0% found this document useful (0 votes)
18 views12 pages

Tyc Sins PDF

Uploaded by

pawan.g7208
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views12 pages

Tyc Sins PDF

Uploaded by

pawan.g7208
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

QUESTION A

1 Assurance Of data secracy is called __ Availability


2 Assurance of no change in data during transmission is called___ confidentiality
3 Assurance for available of data, resources to authorised user is referred
Availability
as___
4 ____ is a passive kind of attack. Release of message content
5 ____ is not a kind of passive attack. Release of message content
6 ____ a is method to encode plain text into cipher text. Encipherment
7 We can define ____ process as: y = E(k,X) assymetric encryption
8 In ____ type of attack, attacker guesses all the possible password bycryptoanalysis
applying different types of combinations.
9 _______ is not a type of attack on encrypted text. cipher text only
10 Caeser cipher is a ____ techniques. substitution
11 If plain text is " viva" , using key as 4 by applying ceaser cipher whataiae
will be cipher text?
12 Key size of monoalphabetic algorithm is___ 26
13 _____ algorithm is also known as One time pad. vernam
14 In ____ type of techniques original message id hidden in normal message steganography
or any picture.
15 _____ is not a stream cipher encryption. vegenere
16 DES algorithm have ___ bits plain text block. 64
17 DES algorithm have ___ number of rounds. 4
m

18 key size of DES algorithm is___ 64


19 In DES algorithm ____ phase convert key into 48 bit. expansion
un

20 The principle of ____ ensures that the sender of a message can not laterauthentication
claim that the message was never sent.
21 The four primary security principles related to a message are____ conidentiality,authentication,integrity,non re
22 In substitution cipher, the following happens: characters are replaced by other character
ot

23 The process of writing the text as diagonals and reading it as sequence RailofFence
rows techniques
is called____
24 The matrix theory is used in the ___ technique. Hill cipher
25 RSA is ________ type of algorithm. symmetric
es

26 DES stands for___ Data Encryption Standard


27 For plain text "hellostudent" encrypted text using Railfence using depthhlteeounlsdt
3 is____
.in

28 In ___ attack person pretend as a authorized person. Replay


29 OFB stands for _________ Output Feedback
30 In ______ type of algorithm 5*5 matrix is used. Cesear cipher
Consider plaintext " college" and key=2, find cipher text using
cleeolg
31 Railfence algorithm____.
32 In ___ text from secret message are overwritten with pencil or any other
character
object
marking
on normal message.
33 In ___ key pair ( public and private) is used. asymetric
34 In ___ type of algorithm two large prime numbers are selected by theRSA
user.
B C D CORRECT
confidentiality integrity Authentication
confidentiality
Authentication Availability integrity integrity
confidentiality integrity Authentication
Availability
Replay Denial of service MasqueradeRelease of message content
Replay Traffic analyis evasdropping Replay
X.800 Digital Signature Access Control
Encipherment
symetric encryption symmetric decryptionasymetric decryption
symetric encryption
expression analysis symetric analysis brute force brute force
plain text only chosen plain ext chosen ciphertext
plain text only
transposition substitution and transposition
hybrid encryption
both
substitution
zmze kikr mlmg zmze
4 2 32 26
monoalphabetic ceaser vigenere vernam
substitution transposition analysis steganography
vernam RSA playfair RSA
62 56 52 64
12 16 22 16
m

62 56 52 56
key transformation key substitution s- box substitution
key transformation
un

availability access control non repudiation


non repudiation
confidentiality, accessauthentication,authorization,non
control,non repudiation,
availabilty,access
integrity
conidentiality,authentication,integrity,non
repudiation,
control,authorization,authentication
availability repudiation
rows are replaced by columns
columns are replacednon
by rows
of the above
characters are replaced by other character
ot

one time pad block cipher key cipher Rail Fence techniques
monoalphabetic Play fair vigenere Play fair
asymetric both none of theseasymetric
es

Data Encryption Solution


Data Encryption StartData Encryption
Data Solving
Encryption Standard
hlelotsuedtn shtuldleohetn dlhoeltsuetnhlteeounlsdt
.in

Masquared Logic bomb Trojan Horse Masquared


On Feedback Open Feedback Over FeedbackOutput Feedback
playfair Reil fence Monoalphabetic
Playfair
olgcele clgoeec eeclolg cleeolg
invisible ink pin punctures type writtercharacter
ribon marking
symmetric both none of these
asymetric
DES AES playfair RSA
QNO QUESTION A
1 ___ type of algorithm is used as key exchange algorithm deffie hellman
2 ____ suffers from Man-in -the-Middle attack. RSA
3 Man in the Middle attack is also called as____ Bucket Brigade attack
4 MAC stands for__ message authentication code
5 Denial of receipt of message by destination is __ type of attack. source repudiation
6 Denial of transmission of message by source is __ type of attack. source repudiation
7 Release of message to any unauthenticated user is ___type of attack. disclosure
8 A ___functions are mathematical function that converts one value into another
key compressed value.
9 Reverse of hash function doesn’t give original value. It resist to reach original
pre image
message
resistance
from message digest value
10 When two different inputs finds same hash value , then it is called as___ collision
11 SHA stands for__ standard hash algorithm
12 Process of trying to break any cipher text message to obtain the original cryptanalysis
message is called
13 CHAP stands for__ challenge handshake authentication prot
14
Extensible
EAP stands for_________ Authentication
15 protocol
16 When attacker breaks A's private key it s called as_____ universal forgery
m

In SHA padding is done in such a way that the length of message is ____
17 bits short of multiple of 512. 28
un

18 AAA protocol refers to__ Authentication


19 DSS stands for___ digital signature standard
20 Kerbores is a ___ protocol. Authentication
ot

21 In kerbores TGS stands for __ Ticket Granting System


22 In PKIX ___ relates to registration process. registration authority
es

23 ___ issue certificate. CA


24 The __standard defines the structure of a digital certificate. X.109
25 ___ is not a function performed by PKIX. registration
.in

In ___ attack attacker forges a signature for a particular message


universal forgery
26 chosen by attacker.
When attacker known senders public key and based on that he attack is
27 refered as__ key only attack
28 ____ is not a element of public key cryptosystem. encryptio/decryption
In ___________ type attack attempts to use all possible permutation and
Brute force
29 combination.
___ maps a message of any length into fixed length value as
30 authenticator. hash function
___ is a function of the message and a secret key that produces a fixed
31 length value as authenticator. MAC
32 ____is finger print or the summary of a message. encryption message
33 SHA -1 produces hash value of __ bits. 160
34 SHA follows ___ step. padding
B C D ANS
RSA DES AES deffie hellman
DES AES deffie hellman deffie hellman
phishing attack brute force none of these Bucket Brigade attack
message approved message
code accept code message audit code message authentication code
destination repudiation
content recovery none of these destination repudiation
destination repudiation
content recovery none of these source repudiation
content of modification
traffic analysis timing modification disclosure
hash map all hash
original resistance value resistance reverse resistance pre image resistance
input double hash double none of these collision
secure hash Algorithm
same hash algorithm sample hash algorithmsecure hash Algorithm
HMAC MAC SHA cryptanalysis
cipher hello authentication
cipher handshake
protocol authentication
change hello
protocol
authentication
challenge
protocol
handshake authentication protocol

Encrypt Extensible
Extended Authority End Authority
Authentication Authentication
Process Protocol
protocol protocol
Encrypt known Message Known Total Break Total Break
m

56 128 64 64
un

Authorisation Accounting All of these All of these


data sign standarddata secure standard data signature solution
digital signature standard
access system allocation advance Authentication
ot

Ticket Granting Server


Team Granting Service Team Granting System Ticket Granting Server
CRL end entity registration entity registration authority
es

CRA CLR AGS CA


TCP/IP ASN.1 X.509 X.509
revocation requestcertification introduction introduction
.in

Total Break
selective forgery existential forgery selective forgery

known message attack


total break forgery key only attack
key exchange digital signature key secrecy key secrecy
MD5 SHA MD Brute force

message function encryption decryption hash function

hash encryption signature client MAC


message digest decryption message key digest message digest
256 384 512 160
append length divide input in 512 block all of the above all of the above
ntication protocol
m
un
ot
es
.in
QNO
QUESTION A B C D CORRECT

