Deck 1: Security Measures and Encryption Techniques for Information Protection
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 1: Security Measures and Encryption Techniques for Information Protection
1
Security Measures Needed to protect during their transmission
A)file
B)data
C)packet
D)all of above
A)file
B)data
C)packet
D)all of above
data
2
______________means knowledge obtained from investigation, study , intelligence new ,facts .
A)security
B)data
C)information
D)none of these
A)security
B)data
C)information
D)none of these
information
3
Prevention of the unauthorised used of Resources refers too?
A)data integrity
B)data confidentiality
C)acess control
D)none of these
A)data integrity
B)data confidentiality
C)acess control
D)none of these
acess control
4
Protection against Denial by one of these parties in a communication refers to?
A)non-repudiation
B)data integrity
C)authentication
D)none of these
A)non-repudiation
B)data integrity
C)authentication
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which One of them is Passive attack?
A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
What is lying of IP address called as?
A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
What is full form of DDoS?
A)derived denial of service
B)distributed denial of service
C)denial of service
D)none of these
A)derived denial of service
B)distributed denial of service
C)denial of service
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
A hacker guessing suggested password to a program is call as?
A)password guessing
B)dictionary attack
C)default password attack
D)none of these
A)password guessing
B)dictionary attack
C)default password attack
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Symmetric key encryption is also called as?
A)public key encryption
B)private key encryption
C)both of these
D)none of these
A)public key encryption
B)private key encryption
C)both of these
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Conversion of Cypher text to plain text?
A)encryption
B)decryption
C)simple text
D)none of these
A)encryption
B)decryption
C)simple text
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
______________is used to create the organisation's overall security program.
A)program policy
B)purpose
C)security
D)none of these
A)program policy
B)purpose
C)security
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
An act of protecting information from unauthorised disclouser to an entity.-
A)intergrity
B)avability
C)confidentiality
D)none of these
A)intergrity
B)avability
C)confidentiality
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
A way to ensure that the entity is indeed what it claims to be.-
A)authentication
B)accountability
C)identification
D)security
A)authentication
B)accountability
C)identification
D)security
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
The model is 7 layer architecture where each layer is having some specific functionality to perform.
A)tcp
B)osi
C)ois
D)none of these
A)tcp
B)osi
C)ois
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The full form of OSI is OSI model .
A)open systems interconnection
B)open software interconnection
C)open connection
D)open system internet
A)open systems interconnection
B)open software interconnection
C)open connection
D)open system internet
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
The technique in which when one character is replaced by another Character is called as?
A)transposition
B)substitution
C)combinational
D)none of these
A)transposition
B)substitution
C)combinational
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Conversion of plain text into Cipher text is called as .
A)encryption
B)decryption
C)hidden text
D)none of above
A)encryption
B)decryption
C)hidden text
D)none of above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
In Symmetric schemes requires both parties to share how many secret key?
A)one
B)two
C)three
D)four
A)one
B)two
C)three
D)four
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Blum Blum Shub Generator is based on which Algorithm?
A)private key
B)public key
C)both a & b
D)none of these
A)private key
B)public key
C)both a & b
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
In DES step both LPT and RPT undergoes in how much key Rounds?
A)8
B)16
C)32
D)64
A)8
B)16
C)32
D)64
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
What is the 4th step in DES Algorithm?
A)key transformation
B)s-box substitution
C)p-box permutation
D)expansion permutation
A)key transformation
B)s-box substitution
C)p-box permutation
D)expansion permutation
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
In AES in which Round Subkeys are Generated from Original key for each round?
A)key expansion
B)initial round
C)finale round
D)none of these
A)key expansion
B)initial round
C)finale round
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
AES stands for?
A)authorized encryption standard
B)advance encryption standard
C)advance encryption strategy
D)none of these
A)authorized encryption standard
B)advance encryption standard
C)advance encryption strategy
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Which of them is type of Cipher?
A)stream cipher
B)block cipher
C)both of them
D)none of these
A)stream cipher
B)block cipher
C)both of them
D)none of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
The message which is not understandable is called as?
A)cipher text
B)plain text
C)hidden text
D)both a & c
A)cipher text
B)plain text
C)hidden text
D)both a & c
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck