Network Security MCQs

 1. Any action that compromises the security of information owned by an organization is known as ______.

a.     Security Attack                                    b. Security Mechanism     

c. Security Services                                     d. Security Architecture

 

2. Active attack does not contain _____.

a.     Masquerade                                          b. Traffic analysis            

c. Replay                                                       d. Denial of Service

 

3. Which of the following is not a type of Security Services.

            a. Confidentiality                                        b. Integrity                           

            c. availability                                               d. Release of message content        

 

4. The use of mathematical algorithms to transform data into a form that is not readily intelligible is known as ______.                                                                                                                                 a. Digital Signature                                b. Traffic Padding                                              

            c. Encipherment                                   d. Notarization

5. Routing Control enables ______ of particular physically secure routes for certain data.            

a. selection                                                  b. prevention                                                                        c. detection                                                       d. recovery

6. Symmetric encryption transforms ______ into _____ using a secret key and an encryption algorithm.                                                                                                                                                      

 a. Cipher text, plain text                            b. Plain text, cipher text                                                 c. Encrypted IV, plain text                          d. Encrypted IV, cipher text

7. Techniques used for deciphering a message without any knowledge of the enciphering details is called as ______ .                                                                                                                                           a. Cryptography                                          b. Cryptology                                                                      c. Cryptanalysis                                        d. Steganography

8. Symmetric cipher model consist of ______ parts.

            a. 2                                          b. 3                             c. 4                                          d. 5

9. In Brute force attack the attacker tries every possible key on a piece of ______ until ______ is obtained.                                                                                                                                                                   a. Cipher text, plain text                         b. Plain text, cipher text               

            c. Encrypted Cipher, cipher text              d. Encrypted cipher, plain text

 

10. A Substitution technique is one in which the letters of plaintext are ______ by other letters or by numbers or symbols.                                                                                                                          a. arranged                                                   b. replaced                                                                          c. modified                                                   d. compressed

 

11. The ______ and ______ are examples of polyalphabetic substitution cipher.                                                

a. Hill cipher, polygram cipher                b. Rail-fence cipher, simple columnar cipher    

c. Vigenere cipher, Beaufort cipher           d. Hill Cipher, Simple Columnar cipher

 

12. The resultant cipher of applying Rail-fence technique on word “Transposition” is ______.                           

a. positionTrans                                          b. Trnsostinapio                                                                  

c. Tarnsopsiiton                                          d. Tasoiinrnpstn

 

13. Character marking, Invisible Link pin punctures, Typewriter correction ribbon are the types of ______.                                                                                                                                                      a. Steganography                                      b. Cryptography                                                                       c. Cryptanalysis                                           d. Feistel Cipher

 

14. Feistel cipher is based on ______.                                                                                                                  a. Transposition technique                       b. Substitution-permutation network                        c. Block Cipher Technique                         d. AES

 

15. DES encrypts 64-bit blocks using a ______ key and produces a ______ ciphertext.                            

a. 64-bit, 64-bit                                            b. 64-bit, 56-bit                                                             

c. 56-bit, 64-bit                                          d. 56-bit,56-bit

 

16. ______ uses 128-bit data, 128/192/256-bit keys.                                                                                     a. DES                                                            b. Feistel Cipher                                                                       c. Polygram Cipher                                    d. AES

17. ShiftRows operation in AES involves ______.                                                                                       a. simple permutation                            b. S-box permutation                                                 

c. P-box permutation                                 d. bitwise XOR

 

18. In AES transformation function, hexadecimal value 68 is referred to row ______ and column ______ and value in table at that position is 45 so byte value 68 is replaced with ______.                          

a. 8, 6, 54                                                       b. 6, 8, 45                                                                              

c. 0, 6, 45                                                       d. 0, 8, 45

 

19. The function follows an encrypt-decrypt-encrypt (EDE) sequence is ______.

C = E (K1, D (K2, E (K1, P)))

P = D (K1, E (K2, D (K1, C)))                                                                                                         

 a. DES                                                            b. Double DES                                                              

 c. Triple DES                                               d. AES

 

20. There are ______ types of Block Mode of operation.                                                                             a. 2                              b. 3                 c. 4                              d. 5

 

21. The term code book is used because for a given key is a ______ for every block of plain text.  

a. unique ciphertext                           b. similar ciphertext                                                    

c. encrypted IV                                       d. permutation

 

22. DES is a block cipher but it may be used as a ______ for cypher feedback mode or output feedback mode.                                                                                                                                                 a. substitution cipher                                 b. Transposition cipher                                                     

c. stream cipher                                         d. polygram cipher

 

23. In counter mode, counter equal to the ______ block size is used.                                       

a. key size                                                     b. plain text                                                                            c. algorithm mode                                      d. algorithm type

 

24. The output of the generator is called as ______.                                                                                        a. key stream                                              b. key size                                                                                   c. key type                                                     d. key IV

 

25. Stream cipher uses a ______ system.                                                                                                             a. random number                                     b. pseudo random number                                               c. float                                                            d. character

 

26. The ______ algorithm generates a pseudo random stream of bits called key stream.              

a. AES                                                          b. Hash Function                                                                  

c. RC4                                                          d. MAC          

 

27. ______ is a cryptographic system that uses two separate keys.                                                            a. symmetric key Cryptography             b. shared key Cryptography                                                 c. private key Cryptography                     d. public key Cryptography

 

28. In public key Cryptography if A wish to send a confidential message to B, A encrypt the message using ______.                                                                                                                                       a. B’s public key                                        b. B’s private key                                                               

c. A’s public key                                          d. A’s private key

 

29. If the authenticator is encrypted with the sender's private key it serves as a ______.                

a. steganography                                        b. signature                                                                    

c. cryptography                                           d. Encryption

 

30. In ______, the opponent has some idea about the plaintext and he use this information to find the private key.                                                                                                                                          a. Brute force attack                                   b. man-in-middle attack                                                   

c. Probable message attack                  d. breach of security

 


Comments

  1. This information is meaningful and magnificent which you have shared here about cyber security and anonymity. I am impressed by the details that you have shared in this post and It reveals how nicely you understand this subject. I would like to thanks for sharing this article here. Security policies in network security

    ReplyDelete
  2. I just need to say this is a well-informed article which you have shared here about hoodies. It is an engaging and gainful article for us. Continue imparting this sort of info, Thanks to you. Cyber Security Latest News Canada

    ReplyDelete
  3. I definitely enjoying every little bit of it. It is a great website and nice share. I want to thank you. Good job! You guys do a great blog, and have some great contents. Keep up the good work. pls visit our website fire alarm systems

    ReplyDelete
  4. I examine your blog site presently share great information right below. link name

    ReplyDelete

Post a Comment