1 Security feature offered by PGP__________. Encryption Non repudiation Integrity All Above All Above
2 PGP stands for__ pretty good privacy
private goal publicpublic and get key
noneprivate
of the above
pretty good privacy
In PGP, __ phase creates message digest of email message
using SHA-1 algorithm.
Resulting message digest is encrypted with sender’s
private key .
3 digital certificate
encryption compression padding digital certificate
Compressio
ZIP program is used for ______. Deletion Loading Encryption Compression
4 n
5 PGP uses___ public key cryposystem
private key cryptosystem
public and private
none
keyofcryptosystem
the above
public and private key cryptosystem
6 Data compression means__ deleting repeated
uniformdisribution
characters deleting
of character
repeated
none
characters
of the above
and
deleting
uniform
repeated
distribution
characters
of character
and uniform

m
7 PGP doesnot support ___ algorithm for encryption AES DES-3 IDEA COLUMNAR COLUMNAR
8 In PGP session key is encrypted with__ algorithm. RSA AES IDEA CAST RSA

un
9 In PGP message is encrypted with__ algorithm. RSA CAST MD secret key CAST
10 PGP is used for___ emails file encryption email and file encryption
none of the above
email and file encryption
11 S/MIME stands for standard multipurpose
standard mail
internet
internet
Secure/Multipurpose
mailmultipurpose
exensionsecureextension
mail
Internet
internet
Secure/Multipurpose
Mail media
Extension
extensionInternet Mail Extens

ot
12 ___defines a format for text messages that are sent using electronic
EAF-532 mail. RFC128 EAF 128 RFC 532 RFC 532
13 In S/MIME __ algorithm is used for encrypting symmetric session
deffie key.
hellman RSA DES DSS deffie hellman

es
14 In S/MIME __ algorithm is used for symmetric key enryption. RSA DES-3 DSS Deffie hellmanDES-3
15 killing of user threads threats leads to ___ type attack. denial of service
integrity authentication confidentiality denial of service
16 Modification of message during transmission is __ attack confidentiality integrity authentication denial of serviceintegrity

.in
17 When either client or server detects error then ___- protocolAlert
works. Handshake Common Cipher Spec Alert
18 In SSL connection between users is__ peer to peer multipoint peer to peer andany
multipoint
one from peer
peertotopeer
peerand multipoint
19 SSL record protocol provides__ confidentialityintegrity confidentiality and
availability
integrity confidentiality and integrity
20 ____ protocol allows the server and client to authenticate each
Alertother and Handshake
to negotiate anrecords
encryption Encryption Handshake
21 __ provides a secure communication channel among all theSET parties involved
PGP in an e-commerce
MIMEtransaction.none of the above
SET
22 ___user seize or control monitoring system or supresses auditmisfeaser
data. clandestine masquerader All Above clandestine
23 Access to the password file is limited to one or a very few accounts
access control
is__ available control secure one wayinformation
function control
access control
24 In ___, Set of rules are created and check whether behaviour stastical
is suspicious
detection
rule
or based
not . detection
expert detectionsecure detectionrule based detection
____________type of virus infects the system area of a Boot Sector Multipartite
Rabbit Virus Macro Virus Boot Sector Virus
25 disk. Virus Virus
26 _________is not a phase of Virus life cycle. Dismissed Triggering Propagation Dormant Dismissed
27 In dormant phase virus becomes________ Inactive Duplicate Replicate Completion Inactive
In _____ phase the virus replicates itself and attaches itself
Execution Dormant Propagation Triggering Propagation
28 to some program.

1 ___ type of algorithm is used as key exchange algorithm deffie hellman RSA DES AES deffie hellman
2 ____ suffers from Man-in -the-Middle attack. RSA DES AES deffie hellman deffie hellman
3 Man in the Middle attack is also called as____ Bucket Brigade phishing
attack attack brute force none of these Bucket Brigade attack
4 MAC stands for__ message authentication
message approved
code message
code acceptmessage
code audit message
code authentication code
5 Denial of receipt of message by destination is __ type of attack.
source repudiation
destination repudiation
content recovery none of these destination repudiation
6 Denial of transmission of message by source is __ type of attack.
source repudiation
destination repudiation
content recovery none of these source repudiation
7 Release of message to any unauthenticated user is ___typedisclosure
of attack. content of modification
traffic analysis timing modification
disclosure
8 A ___functions are mathematical function that converts onekey value into another
hash compressed mapvalue. all hash
9 Reverse of hash function doesn’t give original value. It resistpre
to image
reach original
resistance
original
message
resistance
from
value
message
resistance
digest
reverse
value.This
resistance
characterstic
pre image resistance
is reffered as___

m
10 When two different inputs finds same hash value , then it iscollision
called as___input double hash double none of these collision
11 SHA stands for__ standard hashsecure
algorithm
hash Algorithm
same hash algorithm
sample hash algorithm
secure hash Algorithm

un
12 Process of trying to break any cipher text message to obtain cryptanalysisHMAC
the original message is calledMAC SHA cryptanalysis
13 CHAP stands for__ challenge handshake
cipher hello
authentication
authentication
cipher protocol
handshake
protocol
change
authentication
hello authentication
challenge
protocol
handshake
protocolauthentication proto
14

ot
Extensible Encrypt Extended
End Authority Extensible Authentication
EAP stands for_________ Authenticati Authentication Authority
Protocol protocol
on protocol protocol Process

es
15
universal Message
16 When attacker breaks A's private key it s called as_____ forgery
Encrypt known
Known
Total Break Total Break

.in
In SHA padding is done in such a way that the length of
17 message is ____ bits short of multiple of 512. 28 56 128 64 64
18 AAA protocol refers to__ AuthenticationAuthorisation Accounting All of these All of these
19 DSS stands for___ digital signature
datastandard
sign standard
data secure standard
data signature digital
solution
signature standard
20 Kerbores is a ___ protocol. Authenticationaccess system allocation advance Authentication
21 In kerbores TGS stands for __ Ticket Granting
Ticket
System
Granting Server
Team Granting Team
Service GrantingTicket
SystemGranting Server
22 In PKIX ___ relates to registration process. registration authority
CRL end entity registration entity
registration authority
23 ___ issue certificate. CA CRA CLR AGS CA

24 The __standard defines the structure of a digital certificate. X.109 TCP/IP ASN.1 X.509 X.509
25 ___ is not a function performed by PKIX. registration revocation request
certification introduction introduction
In ___ attack attacker forges a signature for a particular universal
Total Break
26 message chosen by attacker. forgery selective forgery
existential forgery
selective forgery
When attacker known senders public key and based on
27 that he attack is refered as__ key only attack
known message attack
total break forgery key only attack
28 ____ is not a element of public key cryptosystem. encryptio/decryption
key exchange digital signaturekey secrecy key secrecy
In ___________ type attack attempts to use all possible
Brute force MD5 SHA MD Brute force
29 permutation and combination.
___ maps a message of any length into fixed length value
30 as authenticator. hash functionmessage functionencryption decryption hash function
___ is a function of the message and a secret key that
31 produces a fixed length value as authenticator. MAC hash encryption signature clientMAC
32 ____is finger print or the summary of a message. encryption message
message digest decryption message
key digest message digest
33 SHA -1 produces hash value of __ bits. 160 256 384 512 160
34 SHA follows ___ step. padding append length divide input in 512
all ofblock
the aboveall of the above

m
1 Assurance Of data secracy is called __ Availability confidentiality integrity Authenticationconfidentiality
2 Assurance of no change in data during transmission is called___ confidentiality
Authentication Availability integrity integrity

un
3 Assurance for available of data, resources to authorised user Availability
is referred as___
confidentiality integrity AuthenticationAvailability
4 ____ is a passive kind of attack. Release of message
Replay content Denial of service Masquerade Release of message content
5 ____ is not a kind of passive attack. Release of message
Replay content Traffic analyis evasdropping Replay

ot
6 ____ a is method to encode plain text into cipher text. EnciphermentX.800 Digital Signature
Access ControlEncipherment
7 We can define ____ process as: y = E(k,X) assymetric encryption
symetric encryptionsymmetric decryption
asymetric decryption
symetric encryption
8 In ____ type of attack, attacker guesses all the possible password
cryptoanalysis
by applying
expression
different
analysis
types
symetric
of combinations.
analysis
brute force brute force

es
9 _______ is not a type of attack on encrypted text. cipher text only
plain text only chosen plain extchosen ciphertext plain text only
10 Caeser cipher is a ____ techniques. substitution transposition substitution andhybrid
transposition
encryption
substitution
both

.in
11 If plain text is " viva" , using key as 4 by applying ceaser cipher
aiaewhat will zmze
be cipher text? kikr mlmg zmze
12 Key size of monoalphabetic algorithm is___ 26 4 2 32 26
13 _____ algorithm is also known as One time pad. vernam monoalphabetic ceaser vigenere vernam
14 In ____ type of techniques original message id hidden in normal steganography
messagesubstitution
or any picture. transposition analysis steganography
15 _____ is not a stream cipher encryption. vegenere vernam RSA playfair RSA
16 DES algorithm have ___ bits plain text block. 64 62 56 52 64
17 DES algorithm have ___ number of rounds. 4 12 16 22 16
18 key size of DES algorithm is___ 64 62 56 52 56
19 In DES algorithm ____ phase convert key into 48 bit. expansion key transformation key substitutions- box substitution
key transformation
20 The principle of ____ ensures that the sender of a message authentication
can not lateravailability
claim that the message
access control
was never
nonsent.
repudiationnon repudiation
21 The four primary security principles related to a message are____
conidentiality,authentication,integrity,non
confidentiality, access
authentication,authorization,non
control,non
repudiation
availabilty,access
repudiation,conidentiality,authentication,integrity,non
integrity
control,authorization,authentication
repudiation, availability
22 In substitution cipher, the following happens: characters arerows
replaced
are replaced
by other
columns
bycharacter
columns
are replaced
non of by
therows
above
characters are replaced by other character
23 The process of writing the text as diagonals and reading it asRail
sequence
Fence techniques
ofone
rows
time
is called____
pad block cipher key cipher Rail Fence techniques
24 The matrix theory is used in the ___ technique. Hill cipher monoalphabetic Play fair vigenere Play fair
25 RSA is ________ type of algorithm. symmetric asymetric both none of these asymetric
26 DES stands for___ Data Encryption
DataStandard
Encryption Solution
Data EncryptionData
StartEncryption
Data
Solving
Encryption Standard
27 For plain text "hellostudent" encrypted text using Railfence hlteeounlsdt
using depth 3hlelotsuedtn
is____ shtuldleohetn dlhoeltsuetn hlteeounlsdt
28 In ___ attack person pretend as a authorized person. Replay Masquared Logic bomb Trojan Horse Masquared
29 OFB stands for _________ Output Feedback
On Feedback Open FeedbackOver FeedbackOutput Feedback
30 In ______ type of algorithm 5*5 matrix is used. Cesear cipherplayfair Reil fence Monoalphabetic Playfair
Consider plaintext " college" and key=2, find cipher text
cleeolg olgcele clgoeec eeclolg cleeolg
31 using Railfence algorithm____.
32 In ___ text from secret message are overwritten with pencilcharacter
or any other
marking
invisible
object on
inknormalpin
message.
punctures type writter ribon
character marking
33 In ___ key pair ( public and private) is used. asymetric symmetric both none of these asymetric

m
34 In ___ type of algorithm two large prime numbers are selected
RSA by the user.
DES AES playfair RSA

un
ot
es
.in
ate key cryptosystem
ted characters and uniform distribution of character

m
purpose Internet Mail Extension
un
ot
es
and integrity
.in
entication code

m
un
dshake authentication protocol

ot
es
.in
m
un
ssage content

ot
es
.in
authentication,integrity,non repudiation
replaced by other character

You might also like