Deck 1: Cryptography and Network Security

Full screen (f)
exit full mode
Question
In symmetric-key cryptography, the key locks and unlocks the box is

A)same
B)shared
C)private
D)public
Use Space or
up arrow
down arrow
to flip the card.
Question
The keys used in cryptography are

A)secret key
B)private key
C)public key
D)all of them
Question
Cryptography, a word with Greek origins, means

A)corrupting data
B)secret writing
C)open writing
D)closed writing
Question
A transposition cipher reorders (permutes) symbols in a

A)block of packets
B)block of slots
C)block of signals
D)block of symbols
Question
Network Security provides authentication and access control for resources.
Question
Which is not an objective of network security?

A)identification
B)authentication
C)access control
D)lock
Question
The process of verifying the identity of a user.

A)authentication
B)identification
C)validation
D)verification
Question
Which of these is a part of network identification?

A)user id
B)password
C)otp
D)fingerprint
Question
An algorithm used in encryption is referred to as cipher.
Question
A process of making the encrypted text readable again.

A)decryption
B)encryption
C)network security
D)information hiding
Question
A person who enjoys learning details about computers and how to enhance their capabilities.

A)cracker
B)hacker
C)app controller
D)site controller
Question
A small program that changes the way a computer operates.

A)worm
B)trojan
C)bomb
D)virus
Question
An asymmetric-key (or public-key) cipher uses

A)1 key
B)2 key
C)3 key
D)4 key
Question
We use cryptofraphy term to transform messages to make them secure and immune to

A)change
B)idle
C)attacks
D)defend
Question
In cryptography , the original message before being transformmed , is called

A)simple text
B)plain text
C)empty text
D)filled text
Question
A straight permutation cipher or a straight p-box has the same number of input as

A)cipher
B)frames
C)outputs
D)bits
Question
The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not

A)authenticated
B)joined
C)submit
D)separate
Question
Which of the following is not a transport layer vulnerability?

A)mishandling of undefined , poorly defined
B)the vulnerability that allows fingerprinting & other enumeration of host information
C)overloading of transporting layer mechanisms
D)unauthorized network access
Question
Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
Question
TCP/IP model does not have_______layer but OSI model have this layer.

A)session layer
B)transport layer
C)application layer
D)network layer
Question
In cryptography, what is cipher?

A)algorithm for performing encrption and decryption
B)encrypted message
C)both algorith for performing encrption and decryption and encrypted message
D)decrypted message
Question
In cryptography, the order of the letters in a message is rearranged by

A)transpositional ciphers
B)substitution ciphers
C)both
D)quadratic ciphers
Question
What is data encryption standard (DES)?

A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
Question
Cryptanalysis is used                         

A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Cryptography and Network Security
1
In symmetric-key cryptography, the key locks and unlocks the box is

A)same
B)shared
C)private
D)public
same
2
The keys used in cryptography are

A)secret key
B)private key
C)public key
D)all of them
all of them
3
Cryptography, a word with Greek origins, means

A)corrupting data
B)secret writing
C)open writing
D)closed writing
secret writing
4
A transposition cipher reorders (permutes) symbols in a

A)block of packets
B)block of slots
C)block of signals
D)block of symbols
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
Network Security provides authentication and access control for resources.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
Which is not an objective of network security?

A)identification
B)authentication
C)access control
D)lock
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
The process of verifying the identity of a user.

A)authentication
B)identification
C)validation
D)verification
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
Which of these is a part of network identification?

A)user id
B)password
C)otp
D)fingerprint
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
An algorithm used in encryption is referred to as cipher.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
A process of making the encrypted text readable again.

A)decryption
B)encryption
C)network security
D)information hiding
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
A person who enjoys learning details about computers and how to enhance their capabilities.

A)cracker
B)hacker
C)app controller
D)site controller
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
A small program that changes the way a computer operates.

A)worm
B)trojan
C)bomb
D)virus
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
An asymmetric-key (or public-key) cipher uses

A)1 key
B)2 key
C)3 key
D)4 key
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
We use cryptofraphy term to transform messages to make them secure and immune to

A)change
B)idle
C)attacks
D)defend
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
In cryptography , the original message before being transformmed , is called

A)simple text
B)plain text
C)empty text
D)filled text
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
A straight permutation cipher or a straight p-box has the same number of input as

A)cipher
B)frames
C)outputs
D)bits
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not

A)authenticated
B)joined
C)submit
D)separate
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is not a transport layer vulnerability?

A)mishandling of undefined , poorly defined
B)the vulnerability that allows fingerprinting & other enumeration of host information
C)overloading of transporting layer mechanisms
D)unauthorized network access
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
TCP/IP model does not have_______layer but OSI model have this layer.

A)session layer
B)transport layer
C)application layer
D)network layer
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
In cryptography, what is cipher?

A)algorithm for performing encrption and decryption
B)encrypted message
C)both algorith for performing encrption and decryption and encrypted message
D)decrypted message
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
In cryptography, the order of the letters in a message is rearranged by

A)transpositional ciphers
B)substitution ciphers
C)both
D)quadratic ciphers
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
What is data encryption standard (DES)?

A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
Cryptanalysis is used                         

A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.