1- Generic name for the collection of tools designed to protect data and to thwart hackers. a- Computer Security c- Internet Security b- Network Security d- None of them 2- Measures to protect data during their transmission. a- Computer Security c- Internet Security b- Network Security d- None of them 3- Measures to protect data during their transmission over a collection of interconnected networks a- Computer Security c- Internet Security b- Network Security d- None of them 4- An asset of the system is destroyed of becomes unavailable or unusable. This is an attack on availability. a- Interception c- Fabrication e- None of them b- Modification d- Interruption. 5- An unauthorized party gains access to an asset. This is an attack on confidentiality. a- Interception c- Fabrication e- None of them b- Modification d- Interruption. 6- An unauthorized party not only gains access but tampers with an asset. This is an attack on integrity. a- Interception c- Fabrication e- None of them b- Modification d- Interruption. 7- An unauthorized party inserts counterfeit objects into the system. This is an attack on authentication. a- Interception c- Fabrication e- None of them b- Modification d- Interruption. 8- Release of message contents: for a telephone conversion, an electronic mail message, and a transferred file are subject to which threats. a- Active Attack (Threat) c- Active and Passive Attacks (Threats) b- Passive Attack (Threat) d- Brute- Force Attack e- None of them 9- Masquerade takes place when one entity pretends to be a different entity is subject to which threats. a- Active Attack (Threat) c- Active and Passive Attacks (Threats) e- None of them b- Passive Attack (Threat) d- Brute- Force Attack 10- Replay: involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect is subject to which threats. a- Active Attack (Threat) c- Active and Passive Attacks (Threats) e- None of them b- Passive Attack (Threat) d- Brute- Force Attack 11- Modification of messages: means that some portion of a legitimate message is altered, or that messages are delayed or reordered, to produce an unauthorized effect is subject to which threats. a- Active Attack (Threat) c- Active and Passive Attacks (Threats) e- None of them b- Passive Attack (Threat) d- Brute- Force Attack 12- Denial of service: prevents or inhibits the normal use or management of communications facilities is subject to which threats. a- Active Attack (Threat) c- Active and Passive Attacks (Threats) e- None of them b- Passive Attack (Threat) d- Brute- Force Attack 13- The attacker only monitors the traffic attacking the confidentiality of the data. a- Active Attack (Threat) c- Active and Passive Attacks (Threats) e- None of them b- Passive Attack (Threat) d- Brute- Force Attack 14- The adversary attempts to alter the transmission attacking data integrity, confidentiality, and authentication. a- Active Attack (Threat) c- Active and Passive Attacks (Threats) e- None of them b- Passive Attack (Threat) d- Brute- Force Attack 15- Try every possible key on the ciphertext until an intelligible translation into a plaintext is obtained. a- Active Attack (Threat) c- Active and Passive Attacks (Threats) e- None of them. b- Passive Attack (Threat) d- Brute- Force Attack 16- Assurance that the communicating entity is the one claimed a- Access Control c- Data Integrity e- Non- Repudiation b- Authentication d- Data Confidentiality 17- Prevention of the unauthorized use of a resource. a- Access Control c- Data Integrity e- Non- Repudiation b- Authentication d- Data Confidentiality 18- Protection of data from unauthorized disclosure a- Access Control c- Data Integrity e- Non- Repudiation b- Authentication d- Data Confidentiality 19- Assurance that data received is as sent by an authorized entity. a- Access Control c- Data Integrity e- Non- Repudiation b- Authentication d- Data Confidentiality 20- Protection against denial by one of the parties in a communication a- Access Control c- Data Integrity e- Non- Repudiation b- Authentication d- Data Confidentiality 21- In the Access control security model, the 1st line of defense that is an appropriate gatekeeper functions based on a password to identify users is: a- Access channel b- Gatekeeper function c- Internal security controls d- security related transformation 22- In the network security model, develop methods to distribute and share the secret information is: a- Algorithm b- Secret Information c- Key Management d- Protocol 23- The original message a- Ciphertext c- Key e- Cryptology b- Plaintext d- Encipher 24- The coded message a- Ciphertext c- Key e- Cryptology b- Plaintext d- Encipher 25- Algorithm for transforming plaintext to ciphertext a- Ciphertext c- Key e- Cryptology b- Plaintext d- Cipher 26- Information used in cipher known only to sender/receiver a- Ciphertext c- Key e- Cryptology b- encipher (encrypt) d- Cipher 27- Converting plaintext to ciphertext a- Ciphertext c- Key e- Cryptology b- Encipher (Encrypt) d- Cryptanalysis 28- Recovering ciphertext from plaintext a- Ciphertext c- Cryptology e- Cryptography b- Decipher (Decrypt) d- Cipher 29- Study of encryption principles/methods a- Ciphertext b- Decipher (Decrypt) c- Cryptology d- Cipher e- Cryptography 30- The study of principles/ methods of deciphering ciphertext without knowing key a- Ciphertext c- Cryptology e- Cryptography b- Decipher (Decrypt) d- Cryptanalysis 31- The field of both cryptography and cryptanalysis a- Ciphertext c- Cryptology e- Cryptography b- Decipher (Decrypt) d- Cryptanalysis 32- Cryptography can be characterized by the type of encryption operations used to a- Single or Private/ Two or Public Key b- Block/ Stream c- Substitution/Transposition/ Product d- None of them 33- Cryptography can be characterized by the way in which plaintext is processed to a- Single or Private/ Two or Public Key c- Substitution/Transposition/ Product b- Block/ Stream d- None of them 34- Cryptography can be characterized by the number of keys used to a- Single or Private/ Two or Public Key c- Substitution/Transposition/ Product b- Block/ Stream d- None of them 35- Earliest known substitution cipher, the first attested use in military affairs. It replaces each letter by 3rd letter on. a- Playfair Cipher c- Monoalphabetic cipher b- Caesar Cipher d- Vigenere Cipher 35- Rather than just shifting the alphabet, it could shuffle (jumble) the letters arbitrarily, each plaintext letter maps to a different random ciphertext letter. Hence key is 26 letters long. a- Playfair Cipher c- Monoalphabetic cipher b- Caesar Cipher d- Vigenere Cipher 36- Not even the large number of keys in a monoalphabetic cipher provides security. One approach to improving security was to encrypt multiple letters by: a- Playfair Cipher c- Monoalphabetic cipher e- None of them. b- Caesar Cipher d- Rail-fence Cipher 37- Another approach to improving security is to use multiple cipher alphabets . It called polyalphabetic substitution ciphers. This method makes cryptanalysis harder with more alphabets to guess and flatter frequency distribution. a- Vigenere Cipher c- Monoalphabetic cipher e- None of them b- Caesar Cipher d- Rail-fence Cipher 38- Repetitions in ciphertext give clues to period, so find same plaintext an exact period apart which results in the same ciphertext. Ideally want a key as long as the message, Vigenère proposed. a- One Time Pad Cipher c- Monoalphabetic cipher e- None of them b- Caesar Cipher d- Autokey Cipher 39- If a truly random key as long as the message is used, the cipher will be secure, this is a- One Time Pad Cipher c- Monoalphabetic cipher e- None of them b- Caesar Cipher d- Autokey Cipher 40- It write message letters out diagonally over a number of rows, then read off cipher row by row. This is one type of transposition cipher a- Vigenere Cipher c- Monoalphabetic cipher e- None of them b- Caesar Cipher d- Rail-fence Cipher 41- A more complex scheme, it writes letters of message out in rows over a specified number of columns then reorder the columns according to some key before reading off the rows. a- Vigenere Cipher c- Row- Transposition cipher e- None of them b- Caesar Cipher d- Rail-fence Cipher 42- Machine implemented a very complex, varying substitution cipher. It is used a series of cylinders, each giving one substitution, which rotated and changed after each letter was encrypted with 3 cylinders have 263=17576 alphabets, were widely used in WW2. a- German Enigma, Allied Hagelin, Japanese Purple Machines b- Rotors Machine c- WW2 Encryption Machines d- None of them 43- An alternative to encryption hides existence of message with another message. This is a- Cryptography c- Cryptology e- None of them b- Steganography d- Cryptanalysis 44- Most widely used block cipher in world, adopted in 1977 by NBS (now NIST) as FIPS PUB 46. It encrypts 64-bit data using 56-bit key. a- Data Encryption Standard (DES) b- IDEA c- Blowfish d- RC2 e-Cast-128 45- A private key symmetric block cipher until now • 128-bit data, 128/192/256-bit keys • stronger & faster than Triple-DES • active life of 20-30 years (+ archival use) • provide full specification & design details • both C & Java implementations • NIST have released all submissions & unclassified analyses a- Data Encryption Standard (DES) c- Blowfish e-Cast-128 b- IDEA d- ASE 46- Designed by Rijmen-Daemen in Belgium, it • has 128/192/256 bit keys, 128 bit data • an iterative rather than feistel cipher • It is a encryption standard in US sine oct, 2000 a- Data Encryption Standard (DES) c- Rijndael e-Cast-128 b- IDEA d- ASE 47- This is the most popular symmetric stream cipher Designed by Rivestfor RSA Security Used in SSL/TLS (Secure Sockets Layer/Transport Layer Security) standards for secure communication between Web browsers and servers Used in WEP, part of the IEEE 802.11 wireless LAN standard was kept as a trade secret by RSA Inc but got anonymously posted on the Internet in 1994 a- Data Encryption Standard (DES) c- Rijndael e-Cast-128 b- RC4 d- ASE 48- A symmetric block cipher designed by Bruce Schneier in 1993/94 • characteristics – fast implementation on 32-bit CPUs – compact in use of memory – simple structure for analysis/implementation – variable security by varying key size • has been implemented in various products • uses a 32 to 448 bit key a- Data Encryption Standard (DES) c- Rijndael e- Cast-128 b- RC4 d- Blowfish 49- It can classify uses into 3 categories: – encryption/decryption (provide secrecy) – digital signatures (provide authentication) – key exchange (of session keys) a- Private Key Cryptography b- Public Key Cryptography c- Private and Public Key Cryptography d- None of them 50- IT is developed by Rivest, Shamir & Adleman of MIT in 1977 • best known & widely used public-key scheme • based on exponentiation in a finite (Galois) field over integers modulo a prime a- ElGamal Cipher c- RSA Cipher b- Elliptic Key Cipher d- None of them 51- A public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts. It is application is a- Encryption/ Decryption c- Key Exchange b- Digital Signature d- None of them 52- Majority of public-key crypto (RSA, D-H) use either integer or polynomial arithmetic with very large numbers/polynomials. It imposes a significant load in storing and processing keys and messages. Offers same security with smaller bit sizes a- ElGamal Cipher c- RSA Cipher b- Elliptic Key Cipher d- None of them 53- The Application of DSA ( Digital Signature Algorithm) and DSS( Digital Signature Standard) are: a- Encryption/ Decryption b- Digital Signature c- Key Exchange d- None of them 53- The Success of Digital Immune System (Advance anti virus system) depends on: a- Monitor Program on Clint machine b- administrative machine c- Generic decryption machine d- Virus analysis machine e- None of them 54- Prevention of the unauthorized use of a resource. a- security related transformation b- Gatekeeper function c- Internal security controls d- Access channel e- None of them 55- Any virus entering organization is captured, analyzed, detection/shielding created for it, removed. a- First generation b- Second generation c- Third generation d- Generic Decryption e- Digital Immune system 56- Usually targeted at Microsoft Outlook mail agent & Word/Excel documents. a- Trojan horse b- Logic Bomb c- Macro virus d- Trap door e- Worm 57- In the system access control, the way you tell the system who you are. a- Authentication b- Fabrication c- Identification d- Modification e- None of them 58- In the system access control, the way you improve your identity. a- Authentication b- Fabrication c- Identification d- Modification e- None of them 59- A public function of the message with secret key that produces a fixed-length value that serves as the authenticator. a- MAC function c- Encryption function b- Hash Function d- None of them 59a- A public function maps a message of any length into a fixed-length value, which serves as authenticator. a- MAC function c- Encryption function b- Hash Function d- None of them 60- A symmetric block cipher designed by Ron Rivest. The algorithm designed to be easy to implement on 16-bit Microprocessor and using variable key size from 8 to 1024 bit. . a- DES c- BlowFish e- IDEA b- RC2 d- Cast 128 61- Virtual CPU emulator a module that scan the target code looking for known virus signature. a- Generic Encryption c- None of them b- IBM Digital Immune system 62- The 2nd line of defense that monitors activity and analyze stored information in an attempt to detect the unwanted intruders. a- Access channel c- Internal security controls e- None of them b- Gatekeeper function d- security related transformation 63- It was designed by NIST & NSA in 1993, revised 1995 • US standard for use with DSA signature scheme • standard is FIPS 180-1 1995, also Internet RFC3174 • produces 160-bit hash values • now the generally preferred hash algorithm a- MD5 c- MD2 b- Secure Hash Algorithm (SHA) d- MD4 64- It was designed by Ronald Rivest (the R in RSA) • latest in a series of MD2, MD4 • • • produces a 128-bit hash value until recently was the most widely used hash algorithm specified as Internet standard RFC1321 a- MD5 c- MD2 b- Secure Hash Algorithm (SHA) d- MD4 65- US Govt approved signature scheme FIPS 186 • uses the SHA hash algorithm • designed by NIST & NSA in early 90's • DSA is the algorithm a- Digital Signature Standard (DSS) b- Encryption Standard c- Key Exchange Standard d- None of them 66- Widely used de facto secure email • developed by Phil Zimmermann • selected best available crypto algorithms to use • integrated into a single program • available on Unix, PC, Macintosh and Amiga systems • originally free, now have commercial versions available also a- S/MIME c- SHTTP b- PGP d- None of them 67- It has support in various modern mail agents: MS Outlook, Netscape etc. It cryptographic Algorithms and certifications are: • hash functions: SHA-1 & MD5 • digital signatures: DSS & RSA • session key encryption: ElGamal & RSA • message encryption: Triple-DES, RC2/40 and others • have a procedure to decide which algorithms to use • it uses X.509 v3 certificates • managed using a hybrid of a strict X.509 CA hierarchy & PGP’s web of trust • each client has a list of trusted CA’s certs • and own public/private key pairs & certs • certificates must be signed by trusted CA’s a- S/MIME c- SHTTP b- PGP d- None of them 68- It considered some application specific security mechanisms – eg. S/MIME, PGP, Kerberos, SSL/HTTPS • however there are security concerns that cut across protocol layers • would like security implemented by the network for all applications • general mechanisms provides – authentication – confidentiality – key management • applicable to use over LANs, across public & private WANs, & for the Internet • • mandatory in IPv6, optional in IPv4 It used in a firewall/router t provide strong security to all traffic crossing the perimeter. a- Secure Socket Layer (SSL) c- Secure Electronic Transfer (SET) b- IP Security d- None of them 69- Web now widely used by business, government, individuals, but Internet & Web are vulnerable. The web has a variety of threats – integrity – confidentiality – denial of service – authentication • Need added security mechanisms, which mechanism need? a- IP Security b- Web Security c- Secure Electronic Transfer (SET) d- None of them 70- A layer security service • originally developed by Netscape • version 3 designed with public input • subsequently became Internet standard known as TLS (Transport Layer Security) • uses TCP to provide a reliable end-to-end service • It has two layers of protocols a- Secure Socket Layer (SSL) c- Secure Electronic Transfer (SET) b- IP Security d- None of them 71- Open encryption & security specification to protect Internet credit card transaction developed in 1996 by Mastercard, Visa etc, not a payment system. Rather a set of security protocols & formats – secure communications amongst parties – trust from use of X.509v3 certificates – privacy by restricted info to those who need it a- Secure Socket Layer (SSL) c- Secure Electronic Transfer (SET) b- IP Security d- None of them 72- A secret entry point into a program • allows those who know access bypassing usual security procedures • have been commonly used by developers • a threat when left in production programs allowing exploited by attackers • very hard to block in O/S • requires good s/w development & update a- Logic Bomb c- Virus e- None of them b- Trap door d- Trojan horse 73- One of oldest types of malicious software • • • code embedded in legitimate program activated when specified conditions met – eg presence/absence of some file – particular date/time – particular user when triggered typically damage system – modify/delete files/disks a- Logic Bomb c- Virus e- None of them b- Trap door d- Trojan horse 74- A program with hidden side-effects • which is usually superficially attractive – eg game, s/w upgrade etc • when run performs some additional tasks – allows attacker to indirectly gain access they do not have directly • often used to propagate a virus/worm or install a backdoor • or simply to destroy data a- Logic Bomb c- Virus e- None of them b- Trap door d- Trojan horse 75- A piece of self-replicating code attached to some other code • both propagates itself & carries a payload – carries code to make copies of itself – as well as code to perform some covert task a- Logic Bomb c- Virus e- None of them b- Trap door d- Trojan horse 76- Replicating but not infecting program • typically spreads over a network – cf Morris – led to creation of CERTs • using users distributed privileges or by exploiting system vulnerabilities • widely used by hackers to create zombie PC's, subsequently used for further attacks, esp DoS • major issue is lack of security of permanently connected systems, esp PC's a- Logic Bomb c- Virus e- None of them b- Worm d- Trojan horse 77- Macro code attached to some data file • interpreted by program using file – eg Word/Excel macros – esp. using auto command & command macros • • • • code is now platform independent is a major source of new viral infections blurs distinction between data and program files making task of detection much harder classic trade-off: "ease of use" vs "security" a- Logic Bomb c- Macro Virus e- None of them b- Worm d- Trojan horse 78- Spread using email with attachment containing a macro virus – cf Melissa • triggered when user opens attachment • or worse even when mail viewed by using scripting features in mail agent • usually targeted at Microsoft Outlook mail agent & Word/Excel documents a- Logic Bomb c- E-mail Virus e- None of them b- Worm d- Trojan horse 79- Use a Network to transfer from System to System. Their sole purpose is to replicate themselves a- Logic Bomb b- Worm c- E-mail Virus d- Trojan horse e- Bactria 80- A type of virus designed to hide itself from detection by antivirus software a - Parasitic virus c- Boot sector virus e- Polymorphic virus b- Memory-resident virus d- Stealth virus 81- Is a traditional Virus and still most common form of virus? It attaches itself to executable files and replicates a - Parasitic virus c- Boot sector virus e- Polymorphic virus b- Memory-resident virus d- Stealth virus 82 - A virus, that mutates with every infection making detection by the “signature” of the virus impossible. a- Stealth Virus b- Polymorphic Virus c- Parasitic Virus d- Boot Sector Virus e- Memory resident Virus 83- A generation of antivirus the scanner uses virus signature to identify virus or change in length of programs a- 1st generation c- 3rd generation b- 2nd generation d- 4th generation 84- A generation of antivirus the scanner uses heuristic rules to spot viral infection or uses program checksums to spot changes. a- 1st generation c- 3rd generation b- 2nd generation d- 4th generation 85- A generation of antivirus that packages with a variety of antivirus techniques eg scanning & activity traps, access-controls a- 1st generation c- 3rd generation b- 2nd generation d- 4th generation 86- generation of antivirus which is a memory-resident programs identify virus by actions a- 1st generation c- 3rd generation b- 2nd generation d- 4th generation 87- An advance antivirus use CPU simulator to check program signature & behavior before actually running it a- Generic Encryption System b- IBM Digital Immune System c- Monitor Encryption System d- None of them 88- General purpose emulation & virus detection any virus entering org is captured, analyzed, detection/shielding created for it, removed. a- Generic Encryption System c- Monitor Encryption System b- IBM Digital Immune System d- None of them 89- The process by which one entity verifies that another entity is who they claim to be a- Auditing c- Authorization e- None of them b- Authentication d- Integrity 90- The process that ensures that a person has the right to access certain resources a- Auditing c- Authorization e- None of them b- Authentication d- Integrity 91- The process of collecting information about attempts to access particular resources, use particular privileges, or perform other security actions. a- Auditing c- Authorization e- None of them b- Authentication d- Integrity 92- Storage devices (e.g., magnetic strips) used in a two-factor authentication system that contains a secret code. a- Active token c- Biometric systems b- Passive token d- None of them 93- Small, stand-alone electronic devices in a two factor authentication system that generate one-time passwords a- Active token c- Biometric systems b- Passive token d- None of them 94- Authentication systems that identify a person by measurement of a biological characteristic such as a fingerprint, iris (eye) pattern, facial features, or voice a- Active token c- Biometric systems b- Passive token d- None of them 95- Measurements derived directly from different parts of the body (e.g., fingerprints, iris, hand, facial characteristics) a- Physiological biometrics c- Active token b- Behavioral biometrics d- None of them 96- Measurements derived from various actions and indirectly from various body parts (e.g., voice scans or keystroke monitoring) a- Physiological biometrics c- Active token b- Behavioral biometrics d- None of them 97- A scheme for securing e-payments using public key encryption and various technical components a- SSL c- SET b-PKI d- Web security 98- An identifying code that can be used to authenticate the identity of the sender of a document, Portable, Cannot be easily repudiated or imitated, and can be time-stamped a- Digital Signature c- Key Exchange b- Encryption/ Decryption d- None of them 99- The combination of the encrypted original message and the digital signature, using the recipient’s public key a- Digital Signature c- Digital Envelope b- Encryption/ Decryption d- None of them 100- A summary of a message, converted into a string of digits, after the hash has been applied a- Digital Signature c- Digital Envelope b- Message digest d- None of them 101- Third parties that issue digital certificates a- Digital Signature c- Digital Envelope b- Message digest d- Certificate authorities (CAs) 102- A network node consisting of both hardware and software that isolates a private network from a public network a- Firewall c- Application-level proxy b- Digital Signature d- None of them 103- Rules that can accept or reject incoming packets based on source and destination addresses and the other identifying information a- SSL c- Application-level proxy b- Packet Filter Firewall d- None of them 104- A firewall that permits requests for Web pages to move from the public Internet to the private network a- SSL c- Application-level proxy b- Packet Filter Firewall d- None of them 105- A special hardware server that utilizes application-level proxy software to limit the types of requests that can be passed to an organization’s internal networks from the public Internet a- Bastion gateway b- Packet Filter Firewall c- Application-level proxy d- None of them 106- Special software programs that run on the gateway server and pass repackaged packets from one network to the other a- Bastion gateway c- proxy b- Packet Filter Firewall d- None of them 107- A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s network interface card a- Bastion gateway c- proxy b- Packet Filter Firewall d- Personal Firewall 108- A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network a- Virtual private network (VPN ) c- Intrusion detection systems (IDSs) b-Firewall d- Proxy 109- A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees a- Virtual private network (VPN) c- Intrusion detection systems (IDSs) b- Firewall d- Proxy 110- The standard symmetric encryption algorithm supported the NIST and used by U.S. government agencies until October 2, 2000. a- IDEA c- Rijndal e- None of them b- DES d- RSA 111- The new Advanced Encryption Standard used to secure U.S. government communications since October 2, 2000 a- IDEA c- Rijndal e- None of them b- DES d- RSA