A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.  
  d. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.  
  e. All of the statements  

Верно

Question26

Баллов: 1

Which of the following is (are) weakness(es) of Caesar cipher?
I. The encryption and decryption algorithms are known.

II. There are only 25 keys to try.

III. The language of the plaintext is known and easily recognizable.

IV. The length of the plaintext is fixed.

  a. I, II and IV  
  b. II, III and IV  
  c. I and II  
  d. I, II, III and IV  
  e. I, II and III  

Верно

Question27

Баллов: 1

Which of the following are examples of the host independent malicious programs?

Выберите по крайней мере один ответ:

  a. Trojan Horses  
  b. Worm  
  c. Trap door  
  d. Zombie  
  e. Logic Bombs  

Верно

Question28

Баллов: 1

Indicate the definition for Ownership.

  a. acknowledgement that information has been received.  
  b. acknowledgement that services have been provided.  
  c. verifying the creation or existence of information by an entity other than the creator.  
  d. providing an entity with the legal right to use or transfer a resource to others.  
  e. concealing the identity of an entity involved in some process.  

Верно

Question29

Баллов: 1

Indicate the definition for Validation.

  a. restricting access to resources to privileged entities  
  b. conveyance, to another entity, of official sanction to do or be something  
  c. endorsement of information by a trusted entity  
  d. recording the time of creation or existence of information  
  e. providing timeliness of authorisation to use or manipulate information or resources  

Верно

Question30

Баллов: 1

What is the purpose of Passive Attack?

  a. To counter security attacks, and they make use of one or more security mechanisms to provide the service.  
  b. To bind information to an entity  
  c. To learn or make use of information from the system but does not affect system resources  
  d. To provide timeliness of authorisation to use or manipulate information or resources  
  e. To alter system resources or affect their operation.  

Верно


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: