Midterm

Question 1

Баллов: 1

Dictionary attack includes attack on likely passwords which most likely DO NOT include:

  a. Common names  
  b. Easy-to-type letter combinations  
  c. Birthday of family members  
  d. Every word in a certain language  
  e. Name of countries  

Верно

Question 2

Баллов: 1

An authentication mechanism that enables the creator of a message to attach a code that acts as a signature.

  a. Diffie-Hellman Algorithm  
  b. Hybrid Cryptosystem  
  c. Digital signature  
  d. Diffusion  
  e. Man-in-the-middle attack  

Верно

Question 3

Баллов: 1

Set of tools for generating new viruses automatically is known as a(n) _____________.

  a. Auto-rooter  
  b. Exploits  
  c. Kit (virus generator)  
  d. Flooders  
  e. Downloaders  

Верно

Question 4

Баллов: 1

Secret entry point into program that allows entry without going through normal security access procedures is known as a(n) _______________.

  a. Trapdoor  
  b. Rootkit  
  c. Virus  
  d. Worm  
  e. Zombie  

Верно

Question 5

Баллов: 1

Which malicious program embedded in a computer program that checks for a certain set of conditions to be present on the system. When these conditions are met, it executes some function resulting in unauthorized actions?

  a. Logic Bomb  
  b. Backdoor (Trapdoor)  
  c. Trojan horse  
  d. Virus  
  e. Worm  

Верно

Question 6

Баллов: 1

Set of rules and procedures developed by management in conjunction with security professionals is known as a(n) ___________________.

  a. Security Attack  
  b. Security Threat  
  c. Security Mechanism  
  d. Security Policy  
  e. Security Service  

Верно

Question 7

Баллов: 1

An individual who gains, or attempts to gain, unauthorized access to a computer system or to gain unauthorized privileges on that system.

  a. Kerberos  
  b. Trudy  
  c. Crytologist  
  d. Intruder  
  e. Crypto analyzer  

Верно

Question 8

Баллов: 1

A secret data value, usually a character string, that is used as authentication information.

  a. Password  
  b. Public key  
  c. Private key  
  d. Secret key  
  e. Plaintext  

Верно

Question 9

Баллов: 1

Which malicious program propagates copies of
itself to other computers?

  a. Logic Bomb  
  b. Backdoor (Trapdoor)  
  c. Trojan horse  
  d. Virus  
  e. Worm  

Верно

Question 10

Баллов: 1

In which of the four basic password techniques a user is allowed to select his or her own password. At the time of selection, the system checks to see if the password is allowable and, if not, rejects it.

  a. User education  
  b. Reactive password checking  
  c. User-generated passwords  
  d. Proactive password checking  
  e. Computer-generated passwords  

Верно

Question 11

Баллов: 1

To figure out the password by trying every possible keystroke combination is called:

  a. Brute force attack  
  b. Dictionary attack  
  c. Keystroke attack  
  d. Password attack  
  e. Word list attack  

Верно

Question 12

Баллов: 1

Which malicious program Captures keystrokes on a compromised system?

  a. Spammer  
  b. Zombie  
  c. Trojan horse  
  d. Rootkit  
  e. Keylogger  

Верно

Question 13

Баллов: 1

Which of these is a mixing algorithm?

  a. MD5  
  b. AES  
  c. RC4  
  d. DES  
  e. RSA  

Верно

Question 14

Баллов: 1

Set of hacker tools used after attacker has broken into a computer system and gained root-level access is known as a(n) _______________.

  a. Spammer  
  b. Rootkit  
  c. Keylogger  
  d. Trojan horse  
  e. Zombie  

Верно

Question 15

Баллов: 1

Which software prevents Trojan horses from entering the system through back doors?

  a. Cache  
  b. Trapdoor  
  c. Virus  
  d. Worm  
  e. Firewall  

Верно

Question 16

Баллов: 1

Which malicious program is used to send large volumes of unwanted e-mail?

  a. Keylogger  
  b. Rootkit  
  c. Spammer  
  d. Trojan horse  
  e. Zombie  

Верно

Question 17

Баллов: 1

A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges

  a. Clandestine user  
  b. Masquerader  
  c. Cryptologist  
  d. Crypto analyzer  
  e. Misfeasor  

Верно

Question 18

Баллов: 1

Which of these is possibly the best password that user can choose?

  a. aLm4tyc?TY  
  b. a$tana8567  
  c. k@zaKh  
  d. 14G:c*%3wM*-l6g_Bnp?d86  
  e. Nursultan1612  

Верно

Question 19

Баллов: 1

Which of the following are examples of the host independent malicious programs?

