127.Which of the following statement(s) is(are) properties of public-key encryption?
//The same algorithm with the same key is used for encryption and decryption
//The sender and receiver must share the algorithm and the key
One of the two keys must be kept secret.
128.Which of the following cipher(s) is(are) example of block cipher?
Fesitel Cipher
129.Which of the following(s) is (are) form(s) of malware (malicious software)?
All of the statements are correct
130.Which of the following is not a fundamental security goal?
Assurance
131.A ____________ is someone who breaks into the telephone network illegally manipulating various audio frequencies associated with the tones, typically to make free long-distance phone calls.
Phreak
132.Which one of the following statements is not the mode of Hacker attack?
Offline
133.Which of these is possibly the worst password that user can choose?
Nursultan1612
134.Which of the statement(s) is(are) properties for p and q?
p and q are prime
p and q should be of similar bit length
p and q are distinct
135.Which one of the statement is equation for φ(n)?
φ(n) = (p - 1)(q - 1)
136.Which of the following statement is NOT TRUE?
The public-key can be used to derive the private key
137.Which of the following statement is NOT TRUE?
A user must protect his/her public key
138.Which of the following statement is NOT TRUE?
The public key is kept secret while the private key may be widely distributed
139.Which of the following statements is TRUE?(IF NOT CORRECT)
Выберите один ответ.
Public key algorithms are used to hash the password | ||
None of the listed answers | ||
Public-key algorithms are used to encrypt the key encryption key | ||
Public-key algorithms are slow compared to symmetric cryptography |
140.Which of these statements is TRUE?
In symmetric-key cryptography, the key that is used to encrypt data is the same key that is used to decrypt it
141.Which of the statement is TRUE?
The larger the key size, the greater the range of possible values a key can be.
142.Which of these is NOT considered as a symmetric-key algorithm?
RSA
143.Which of the following(s) is(are) form(s) of malware(malicious software)?
a. Rootkits | ||
b. Scripts | ||
c. Worms | ||
d. Viruses | ||
e. All of the statements are correct |
144.You can use ___________ to protect your computer from outsiders
Antivirus software an personal firewall programs
145. How does the Hybrid Attack work?
Words from dictionary and their variations used in attack
146. In Magic Square cipher what will be the value of magic constant or magic sum M if the key is 17?