Network Security MCQs
1. Any action that compromises the security of information owned by an organization is known as ______.
a.
Security
Attack b.
Security Mechanism
c.
Security Services d. Security Architecture
2. Active
attack does not contain _____.
a.
Masquerade b. Traffic analysis
c.
Replay d. Denial of
Service
3.
Which of the following is not a type of Security Services.
a.
Confidentiality b. Integrity
c.
availability d. Release
of message content
4. The use of mathematical algorithms to transform data into a form that is not readily intelligible is known as ______. a. Digital Signature b. Traffic Padding
c. Encipherment d. Notarization
5. Routing Control enables ______ of particular physically secure routes for certain data.
a. selection b.
prevention c.
detection d.
recovery
6. Symmetric encryption transforms ______ into _____ using a secret key and an encryption algorithm.
a.
Cipher text, plain text b. Plain text, cipher text c. Encrypted
IV, plain text d. Encrypted IV, cipher
text
7. Techniques used for deciphering a
message without any knowledge of the enciphering details is called as ______ . a. Cryptography b. Cryptology c.
Cryptanalysis d.
Steganography
8.
Symmetric cipher model consist of ______ parts.
a.
2 b.
3 c.
4 d. 5
9. In Brute force attack the attacker tries every possible key on a piece of ______ until ______ is obtained. a. Cipher text, plain text b. Plain text, cipher text
c.
Encrypted Cipher, cipher text d. Encrypted cipher, plain text
10. A Substitution technique is one in which the letters of plaintext
are ______ by other letters or by numbers or symbols. a.
arranged b.
replaced c. modified d.
compressed
11. The ______ and ______ are examples of polyalphabetic substitution cipher.
a. Hill cipher, polygram cipher b. Rail-fence cipher, simple columnar cipher
c. Vigenere cipher, Beaufort cipher d. Hill Cipher, Simple Columnar
cipher
12. The resultant cipher of applying Rail-fence technique on word “Transposition” is ______.
a. positionTrans b. Trnsostinapio
c.
Tarnsopsiiton d. Tasoiinrnpstn
13. Character marking,
Invisible Link pin punctures, Typewriter correction ribbon are the types of
______. a.
Steganography b. Cryptography c.
Cryptanalysis d. Feistel Cipher
14. Feistel cipher is based on
______. a.
Transposition technique b. Substitution-permutation network c. Block Cipher Technique d.
AES
15. DES encrypts 64-bit blocks using a ______ key and produces a ______ ciphertext.
a. 64-bit, 64-bit b. 64-bit, 56-bit
c.
56-bit, 64-bit d.
56-bit,56-bit
16. ______ uses 128-bit data, 128/192/256-bit keys. a.
DES b. Feistel Cipher c. Polygram Cipher d. AES
17. ShiftRows operation in AES involves ______. a. simple permutation b. S-box permutation
c.
P-box permutation d.
bitwise XOR
18. In AES transformation function, hexadecimal value 68 is referred to row ______ and column ______ and value in table at that position is 45 so byte value 68 is replaced with ______.
a. 8, 6, 54 b. 6, 8, 45
c.
0, 6, 45 d. 0, 8, 45
19.
The
function follows an encrypt-decrypt-encrypt (EDE) sequence is ______.
C = E (K1, D (K2, E (K1, P)))
P = D (K1, E (K2, D (K1, C)))
a. DES b. Double DES
c. Triple
DES d.
AES
20.
There are ______ types of Block Mode of operation. a.
2 b.
3 c.
4 d. 5
21. The term code book is used because for a given key is a ______ for every block of plain text.
a. unique ciphertext b. similar ciphertext
c. encrypted
IV d. permutation
22. DES is a block cipher but it may be used as a ______ for cypher feedback mode or output feedback mode. a. substitution cipher b. Transposition cipher
c.
stream cipher d. polygram
cipher
23. In counter mode, counter equal to the ______ block size is used.
a.
key size b. plain text c. algorithm mode d. algorithm type
24.
The output of the generator is called as ______. a. key stream b.
key size c.
key type d. key IV
25.
Stream cipher uses a ______ system. a.
random number b. pseudo random number c. float d.
character
26. The ______ algorithm generates a pseudo random stream of bits called key stream.
a. AES b. Hash Function
c. RC4 d. MAC
27.
______ is a cryptographic system that uses two separate keys. a.
symmetric key Cryptography b. shared key Cryptography c.
private key Cryptography d.
public key Cryptography
28. In public key Cryptography if A wish to send a confidential message to B, A encrypt the message using ______. a. B’s public key b. B’s private key
c.
A’s public key d. A’s
private key
29. If the authenticator is encrypted with the sender's private key it serves as a ______.
a. steganography b. signature
c.
cryptography d.
Encryption
30. In ______, the opponent has some idea about the plaintext and he use this information to find the private key. a. Brute force attack b. man-in-middle attack
c.
Probable message attack d. breach of security
This information is meaningful and magnificent which you have shared here about cyber security and anonymity. I am impressed by the details that you have shared in this post and It reveals how nicely you understand this subject. I would like to thanks for sharing this article here. Security policies in network security
ReplyDeleteI just need to say this is a well-informed article which you have shared here about hoodies. It is an engaging and gainful article for us. Continue imparting this sort of info, Thanks to you. Cyber Security Latest News Canada
ReplyDeleteTelus Home Security Systems Quebec is one the best home security system
ReplyDeleteADT Home Security Ontario is one the best security system
ReplyDeleteh
I definitely enjoying every little bit of it. It is a great website and nice share. I want to thank you. Good job! You guys do a great blog, and have some great contents. Keep up the good work. pls visit our website fire alarm systems
ReplyDeleteI examine your blog site presently share great information right below. link name
ReplyDelete