Выберите по крайней мере один ответ:

  a. Worm  
  b. Trap door  
  c. Trojan Horses  
  d. Logic Bombs  
  e. Zombie  

Верно

Question 20

Баллов: 1

Which of the following below are features of firewall?


I. Shield hosts inside the network from hackers

II. Cache data

III. Filter content that is considered inappropriate or
dangerous

  a. I and II  
  b. I, II and III  
  c. II only  
  d. I only  
  e. II and III  

Question 21

Баллов: 1

Which of the following below are features of firewall?


I. Log unauthorized accesses into/out of a network

II. Provide a VPN link to another network

III. Authenticate users

  a. I only  
  b. I and II  
  c. II only  
  d. II and III  
  e. I, II and III  

Верно

Question 22

Баллов: 1

Which of the following is an advantage of using Personal/Small Business Firewalls?

  a. Some firewalls don’t do outbound connection blocking  
  b. Some let you establish rules as needed  
  c. Some firewalls are inconvenient to configure  
  d. Most guard only against IP threats  
  e. All of the statements  

Верно

Question 23

Баллов: 1

Define types of viruses with appropriate definition.

Parasitic virus:    
Memory-resident virus:    
Boot sector virus:    
Stealth virus:    
Polymorphic virus:    
Metamorphic virus:    

Верно

Question 24

Баллов: 1

A program fragment or an independent program that, when executed, may produce one or more copies of itself to be activated later on the same system or some other system. is known as a(n) _______________.

  a. Host independent  
  b. Host dependent  
  c. Malicious Software that do not replicate  
  d. None of the statements  
  e. Malicious Software that replicates  

Верно

Question 25

Баллов: 1

Which of the following statement is NOT TRUE?

  a. The brute-force attack tries many additional passwords that the dictionary attack does not  
  b. Any password the brute force attack tries, the dictionary attack also tries  
  c. The dictionary attack is faster than the brute force attack  
  d. A hacker probably start with a dictionary attack and if that fails, move on to a modified brute force attack  
  e. The dictionary attack tries fewer passwords than does the brute force attack  

Верно

Question 26

Баллов: 1

Hardware or software that monitors transmission of packets of digital information that attempt to pass the perimeter of a network?

  a. Firewall  
  b. Mandatory access control  
  c. Anti-viruse software  
  d. Intrusion detection system  
  e. Kerberos  

Верно

Question 27

Баллов: 1

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

  a. Worm  
  b. Virus  
  c. Backdoor (Trapdoor)  
  d. Trojan horse  
  e. Logic Bomb  

Верно

Question 28

Баллов: 1

Which malicious program that allows unauthorized access to functionality of the system?

  a. Worm  
  b. Logic Bomb  
  c. Backdoor (Trapdoor)  
  d. Virus  
  e. Trojan horse  

Question 29

Баллов: 1

A program used to attack networked computer
systems with a large volume of traffic to
carry out a denial of service (DoS) attack is known as a(n) _____________.

  a. Auto-rooter  
  b. Flooder  
  c. Downloaders  
  d. Kit (virus generator)  
  e. Exploits  

Верно

Question 30

Баллов: 1

Which of the following is an example of the host dependent malicious programs?

  a. Worm  
  b. Rootkit  
  c. Virus  
  d. Keylogger  
  e. Zombie  

SAMPLE

Question1

Баллов: 1

A form of cryptosystem in which encryption and decryption are performed using the same key is known as ___________.

  a. Symmetric cipher  
  b. Asymmetric cipher  
  c. The same key encryption  
  d. Public-key encryption  
  e. Two-key encryption  

Верно

Question2

Баллов: 1

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

  a. Worm  
  b. Virus  
  c. Logic Bomb  
  d. Trojan horse  
  e. Backdoor (Trapdoor)  

Верно

Question3

Баллов: 1

Indicate the drawbacks of reactive password checking technique.

Выберите по крайней мере один ответ:

  a. resource intensive  
  b. Others may not be good judges of what is a strong password.  
  c. any existing passwords remain vulnerable  
  d. many users will simply ignore the guidelines.  
  e. users will not be able to remember them  

Верно

Question4

Баллов: 1

Cryptographic keys are measured in:

  a. Bits  
  b. Hertz  
  c. Entorpy  
  d. Pixels  
  e. Bytes  

Неверно

Question5

Баллов: 1

A program fragment or an independent program that, when executed, may produce one or more copies of itself to be activated later on the same system or some other system. is known as a(n) _______________.

  a. Malicious Software that replicates  
  b. None of the statements  
  c. Host dependent  
  d. Malicious Software that do not replicate  
  e. Host independent  

Верно

Question6

Баллов: 1

What are the essential ingredients of a symmetric cipher?
I. Plaintext

II. Secret key

II. Encryption algorithm

IV. Decryption algorithm

V. Ciphertext

  a. II, III, IV and V  
  b. I and II  
  c. I, II, III, IV and V  
  d. I, II, III and IV  
  e. I, III and V  

Верно

Question7

Баллов: 1

Point out two major advantages of public crypto over symmetric key crypto.

Выберите по крайней мере один ответ:

  a. Digital signatures offer not only integrity but also repudiation.  
  b. With public key crypto, we don’t need to established a shared key in advance.  
  c. Digital signatures offer only integrity.  
  d. Digital signatures offer not only integrity but also non-repudiation.  
  e. With public key crypto, we need to established a shared key in advance.  

Неверно

Question8

Баллов: 1

Indicate the definition for Privacy or confidentiality.

  a. identifying and acknowledging the identity of entity (a person, a computer terminal, a credit card, etc.).  
  b. ensuring information has not been altered by unauthorised or unknown means  
  c. corroborating the source of information; also known as data origin authentication.  
  d. keeping information secret from all but those who are authorised to see it  
  e. binding information to an entity  

Верно

Question9

Баллов: 1

What is a Replay?

  a. The passive capturing of a data unit and its subsequent retransmission to produce an unauthorized effect  
  b. One entity pretends to be a different entity  
  c. Preventing or inhibiting the normal use or management of communications facilities  
  d. Restricting access to resources to privileged entities.  
  e. Altering some portion of a legitimate message, or that messages are delayed or reordered, to produce an unauthorized effect.  

Неверно

Question10

Баллов: 1

Why is it that the one-time pad can only be used once?

  a. Two messages encrypted with the same “one-time” pad key the produced ciphertext always will be the same  
  b. If two messages encrypted with the same “one-time” pad key the probability of leaking the key is high  
  c. All of the statements  
  d. If two messages encrypted with the same “one-time” pad key and when two different ciphertexts XORed with each other the key disappears  
  e. If two messages encrypted with the same “one-time” pad key and when two different ciphertexts XORed with each other the plaintext disappears  

Верно

Question11

Баллов: 1

The conversion of plaintext or data into unintelligible form by means of a reversible translation, based on a translation table or algorithm.

Выберите по крайней мере один ответ:

  a. Enciphering  
  b. All of the statements  
  c. Deciphering  
  d. Decryption  
  e. Encryption  

Верно

Question12

Баллов: 1

Which malicious program propagates copies of
itself to other computers?

  a. Logic Bomb  
  b. Virus  
  c. Trojan horse  
  d. Worm  
  e. Backdoor (Trapdoor)  

Верно

Question13

Баллов: 1

If a wrong key is entered to decrypt a message, what will happen?

  a. Nothing will happen  
  b. The output will be gibberish  
  c. The cryptosystem will stop working  
  d. There is an error message  
  e. The output will not be visible  

Верно

Question14

Баллов: 1

Secret entry point into program that allows entry without going through normal security access procedures is known as a(n) _______________.

  a. Virus  
  b. Rootkit  
  c. Trapdoor  
  d. Zombie  
  e. Worm  

Верно

Question15

Баллов: 1

Indicate the definition for Authorisation.

  a. providing timeliness of authorisation to use or manipulate information or resources  
  b. restricting access to resources to privileged entities  
  c. recording the time of creation or existence of information  
  d. conveyance, to another entity, of official sanction to do or be something  
  e. endorsement of information by a trusted entity  

Неверно

Question16

Баллов: 1

Given that the Caesar’s cipher is used, find the plaintext from the ciphertext

ZKDW GRHV WKH IRA VDB


English alphabet

                                                   
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Ответ:

Верно

Question17

Баллов: 1

Which of the following is (are) weakness(es) of Caesar cipher?
I. The encryption and decryption algorithms are known.

