Question1
Баллов: 1
A program fragment or an independent program that, when executed, may produce one or more copies of itself to be activated later on the same system or some other system. is known as a(n) _______________.
a. Malicious Software that do not replicate | ||
b. Host dependent | ||
c. Host independent | ||
d. None of the statements | ||
e. Malicious Software that replicates |
Верно
Question2
Баллов: 1
Cryptographic keys are measured in:
a. Entorpy | ||
b. Bits | ||
c. Hertz | ||
d. Pixels | ||
e. Bytes |
Верно
Question3
Баллов: 1
Which software prevents Trojan horses from entering the
system through back doors?
a. Virus | ||
b. Cache | ||
c. Trapdoor | ||
d. Worm | ||
e. Firewall |
Верно
Question4
Баллов: 1
An attack on the key by attempting all possible combinations is called:
a. A random key attack | ||
b. A cryptographic key attack | ||
c. An all combinations attack | ||
d. A systematic seed attack | ||
e. A brute force attack |
Верно
Question5
Баллов: 1
Which of the following statement is NOT TRUE regarding key recovery via threshold schemes?
a. It is probably the most common key recovery method | ||
b. It is also called secret sharing or secret splitting | ||
c. Almost any reasonable share and recovery count is possible | ||
d. For key recovery, the secret is an RSA private key | ||
e. A key is split into several shares, with all the shares must be combined to recover the secret |
Неверно
Question6
Баллов: 1
A two-letter sequence is called ______________.
a. Digram | ||
b. Letter | ||
c. None of the statements | ||
d. Bigram?! | ||
e. Twogram |
Неверно
Question7
Баллов: 1
A function that maps a variable-length data block or message into a fixed-length value called a hash code. The function is designed in such a way that, when protected, it provides an authenticator to the data or message.
a. Hybrid function | ||
b. Encryption function | ||
c. None of the statements | ||
d. Diffie-Hellman | ||
e. Message digest |
Верно
Question8
Баллов: 1
Which of these is possibly the worst password that user can choose?
a. 14G:c*%3wM*-l6g_Bnp?d86 | ||
b. aLm4tyc?TY | ||
c. a$tana8567 | ||
d. Nur$ultan_1612 | ||
e. k@zaKh |
Верно
Question9
Баллов: 1
Set of rules and procedures developed by management in conjunction with security professionals is known as a(n) ___________________.
a. Security Threat | ||
b. Security Mechanism | ||
c. Security Attack | ||
d. Security Policy | ||
e. Security Service |
Неверно
Question10
Баллов: 1
A form of cryptosystem in which encryption and decryption are performed using the same key is known as ___________.
a. Public-key encryption | ||
b. The same key encryption | ||
c. Two-key encryption | ||
d. Symmetric cipher | ||
e. Asymmetric cipher |
Верно
Question11
Баллов: 1
Indicate the definition for Confirmation.
a. acknowledgement that services have been provided. | ||
b. providing an entity with the legal right to use or transfer a resource to others. | ||
c. acknowledgement that information has been received. | ||
d. verifying the creation or existence of information by an entity other than the creator. | ||
e. concealing the identity of an entity involved in some process. |
Верно
Question12
Баллов: 1
Suppose that your plaintext is 112 bytes long and you are using DES, how many bytes are needed for padding?
a. 2 | ||
b. 8 | ||
c. 4 | ||
d. 6 | ||
e. 0 |
Верно
Question13
Баллов: 1
An individual who is not authorized to use the computer and who penetrates a system's access controls to exploit a legitimate user's account
a. Masquerader | ||
b. Misfeasor | ||
c. Crypto analyzer | ||
d. Cryptologist | ||
e. Clandestine user |
Верно
Question14
Баллов: 1
What are the essential ingredients of a symmetric cipher?
I. Plaintext
II. Secret key
II. Encryption algorithm
IV. Decryption algorithm
V. Ciphertext
a. I and II | ||
b. I, II, III and IV | ||
c. II, III, IV and V | ||
d. I, II, III, IV and V | ||
e. I, III and V |
Неверно
Question15
Баллов: 1
Perform encryption using the RSA algorithm where
p = 5; q = 11, e = 3; M = 9
Ответ:
Неверно
Question16
Баллов: 1
Hardware or software that monitors transmission of packets of digital information that attempt to pass the perimeter of a network?
a. Firewall | ||
b. Kerberos | ||
c. Anti-viruse software | ||
d. Mandatory access control | ||
e. Intrusion detection system |
Верно
Question17
Баллов: 1
Indicate the definition for Timestamping.
a. providing timeliness of authorisation to use or manipulate information or resources | ||
b. restricting access to resources to privileged entities | ||
c. endorsement of information by a trusted entity | ||
d. conveyance, to another entity, of official sanction to do or be something | ||
e. recording the time of creation or existence of information |
Верно
Question18
Баллов: 1
Operation which maps elements of the plaintext into another is known as ___________.
a. Transposition | ||
b. Rearranging | ||
c. None of the statements | ||
d. Substitution | ||
e. Mapping |
Неверно
Question19
Баллов: 1
Indicate the one of the purposes of salt used in the Unix password scheme.
a. It prevents the users from creating passwords. | ||
b. It prevents password from being corrupted by intruders. | ||
c. It effectively decreases the length of the password without requiring the user to remember two additional characters. | ||
d. It effectively increases the length of the password without requiring the user to remember two additional characters. | ||
e. It is used as a secret key for encryption password. |
Верно
Question20
Баллов: 1
Using the Vigenère cipher, encrypt the word "nation" using the key leg.
Ответ:
Верно
Question21
Баллов: 1
Which of these is a mixing algorithm?
a. DES | ||
b. RSA | ||
c. AES | ||
d. MD5 | ||
e. RC4 |
Верно
Question22
Баллов: 1
The word “asymmetric” in public-key cryptography means:
a. None of the listed answers | ||
b. The key to encrypt is the same with the key to decrypt | ||
c. The algorithm to encrypt is the same with the algorithm to decrypt | ||
d. The key to encrypt is different from the key to decrypt | ||
e. The algorithm to encrypt is different from the algorithm to decrypt |
Верно
Question23
Баллов: 1
Find the key from the cipher text
CSY EVI XIVQMREXIH
given that the cipher is a simple substitution of the shift-by- n variety.
Ответ:
Верно
Question24
Баллов: 1
Which of the following are drawback of using Personal/Small Business Firewalls?
Выберите по крайней мере один ответ:
a. Some firewalls don’t do outbound connection blocking | ||
b. Most guard only against IP threats | ||
c. Some let you establish rules as needed | ||
d. All of the statements | ||
e. Some firewalls are inconvenient to configure |
Верно
Question25
Баллов: 1
Choose the definition of Threat?
a. Any action that compromises the security of information owned by an organization | ||
b. A process that is designed to detect, prevent, or recover from a security attack. | ||
c. A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. | ||
d. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. | ||
e. All of the statements |
Верно
Question26
Баллов: 1
Which of the following is (are) weakness(es) of Caesar cipher?
I. The encryption and decryption algorithms are known.
II. There are only 25 keys to try.
III. The language of the plaintext is known and easily recognizable.
IV. The length of the plaintext is fixed.
a. I, II and IV | ||
b. II, III and IV | ||
c. I and II | ||
d. I, II, III and IV | ||
e. I, II and III |
Верно
Question27
Баллов: 1
Which of the following are examples of the host independent malicious programs?
Выберите по крайней мере один ответ:
a. Trojan Horses | ||
b. Worm | ||
c. Trap door | ||
d. Zombie | ||
e. Logic Bombs |
Верно
Question28
Баллов: 1
Indicate the definition for Ownership.
a. acknowledgement that information has been received. | ||
b. acknowledgement that services have been provided. | ||
c. verifying the creation or existence of information by an entity other than the creator. | ||
d. providing an entity with the legal right to use or transfer a resource to others. | ||
e. concealing the identity of an entity involved in some process. |
Верно
Question29
Баллов: 1
Indicate the definition for Validation.
a. restricting access to resources to privileged entities | ||
b. conveyance, to another entity, of official sanction to do or be something | ||
c. endorsement of information by a trusted entity | ||
d. recording the time of creation or existence of information | ||
e. providing timeliness of authorisation to use or manipulate information or resources |
Верно
Question30
Баллов: 1
What is the purpose of Passive Attack?
a. To counter security attacks, and they make use of one or more security mechanisms to provide the service. | ||
b. To bind information to an entity | ||
c. To learn or make use of information from the system but does not affect system resources | ||
d. To provide timeliness of authorisation to use or manipulate information or resources | ||
e. To alter system resources or affect their operation. |
Верно