Question 1
Баллов: 1
Dictionary attack includes attack on likely passwords which most likely DO NOT include:
a. Common names | ||
b. Easy-to-type letter combinations | ||
c. Birthday of family members | ||
d. Every word in a certain language | ||
e. Name of countries |
Верно
Question 2
Баллов: 1
An authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
a. Diffie-Hellman Algorithm | ||
b. Hybrid Cryptosystem | ||
c. Digital signature | ||
d. Diffusion | ||
e. Man-in-the-middle attack |
Верно
Question 3
Баллов: 1
Set of tools for generating new viruses automatically is known as a(n) _____________.
a. Auto-rooter | ||
b. Exploits | ||
c. Kit (virus generator) | ||
d. Flooders | ||
e. Downloaders |
Верно
Question 4
Баллов: 1
Secret entry point into program that allows entry without going through normal security access procedures is known as a(n) _______________.
a. Trapdoor | ||
b. Rootkit | ||
c. Virus | ||
d. Worm | ||
e. Zombie |
Верно
Question 5
Баллов: 1
Which malicious program embedded in a computer program that checks for a certain set of conditions to be present on the system. When these conditions are met, it executes some function resulting in unauthorized actions?
a. Logic Bomb | ||
b. Backdoor (Trapdoor) | ||
c. Trojan horse | ||
d. Virus | ||
e. Worm |
Верно
|
|
Question 6
Баллов: 1
Set of rules and procedures developed by management in conjunction with security professionals is known as a(n) ___________________.
a. Security Attack | ||
b. Security Threat | ||
c. Security Mechanism | ||
d. Security Policy | ||
e. Security Service |
Верно
Question 7
Баллов: 1
An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.
a. Kerberos | ||
b. Trudy | ||
c. Crytologist | ||
d. Intruder | ||
e. Crypto analyzer |
Верно
Question 8
Баллов: 1
A secret data value, usually a character string, that is used as authentication information.
a. Password | ||
b. Public key | ||
c. Private key | ||
d. Secret key | ||
e. Plaintext |
Верно
Question 9
Баллов: 1
Which malicious program propagates copies of
itself to other computers?
a. Logic Bomb | ||
b. Backdoor (Trapdoor) | ||
c. Trojan horse | ||
d. Virus | ||
e. Worm |
Верно
Question 10
Баллов: 1
In which of the four basic password techniques a user is allowed to select his or her own password. At the time of selection, the system checks to see if the password is allowable and, if not, rejects it.
a. User education | ||
b. Reactive password checking | ||
c. User-generated passwords | ||
d. Proactive password checking | ||
e. Computer-generated passwords |
Верно
Question 11
Баллов: 1
To figure out the password by trying every possible keystroke combination is called:
a. Brute force attack | ||
b. Dictionary attack | ||
c. Keystroke attack | ||
d. Password attack | ||
e. Word list attack |
Верно
Question 12
Баллов: 1
Which malicious program Captures keystrokes on a compromised system?
a. Spammer | ||
b. Zombie | ||
c. Trojan horse | ||
d. Rootkit | ||
e. Keylogger |
Верно
Question 13
Баллов: 1
Which of these is a mixing algorithm?
a. MD5 | ||
b. AES | ||
c. RC4 | ||
d. DES | ||
e. RSA |
Верно
Question 14
Баллов: 1
Set of hacker tools used after attacker has broken into a computer system and gained root-level access is known as a(n) _______________.
|
|
a. Spammer | ||
b. Rootkit | ||
c. Keylogger | ||
d. Trojan horse | ||
e. Zombie |
Верно
Question 15
Баллов: 1
Which software prevents Trojan horses from entering the system through back doors?
a. Cache | ||
b. Trapdoor | ||
c. Virus | ||
d. Worm | ||
e. Firewall |
Верно
Question 16
Баллов: 1
Which malicious program is used to send large volumes of unwanted e-mail?
a. Keylogger | ||
b. Rootkit | ||
c. Spammer | ||
d. Trojan horse | ||
e. Zombie |
Верно
Question 17
Баллов: 1
A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges
a. Clandestine user | ||
b. Masquerader | ||
c. Cryptologist | ||
d. Crypto analyzer | ||
e. Misfeasor |
Верно
Question 18
Баллов: 1
Which of these is possibly the best password that user can choose?
a. aLm4tyc?TY | ||
b. a$tana8567 | ||
c. k@zaKh | ||
d. 14G:c*%3wM*-l6g_Bnp?d86 | ||
e. Nursultan1612 |
Верно
Question 19
Баллов: 1
Which of the following are examples of the host independent malicious programs?
Выберите по крайней мере один ответ:
a. Worm | ||
b. Trap door | ||
c. Trojan Horses | ||
d. Logic Bombs | ||
e. Zombie |
Верно
Question 20
Баллов: 1
Which of the following below are features of firewall?
I. Shield hosts inside the network from hackers
II. Cache data
III. Filter content that is considered inappropriate or
dangerous
a. I and II | ||
b. I, II and III | ||
c. II only | ||
d. I only | ||
e. II and III |
Question 21
Баллов: 1
Which of the following below are features of firewall?
I. Log unauthorized accesses into/out of a network
II. Provide a VPN link to another network
III. Authenticate users
a. I only | ||
b. I and II | ||
c. II only | ||
d. II and III | ||
e. I, II and III |
Верно
Question 22
Баллов: 1
Which of the following is an advantage of using Personal/Small Business Firewalls?
a. Some firewalls don’t do outbound connection blocking | ||
b. Some let you establish rules as needed | ||
c. Some firewalls are inconvenient to configure | ||
d. Most guard only against IP threats | ||
e. All of the statements |
Верно
Question 23
Баллов: 1
Define types of viruses with appropriate definition.
Parasitic virus: | ||
Memory-resident virus: | ||
Boot sector virus: | ||
Stealth virus: | ||
Polymorphic virus: | ||
Metamorphic virus: |
Верно
Question 24
Баллов: 1
A program fragment or an independent program that, when executed, may produce one or more copies of itself to be activated later on the same system or some other system. is known as a(n) _______________.
a. Host independent | ||
b. Host dependent | ||
c. Malicious Software that do not replicate | ||
d. None of the statements | ||
e. Malicious Software that replicates |
Верно
Question 25
Баллов: 1
Which of the following statement is NOT TRUE?
a. The brute-force attack tries many additional passwords that the dictionary attack does not | ||
b. Any password the brute force attack tries, the dictionary attack also tries | ||
c. The dictionary attack is faster than the brute force attack | ||
d. A hacker probably start with a dictionary attack and if that fails, move on to a modified brute force attack | ||
e. The dictionary attack tries fewer passwords than does the brute force attack |
Верно
Question 26
Баллов: 1
Hardware or software that monitors transmission of packets of digital information that attempt to pass the perimeter of a network?
a. Firewall | ||
b. Mandatory access control | ||
c. Anti-viruse software | ||
d. Intrusion detection system | ||
e. Kerberos |
Верно
Question 27
Баллов: 1
A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
a. Worm | ||
b. Virus | ||
c. Backdoor (Trapdoor) | ||
d. Trojan horse | ||
e. Logic Bomb |
Верно
Question 28
Баллов: 1
Which malicious program that allows unauthorized access to functionality of the system?
a. Worm | ||
b. Logic Bomb | ||
c. Backdoor (Trapdoor) | ||
d. Virus | ||
e. Trojan horse |
Question 29
Баллов: 1
A program used to attack networked computer
systems with a large volume of traffic to
carry out a denial of service (DoS) attack is known as a(n) _____________.
a. Auto-rooter | ||
b. Flooder | ||
c. Downloaders | ||
d. Kit (virus generator) | ||
e. Exploits |
Верно
Question 30
Баллов: 1
Which of the following is an example of the host dependent malicious programs?
a. Worm | ||
b. Rootkit | ||
c. Virus | ||
d. Keylogger | ||
e. Zombie |
SAMPLE
Question1
Баллов: 1
A form of cryptosystem in which encryption and decryption are performed using the same key is known as ___________.
a. Symmetric cipher | ||
b. Asymmetric cipher | ||
c. The same key encryption | ||
d. Public-key encryption | ||
e. Two-key encryption |
Верно
|
|
Question2
Баллов: 1
A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
a. Worm | ||
b. Virus | ||
c. Logic Bomb | ||
d. Trojan horse | ||
e. Backdoor (Trapdoor) |
Верно
Question3
Баллов: 1
Indicate the drawbacks of reactive password checking technique.
Выберите по крайней мере один ответ:
a. resource intensive | ||
b. Others may not be good judges of what is a strong password. | ||
c. any existing passwords remain vulnerable | ||
d. many users will simply ignore the guidelines. | ||
e. users will not be able to remember them |
Верно
Question4
Баллов: 1
Cryptographic keys are measured in:
a. Bits | ||
b. Hertz | ||
c. Entorpy | ||
d. Pixels | ||
e. Bytes |
Неверно
Question5
Баллов: 1
A program fragment or an independent program that, when executed, may produce one or more copies of itself to be activated later on the same system or some other system. is known as a(n) _______________.
a. Malicious Software that replicates | ||
b. None of the statements | ||
c. Host dependent | ||
d. Malicious Software that do not replicate | ||
e. Host independent |
Верно
Question6
Баллов: 1
What are the essential ingredients of a symmetric cipher?
I. Plaintext
II. Secret key
II. Encryption algorithm
IV. Decryption algorithm
V. Ciphertext
a. II, III, IV and V | ||
b. I and II | ||
c. I, II, III, IV and V | ||
d. I, II, III and IV | ||
e. I, III and V |
Верно
Question7
Баллов: 1
Point out two major advantages of public crypto over symmetric key crypto.
Выберите по крайней мере один ответ:
a. Digital signatures offer not only integrity but also repudiation. | ||
b. With public key crypto, we don’t need to established a shared key in advance. | ||
c. Digital signatures offer only integrity. | ||
d. Digital signatures offer not only integrity but also non-repudiation. | ||
e. With public key crypto, we need to established a shared key in advance. |
Неверно
Question8
Баллов: 1
Indicate the definition for Privacy or confidentiality.
a. identifying and acknowledging the identity of entity (a person, a computer terminal, a credit card, etc.). | ||
b. ensuring information has not been altered by unauthorised or unknown means | ||
c. corroborating the source of information; also known as data origin authentication. | ||
d. keeping information secret from all but those who are authorised to see it | ||
e. binding information to an entity |
Верно
Question9
Баллов: 1
What is a Replay?
a. The passive capturing of a data unit and its subsequent retransmission to produce an unauthorized effect | ||
b. One entity pretends to be a different entity | ||
c. Preventing or inhibiting the normal use or management of communications facilities | ||
d. Restricting access to resources to privileged entities. | ||
e. Altering some portion of a legitimate message, or that messages are delayed or reordered, to produce an unauthorized effect. |
Неверно
|
|
Question10
Баллов: 1
Why is it that the one-time pad can only be used once?
a. Two messages encrypted with the same “one-time” pad key the produced ciphertext always will be the same | ||
b. If two messages encrypted with the same “one-time” pad key the probability of leaking the key is high | ||
c. All of the statements | ||
d. If two messages encrypted with the same “one-time” pad key and when two different ciphertexts XORed with each other the key disappears | ||
e. If two messages encrypted with the same “one-time” pad key and when two different ciphertexts XORed with each other the plaintext disappears |
Верно
Question11
Баллов: 1
The conversion of plaintext or data into unintelligible form by means of a reversible translation, based on a translation table or algorithm.
Выберите по крайней мере один ответ:
a. Enciphering | ||
b. All of the statements | ||
c. Deciphering | ||
d. Decryption | ||
e. Encryption |
Верно
Question12
Баллов: 1
Which malicious program propagates copies of
itself to other computers?
a. Logic Bomb | ||
b. Virus | ||
c. Trojan horse | ||
d. Worm | ||
e. Backdoor (Trapdoor) |
Верно
Question13
Баллов: 1
If a wrong key is entered to decrypt a message, what will happen?
a. Nothing will happen | ||
b. The output will be gibberish | ||
c. The cryptosystem will stop working | ||
d. There is an error message | ||
e. The output will not be visible |
Верно
Question14
Баллов: 1
Secret entry point into program that allows entry without going through normal security access procedures is known as a(n) _______________.
a. Virus | ||
b. Rootkit | ||
c. Trapdoor | ||
d. Zombie | ||
e. Worm |
Верно
Question15
Баллов: 1
Indicate the definition for Authorisation.
a. providing timeliness of authorisation to use or manipulate information or resources | ||
b. restricting access to resources to privileged entities | ||
c. recording the time of creation or existence of information | ||
d. conveyance, to another entity, of official sanction to do or be something | ||
e. endorsement of information by a trusted entity |
Неверно
Question16
Баллов: 1
Given that the Caesar’s cipher is used, find the plaintext from the ciphertext
ZKDW GRHV WKH IRA VDB
English alphabet
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
Ответ:
Верно
Question17
Баллов: 1
Which of the following is (are) weakness(es) of Caesar cipher?
I. The encryption and decryption algorithms are known.
II. There are only 25 keys to try.
III. The language of the plaintext is known and easily recognizable.
IV. The length of the plaintext is fixed.
a. I, II and IV | ||
b. II, III and IV | ||
c. I, II and III | ||
d. I and II | ||
e. I, II, III and IV |
Верно
Question18
Баллов: 1
A form of cryptosystem in which encryption and decryption are performed using two different keys, one of which is referred to as the public key and one of which is referred to as the private key is known as ______________.
a. The same key encryption | ||
b. Asymmetric cipher | ||
c. Secret-key encryption | ||
d. Symmetric cipher | ||
e. Conventional encryption |
Верно
Question19
Баллов: 1
Which of the following are examples of the host independent malicious programs?
Выберите по крайней мере один ответ:
a. Worm | ||
b. Logic Bombs | ||
c. Trojan Horses | ||
d. Trap door | ||
e. Zombie |
Неверно
Question20
Баллов: 1
Which of the following statement is NOT TRUE?
a. Any password the brute force attack tries, the dictionary attack also tries | ||
b. The dictionary attack tries fewer passwords than does the brute force attack | ||
c. A hacker probably start with a dictionary attack and if that fails, move on to a modified brute force attack | ||
d. The brute-force attack tries many additional passwords that the dictionary attack does not | ||
e. The dictionary attack is faster than the brute force attack |
Верно
Question21
Баллов: 1
A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges
a. Crypto analyzer | ||
b. Clandestine user | ||
c. Misfeasor | ||
d. Masquerader | ||
e. Cryptologist |
Верно
Question22
Баллов: 1
Find the plaintext from the cipher text
CSY EVI XIVQMREXIH
given that the cipher is a simple substitution of the shift-by- n variety.
Ответ:
Верно
Question23
Баллов: 1
DES is based on an algorithm named:
a. Rijndael | ||
b. Daemon | ||
c. Vigenere | ||
d. Rhinedoll | ||
e. Lucifer |
Верно
Question24
Баллов: 1
In symmetric-key cryptography, symmetry means:
a. The 1’s and 0’s in the key is same in number. | ||
b. That one common key is used for multiple purposes. | ||
c. The algorithms for encryption and decryption are the same. | ||
d. The key that is used to encrypt data is different from the key that is used to decrypt it. | ||
e. The key that is used to encrypt data is the same key that is used to decrypt it. |
Верно
Question25
Баллов: 1
_____________ is the art and science of making and breaking “secret codes.”
a. Information Security | ||
b. Cryptography | ||
c. Cryptanalysis | ||
d. Cryptology | ||
e. Data protection |
Неверно
Question26
Баллов: 1
Which malicious software is used to cause DoS (Denial of Service) attack against particular web site?
a. Keylogger | ||
b. Virus????????????????? | ||
c. Zombie | ||
d. Trojan Horse | ||
e. Worm |
Неверно
Question27
Баллов: 1
Indicate the definition for Anonymity.
a. verifying the creation or existence of information by an entity other than the creator. | ||
b. concealing the identity of an entity involved in some process. | ||
c. acknowledgement that services have been provided. | ||
d. providing an entity with the legal right to use or transfer a resource to others. | ||
e. acknowledgement that information has been received. |
Верно
Question28
Баллов: 1
In which of the four basic password techniques the system periodically runs its own password cracker to find guessable passwords and cancels any passwords that are guessed and notifies the user.
a. Reactive password checking | ||
b. Proactive password checking | ||
c. User-generated passwords | ||
d. Computer-generated passwords | ||
e. User education |
Неверно
Question29
Баллов: 1
Public-key cryptography is important because it solves:
a. The key sharing problem | ||
b. The key recovery problem | ||
c. The password sharing problem | ||
d. The password recovery problem | ||
e. The key distribution problem |
Верно
Question30
Баллов: 1
Which of these is NOT a recommended guideline for a good password?
a. Use numbers | ||
b. Mix in uppercase and lowercase letters | ||
c. Avoid using a character more than twice | ||
d. Use at least 8 characters | ||
e. Use punctuation and other symbols |
Верно
SAMPLE