II. There are only 25 keys to try.

III. The language of the plaintext is known and easily recognizable.

IV. The length of the plaintext is fixed.

  a. I, II and IV  
  b. II, III and IV  
  c. I, II and III  
  d. I and II  
  e. I, II, III and IV  

Верно

Question18

Баллов: 1

A form of cryptosystem in which encryption and decryption are performed using two different keys, one of which is referred to as the public key and one of which is referred to as the private key is known as ______________.

  a. The same key encryption  
  b. Asymmetric cipher  
  c. Secret-key encryption  
  d. Symmetric cipher  
  e. Conventional encryption  

Верно

Question19

Баллов: 1

Which of the following are examples of the host independent malicious programs?

Выберите по крайней мере один ответ:

  a. Worm  
  b. Logic Bombs  
  c. Trojan Horses  
  d. Trap door  
  e. Zombie  

Неверно

Question20

Баллов: 1

Which of the following statement is NOT TRUE?

  a. Any password the brute force attack tries, the dictionary attack also tries  
  b. The dictionary attack tries fewer passwords than does the brute force attack  
  c. A hacker probably start with a dictionary attack and if that fails, move on to a modified brute force attack  
  d. The brute-force attack tries many additional passwords that the dictionary attack does not  
  e. The dictionary attack is faster than the brute force attack  

Верно

Question21

Баллов: 1

A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges

  a. Crypto analyzer  
  b. Clandestine user  
  c. Misfeasor  
  d. Masquerader  
  e. Cryptologist  

Верно

Question22

Баллов: 1

Find the plaintext from the cipher text
CSY EVI XIVQMREXIH

given that the cipher is a simple substitution of the shift-by- n variety.

Ответ:

Верно

Question23

Баллов: 1

DES is based on an algorithm named:

  a. Rijndael  
  b. Daemon  
  c. Vigenere  
  d. Rhinedoll  
  e. Lucifer  

Верно

Question24

Баллов: 1

In symmetric-key cryptography, symmetry means:

  a. The 1’s and 0’s in the key is same in number.  
  b. That one common key is used for multiple purposes.  
  c. The algorithms for encryption and decryption are the same.  
  d. The key that is used to encrypt data is different from the key that is used to decrypt it.  
  e. The key that is used to encrypt data is the same key that is used to decrypt it.  

Верно

Question25

Баллов: 1

_____________ is the art and science of making and breaking “secret codes.”

  a. Information Security  
  b. Cryptography  
  c. Cryptanalysis  
  d. Cryptology  
  e. Data protection  

Неверно

Question26

Баллов: 1

Which malicious software is used to cause DoS (Denial of Service) attack against particular web site?

  a. Keylogger  
  b. Virus?????????????????  
  c. Zombie  
  d. Trojan Horse  
  e. Worm  

Неверно

Question27

Баллов: 1

Indicate the definition for Anonymity.

  a. verifying the creation or existence of information by an entity other than the creator.  
  b. concealing the identity of an entity involved in some process.  
  c. acknowledgement that services have been provided.  
  d. providing an entity with the legal right to use or transfer a resource to others.  
  e. acknowledgement that information has been received.  

Верно

Question28

Баллов: 1

In which of the four basic password techniques the system periodically runs its own password cracker to find guessable passwords and cancels any passwords that are guessed and notifies the user.

  a. Reactive password checking  
  b. Proactive password checking  
  c. User-generated passwords  
  d. Computer-generated passwords  
  e. User education  

Неверно

Question29

Баллов: 1

Public-key cryptography is important because it solves:

  a. The key sharing problem  
  b. The key recovery problem  
  c. The password sharing problem  
  d. The password recovery problem  
  e. The key distribution problem  

Верно

Question30

Баллов: 1

Which of these is NOT a recommended guideline for a good password?

  a. Use numbers  
  b. Mix in uppercase and lowercase letters  
  c. Avoid using a character more than twice  
  d. Use at least 8 characters  
  e. Use punctuation and other symbols  

Верно

SAMPLE


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: