Deck 4: Information Security and Encryption Terminology

Full screen (f)
exit full mode
Question
What is full form of DDoS?

A)derived denial of service
B)distributed denial of service
C)denial of service
D)none of these
Use Space or
up arrow
down arrow
to flip the card.
Question
A hacker guessing suggested password to a program is call as?

A)password guessing
B)dictionary attack
C)default password attack
D)none of these
Question
Symmetric key encryption is also called as?

A)public key encryption
B)private key encryption
C)both of these
D)none of these
Question
Conversion of Cypher text to plain text?

A)encryption
B)decryption
C)simple text
D)none of these
Question
__is used to create the organisation's overall security program.

A)program policy
B)purpose
C)security
D)none of these
Question
An act of protecting information from unauthorised disclouser to an entity.-

A)intergrity
B)avability
C)confidentiality
D)none of these
Question
A way to ensure that the entity is indeed what it claims to be.-

A)authentication
B)accountability
C)identification
D)security
Question
The__model is 7 layer architecture where each layer is having some specific functionality to perform.

A)tcp
B)osi
C)ois
D)none of these
Question
The full form of OSI is OSI model__.

A)open systems interconnection
B)open software interconnection
C)open connection
D)open system internet
Question
The technique in which when one character is replaced by another Character is called as?

A)transposition
B)substitution
C)combinational
D)none of these
Question
Conversion of plain text into Cipher text is called as________.

A)encryption
B)decryption
C)hidden text
D)none of above
Question
In Symmetric schemes requires both parties to share how many secret key?

A)one
B)two
C)three
D)four
Question
Blum Blum Shub Generator is based on which Algorithm?

A)private key
B)public key
C)both a & b
D)none of these
Question
In DES step both LPT and RPT undergoes in how much key Rounds?

A)8
B)16
C)32
D)64
Question
What is the 4th step in DES Algorithm?

A)key transformation
B)s-box substitution
C)p-box permutation
D)expansion permutation
Question
In AES in which Round Subkeys are Generated from Original key for each round?

A)key expansion
B)initial round
C)finale round
D)none of these
Question
AES stands for ?

A)authorized encryption standard
B)advance encryption standard
C)advance encryption strategy
D)none of these
Question
Which of them is type of Cipher?

A)stream cipher
B)block cipher
C)both of them
D)none of these
Question
The message which is not understandable is called as?

A)cipher text
B)plain text
C)hidden text
D)both a & c
Question
_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

A)network security
B)database security
C)information security
D)physical security
Question
_______ platforms are used for safety and protection of information in the cloud.

A)cloud workload protection platforms
B)cloud security protocols
C)aws
D)one drive
Question
Compromising confidential information comes under _________

A)bug
B)threat
C)vulnerability
D)attack
Question
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

A)cyber-crime
B)cyber attack
C)system hijacking
D)digital crime
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Information Security and Encryption Terminology
1
What is full form of DDoS?

A)derived denial of service
B)distributed denial of service
C)denial of service
D)none of these
distributed denial of service
2
A hacker guessing suggested password to a program is call as?

A)password guessing
B)dictionary attack
C)default password attack
D)none of these
default password attack
3
Symmetric key encryption is also called as?

A)public key encryption
B)private key encryption
C)both of these
D)none of these
private key encryption
4
Conversion of Cypher text to plain text?

A)encryption
B)decryption
C)simple text
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
__is used to create the organisation's overall security program.

A)program policy
B)purpose
C)security
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
An act of protecting information from unauthorised disclouser to an entity.-

A)intergrity
B)avability
C)confidentiality
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
A way to ensure that the entity is indeed what it claims to be.-

A)authentication
B)accountability
C)identification
D)security
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
The__model is 7 layer architecture where each layer is having some specific functionality to perform.

A)tcp
B)osi
C)ois
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
The full form of OSI is OSI model__.

A)open systems interconnection
B)open software interconnection
C)open connection
D)open system internet
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
The technique in which when one character is replaced by another Character is called as?

A)transposition
B)substitution
C)combinational
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
Conversion of plain text into Cipher text is called as________.

A)encryption
B)decryption
C)hidden text
D)none of above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
In Symmetric schemes requires both parties to share how many secret key?

A)one
B)two
C)three
D)four
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
Blum Blum Shub Generator is based on which Algorithm?

A)private key
B)public key
C)both a & b
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
In DES step both LPT and RPT undergoes in how much key Rounds?

A)8
B)16
C)32
D)64
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
What is the 4th step in DES Algorithm?

A)key transformation
B)s-box substitution
C)p-box permutation
D)expansion permutation
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
In AES in which Round Subkeys are Generated from Original key for each round?

A)key expansion
B)initial round
C)finale round
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
AES stands for ?

A)authorized encryption standard
B)advance encryption standard
C)advance encryption strategy
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
Which of them is type of Cipher?

A)stream cipher
B)block cipher
C)both of them
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
The message which is not understandable is called as?

A)cipher text
B)plain text
C)hidden text
D)both a & c
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

A)network security
B)database security
C)information security
D)physical security
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
_______ platforms are used for safety and protection of information in the cloud.

A)cloud workload protection platforms
B)cloud security protocols
C)aws
D)one drive
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
Compromising confidential information comes under _________

A)bug
B)threat
C)vulnerability
D)attack
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

A)cyber-crime
B)cyber attack
C)system hijacking
D)digital crime
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 23 flashcards in this deck.