Computer Hardware and Networking/Information and Network Security Set 1 Sample Test,Sample questions

Question:
 A security program cannot address which of the following business goals?

1.Accuracy of information

2. Change control

3.User expectations

4.Prevention of fraud

Posted Date:-2022-07-17 11:32:09


Question:
 Asymmetric key cryptography is used for all of the followingexcept_______

1.Encryption of data

2.Access control

3.Nonrepudiation

4.Steganography

Posted Date:-2022-07-17 11:38:09


Question:
 In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware.

1. URL Redirection

2.DOS

3.Phishing

4.MiTM attack

Posted Date:-2022-07-17 11:22:26


Question:
 In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

1.Vigenere Cipher

2.Block Cipher

3.Stream cipher

4.One-time pad

Posted Date:-2022-07-17 12:00:36


Question:
 The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website.

1.Phishing attack

2. DoS attack

3.Website attack

4.MiTM attack

Posted Date:-2022-07-17 11:21:17


Question:
 Which of the following is not an example of a block cipher?

1. DES

2. Caesar cipher

3.Twofish

4.IDEA

Posted Date:-2022-07-17 12:04:11


Question:
A (n) ______ algorithm transforms ciphertext to plaintext.

1.Encryption

2.Decryption

3.Either (a) or (b)

4.Neither (a) nor (b)

Posted Date:-2022-07-17 11:10:09


Question:
A computer ________ is a malicious code which self-replicates by copying itself to otherprograms.

1. Program

2.Virus

3.Application

4.Worm

Posted Date:-2022-07-17 11:13:44


Question:
A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase.

1.Security officer

2.Malicious hacker

3.Security auditor

4.Network analyst

Posted Date:-2022-07-17 11:45:48


Question:
AES is at least 6-times faster than 3-DES.

1.True

2.False

3.none

4.all

Posted Date:-2022-07-17 12:13:13


Question:
AES stands for ________________.

1.Active Encryption Standard

2.Advanced Encrypted Standard

3.Advanced Encryption Standar

4.D Advanced Encryption Security

Posted Date:-2022-07-17 12:12:25


Question:
An algorithm in encryption is called _____________.

1.Algorithm

2.Procedure

3.Cipher

4.Module

Posted Date:-2022-07-17 11:07:13


Question:
Compromising confidential information comes under _________.

1.Bug

2.Threat

3.Vulnerability

4.Attack

Posted Date:-2022-07-17 11:28:19


Question:
Conventional cryptography is also known as _____________ or symmetric-keyencryption.

1. Secret-key

2.Public key

3.Protected key

4.Primary key

Posted Date:-2022-07-17 11:52:45


Question:
Cryptography can be divided into ______ types.

1.4

2.2

3.7

4.3

Posted Date:-2022-07-17 11:49:29


Question:
Data Encryption Standard is an example of a _____________ cryptosystem.

1.Conventional

2.Public key

3.Hash key

4.Asymmetric-key

Posted Date:-2022-07-17 11:53:46


Question:
Data which is easily readable & understandable without any special algorithm ormethod is called _____________

1.Cipher-text

2.Plain text

3.Raw text

4.Encrypted text

Posted Date:-2022-07-17 11:50:37


Question:
DES stands for ________________.

1.Device Encryption Standard

2. Data Encrypted Standard

3.Data Encryption Security

4.Data Encryption Standard

Posted Date:-2022-07-17 12:10:26


Question:
During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted.

1.Network

2.System

3.Website

4.Router

Posted Date:-2022-07-17 11:20:29


Question:
Firewalls are to protect against________.

1.Virus Attacks

2.Fire Attacks

3.Data Driven Attacks

4. Unauthorized Attacks

Posted Date:-2022-07-17 11:40:14


Question:
From the options below, which of them is not a vulnerability to information security?

1. Without deleting data, disposal of storage media

2. Latest patches and updates not done

3.Floo

4.D Unchanged default password

Posted Date:-2022-07-17 11:44:11


Question:
In brute force attack, on average half of all possible keys must be tried to achievesuccess.

1.True

2.False

3.none

4.all

Posted Date:-2022-07-17 11:08:52


Question:
In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.

1.Hash functions

2.Vigenere Cipher

3.One-time pa

4.D Block Cipher

Posted Date:-2022-07-17 12:01:44


Question:
Integrity is protection of data from all of the following except ____

1.Unauthorized changes

2.Accidental changes

3. Data analysis

4.Intentional manipulation

Posted Date:-2022-07-17 11:31:01


Question:
Masquerading is _______.

1.Attempting to hack a system through backdoors to an operating system or application.

2.Pretending to be an authorized user

3.Always done through IP spoofing

4.Applying a subnet mask to an internal IP range

Posted Date:-2022-07-17 11:30:12


Question:
n Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.

1.Rolling Cipher

2. Shift Cipher

3.Playfair Cipher

4. Block Cipher

Posted Date:-2022-07-17 11:58:11


Question:
Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system.

1.Virus, Cyber-Criminals

2.Malware, Penetration Testers

3. Trojans, Cyber-Criminals

4.Virus, Penetration Testers

Posted Date:-2022-07-17 11:19:49


Question:
Plain text are also called _____________.

1.Encrypted text

2.Clear-text

3.Raw text

4.Cipher-text

Posted Date:-2022-07-17 11:51:18


Question:
Possible threat to any information cannot be ________________.

1.Ignored

2.Protected

3.Transferre

4.D Reduced

Posted Date:-2022-07-17 11:44:57


Question:
Steganography follows the concept of security through obscurity.

1.True

2.False

3.none

4.all

Posted Date:-2022-07-17 12:15:59


Question:
The absence of a fire-suppression system would be best characterized as_______.

1.Exposure

2.Threat

3.Vulnerability

4.Risk

Posted Date:-2022-07-17 11:37:16


Question:
The first computer virus is__________.

1.The famous

2.HARLIE

3.PARAM

4.Creeper

Posted Date:-2022-07-17 11:41:35


Question:
The information that gets transformed in encryption is ____________.

1. Plain text

2.Parallel text

3.Encrypted text

4.Decrypted text

Posted Date:-2022-07-17 11:08:09


Question:
The procedure to add bits to the last block is termed as _______________

1.Padding

2.Hashing

3.Tuning

4.Decryption

Posted Date:-2022-07-17 12:02:54


Question:
The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.

1.Tomography

2.Chorography

3.Steganography

4.Cryptography

Posted Date:-2022-07-17 12:16:37


Question:
The ________ is the message after transformation.

1.Ciphertext

2.Plaintext

3.Secret-text

4.None of the above

Posted Date:-2022-07-17 11:11:21


Question:
The ________________ has piece of the keyword that has the same length as that of theplaintext.

1.One-time pad

2.Hash functions

3.Vigenere Cipher

4. Block Cipher

Posted Date:-2022-07-17 11:59:42


Question:
There are ________ types of cryptographic techniques used in general.

1.2

2.3

3.4

4.5

Posted Date:-2022-07-17 11:52:00


Question:
Trojan creators do not look for _________

1.Credit card information

2.Confidential data

3.Important documents

4.Securing systems with such programs

Posted Date:-2022-07-17 11:23:36


Question:
Trojan creators do not look for _______________.

1. Deleting Data

2.Protecting Data

3.Modifying Data

4.Copying Data

Posted Date:-2022-07-17 11:17:53


Question:
When an attacker sends unsolicited communication, it is an example of_____.

1.Spoofing

2.Spamming

3.Crackers

4.Sniffers

Posted Date:-2022-07-17 11:29:03


Question:
When one participant in a communication pretends to be someone else, it is called_________?

1.Virus Attacks

2. Data Driven Attacks

3. Data Driven Attacks

4.Masquerade

Posted Date:-2022-07-17 11:25:19


Question:
When plain text is converted to unreadable format, it is termed as _____

1.Rotten text

2.Raw text

3.Cipher-text

4.Cipher

Posted Date:-2022-07-17 11:47:33


Question:
Which of the following is not a steganography tool?

1. Steghide

2.Reaper Exploit

3.Image steganography

4.Xaio steganography

Posted Date:-2022-07-17 12:17:33


Question:
Which of the following is not a steganography tool?

1. rSteg

2.Crypture

3.SteganographX Plus

4. Burp Suite

Posted Date:-2022-07-17 12:18:32


Question:
Which of the following is not a type of virus?

1.Boot sector

2.Polymorphi

3.C Multipartite

4.Troj

Posted Date:-2022-07-17 11:12:48


Question:
__ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

1.Malware Analysis

2.Cryptography

3.Reverse engineering

4.Exploit writing

Posted Date:-2022-07-17 11:48:52


Question:
___ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

1. Network Security

2.Database Security

3. Information Security

4.Physical Security

Posted Date:-2022-07-17 11:42:33


Question:
____ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.

1.Twofish

2.IDEA

3.DES

4.AES

Posted Date:-2022-07-17 12:11:21


Question:
____ Cryptography deals with traditional characters, i.e., letters & digits directly.

1.Latest

2.Asymmetri

3.C Classic

4.Modern

Posted Date:-2022-07-17 11:54:39


Question:
_____ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.

1.Polyalphabetic Cipher

2. Caesar Cipher

3.Playfair Cipher

4.Monoalphabetic Cipher

Posted Date:-2022-07-17 11:56:34


Question:
_____ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.

1.Message Authentication Code

2.Steganography

3.Whale phishing

4.A cipher

Posted Date:-2022-07-17 11:26:36


Question:
______ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.

1. Steganography

2.Cryptography

3.Chorography

4.Tomography

Posted Date:-2022-07-17 12:15:04


Question:
_______ infects the executable as well as the boot sectors.

1.Non-resident virus

2.Boot Sector Virus

3. Polymorphic Virus

4.Multipartite Virus

Posted Date:-2022-07-17 11:16:48


Question:
_______ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.

1.Rolling Cipher

2.Shift Cipher

3.Playfair Cipher

4.Block Cipher

Posted Date:-2022-07-17 11:57:24


Question:
________ Cryptography operates on binary-bit series and strings.

1.Modern

2.Classi

3.C Traditional

4.Primitive

Posted Date:-2022-07-17 11:55:55


Question:
__________ infects the master boot record and it is challenging and a complex task toremove this virus.

1.Boot Sector Virus

2.Polymorphi

3.C Multipartite

4.Troj

Posted Date:-2022-07-17 11:15:52


Question:
___________ employs a text string as a key that is implemented to do a series ofshifts on the plain-text.

1.Shift Cipher

2.Block Cipher

3.Playfair Cipher

4.Vigenere Cipher

Posted Date:-2022-07-17 11:58:54


Question:
___________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.

1.Chorography

2.Tomography

3.Steganography

4.Cryptography

Posted Date:-2022-07-17 12:14:22


Question:
____________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa.

1.Malware Analysis

2.Exploit writing

3.Reverse engineering

4.Cryptography

Posted Date:-2022-07-17 11:46:41


More MCQS

  1. MCQ Questions from Computer Hardware Concept
  2. Computer Communication and Networking MCQS Quiz
  3. Computer Hardware Quiz Set 1
  4. Computer Hardware Quiz Set 2
  5. Computer Hardware Quiz Set 3
  6. Computer Hardware Quiz Set 4
  7. Computer Hardware Quiz Set 5
  8. Computer Hardware Quiz Set 6
  9. Computer Hardware Quiz Set 7
  10. Computer Hardware Quiz Set 8
  11. Computer Hardware Multiple Choice Questions(MCQs) and Answers
  12. Graphics Hardware and Display devices Input Devices
  13. Computer Hardware MCQ GK Questions Set 1
  14. Computer Hardware MCQ GK Questions Set 2
  15. Computer Hardware Multiple Choice Questions
  16. CDMA Multiple Choice Questions
  17. Network Security Multiple Choice questions
  18. Opengl Multiple Choice Questions
  19. Opengl Multiple Choice Questions.
  20. Web Development Multiple-choice Questions
  21. WiFi Multiple Choice Questions
  22. 4G Multiple Choice Question
  23. NETWORK MODELS MCQ
  24. INTERNET AND PROTOCOLS MCQ SET 1
  25. INTERNET AND PROTOCOLS MCQ SET 2
  26. INTERNET AND PROTOCOLS MCQ SET 3
  27. INTERNET AND PROTOCOLS MCQ SET 4
  28. INTERNET AND PROTOCOLS MCQ SET 5
  29. NETWORKING /PHYSICAL LAYER SET 1
  30. NETWORKING /PHYSICAL LAYER SET 2
  31. NETWORKING /PHYSICAL LAYER SET 3
  32. NETWORKING /PHYSICAL LAYER SET 4
  33. Information and Network Security Set 1
  34. Information and Network Security Set 2
  35. Information Cyber Security (ICS) MCQs Set 1
  36. Information Cyber Security (ICS) MCQs Set 2
  37. Information Cyber Security (ICS) MCQs Set 3
  38. Information Cyber Security (ICS) MCQs Set 4
  39. Information Cyber Security (ICS) MCQs Set 5
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!