Quiz #1

Question 1

Баллов: 1

Indicate the definition for Data integrity.

  a. identifying and acknowledging the identity of entity (a person, a computer terminal, a credit card, etc.).  
  b. ensuring information has not been altered by unauthorised or unknown means  
  c. corroborating the source of information; also known as data origin authentication.  
  d. binding information to an entity  
  e. keeping information secret from all but those who are authorised to see it  

Верно

Question 2

Баллов: 1

What is a Replay?

  a. The passive capturing of a data unit and its subsequent retransmission to produce an unauthorized effect  
  b. Altering some portion of a legitimate message, or that messages are delayed or reordered, to produce an unauthorized effect.  
  c. One entity pretends to be a different entity  
  d. Restricting access to resources to privileged entities.  
  e. Preventing or inhibiting the normal use or management of communications facilities  

Верно

Question 3

Баллов: 1

What is the purpose of Passive Attack?

  a. To provide timeliness of authorisation to use or manipulate information or resources  
  b. To counter security attacks, and they make use of one or more security mechanisms to provide the service.  
  c. To bind information to an entity  
  d. To learn or make use of information from the system but does not affect system resources  
  e. To alter system resources or affect their operation.  

Верно

Question 4

Баллов: 1

_____________ is the making of “secret codes.”

  a. Cryptanalysis  
  b. Data protection  
  c. Information Security  
  d. Cryptography  
  e. Cryptology  

Верно

Question 5

Баллов: 1

What is the functionality of a block-cipher?

  a. processes the input elements continuously, producing output one element at a time, as it goes along  
  b. A procedure used during symmetric block encryption that makes an output block dependent not only on the current plaintext input block and key, but also on earlier input and/or output.  
  c. verification the integrity of a message  
  d. exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used  
  e. processes the input one block of elements at a time, producing an output block for each input block.  

Верно

Question 6

Баллов: 1

Choose the definition of Threat?

  a. A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.  
  b. A process that is designed to detect, prevent, or recover from a security attack.  
  c. All of the statements  
  d. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.  
  e. Any action that compromises the security of information owned by an organization  

Верно

Question 7

Баллов: 1

Find the plaintext from the cipher text
CSY EVI XIVQMREXIH

given that the cipher is a simple substitution of the shift-by- n variety.

Ответ:

Верно

Question 8

Баллов: 1

The original data, the input to an encryption function or the output of a decryption function.

  a. Decryption  
  b. Cipher  
  c. Encryption  
  d. Plaintext  
  e. Ciphertext  

Верно

Question 9

Баллов: 1

Choose the definition of Security mechanism?

  a. Any action that compromises the security of information owned by an organization  
  b. A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.  
  c. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.  
  d. All of the statements  
  e. A process that is designed to detect, prevent, or recover from a security attack.  

Верно

Question 10

Баллов: 1

A form of cryptosystem in which encryption and decryption are performed using two different keys, one of which is referred to as the public key and one of which is referred to as the private key is known as ______________.

  a. Asymmetric cipher  
  b. Secret-key encryption  
  c. The same key encryption  
  d. Symmetric cipher  
  e. Conventional encryption  

Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: