Deck 1: Cryptography and Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
Play
Full screen (f)
Deck 1: Cryptography and Network Security
1
In symmetric-key cryptography, the key locks and unlocks the box is
A)same
B)shared
C)private
D)public
A)same
B)shared
C)private
D)public
same
2
The keys used in cryptography are
A)secret key
B)private key
C)public key
D)all of them
A)secret key
B)private key
C)public key
D)all of them
all of them
3
Cryptography, a word with Greek origins, means
A)corrupting data
B)secret writing
C)open writing
D)closed writing
A)corrupting data
B)secret writing
C)open writing
D)closed writing
secret writing
4
A transposition cipher reorders (permutes) symbols in a
A)block of packets
B)block of slots
C)block of signals
D)block of symbols
A)block of packets
B)block of slots
C)block of signals
D)block of symbols
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
Network Security provides authentication and access control for resources.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
Which is not an objective of network security?
A)identification
B)authentication
C)access control
D)lock
A)identification
B)authentication
C)access control
D)lock
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
The process of verifying the identity of a user.
A)authentication
B)identification
C)validation
D)verification
A)authentication
B)identification
C)validation
D)verification
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
Which of these is a part of network identification?
A)user id
B)password
C)otp
D)fingerprint
A)user id
B)password
C)otp
D)fingerprint
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
An algorithm used in encryption is referred to as cipher.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
A process of making the encrypted text readable again.
A)decryption
B)encryption
C)network security
D)information hiding
A)decryption
B)encryption
C)network security
D)information hiding
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
A person who enjoys learning details about computers and how to enhance their capabilities.
A)cracker
B)hacker
C)app controller
D)site controller
A)cracker
B)hacker
C)app controller
D)site controller
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
A small program that changes the way a computer operates.
A)worm
B)trojan
C)bomb
D)virus
A)worm
B)trojan
C)bomb
D)virus
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
An asymmetric-key (or public-key) cipher uses
A)1 key
B)2 key
C)3 key
D)4 key
A)1 key
B)2 key
C)3 key
D)4 key
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
We use cryptofraphy term to transform messages to make them secure and immune to
A)change
B)idle
C)attacks
D)defend
A)change
B)idle
C)attacks
D)defend
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
In cryptography , the original message before being transformmed , is called
A)simple text
B)plain text
C)empty text
D)filled text
A)simple text
B)plain text
C)empty text
D)filled text
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
A straight permutation cipher or a straight p-box has the same number of input as
A)cipher
B)frames
C)outputs
D)bits
A)cipher
B)frames
C)outputs
D)bits
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not
A)authenticated
B)joined
C)submit
D)separate
A)authenticated
B)joined
C)submit
D)separate
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is not a transport layer vulnerability?
A)mishandling of undefined , poorly defined
B)the vulnerability that allows fingerprinting & other enumeration of host information
C)overloading of transporting layer mechanisms
D)unauthorized network access
A)mishandling of undefined , poorly defined
B)the vulnerability that allows fingerprinting & other enumeration of host information
C)overloading of transporting layer mechanisms
D)unauthorized network access
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
TCP/IP model does not have_______layer but OSI model have this layer.
A)session layer
B)transport layer
C)application layer
D)network layer
A)session layer
B)transport layer
C)application layer
D)network layer
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
In cryptography, what is cipher?
A)algorithm for performing encrption and decryption
B)encrypted message
C)both algorith for performing encrption and decryption and encrypted message
D)decrypted message
A)algorithm for performing encrption and decryption
B)encrypted message
C)both algorith for performing encrption and decryption and encrypted message
D)decrypted message
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
In cryptography, the order of the letters in a message is rearranged by
A)transpositional ciphers
B)substitution ciphers
C)both
D)quadratic ciphers
A)transpositional ciphers
B)substitution ciphers
C)both
D)quadratic ciphers
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
What is data encryption standard (DES)?
A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
A)block cipher
B)stream cipher
C)bit cipher
D)byte cipher
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
Cryptanalysis is used
A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
A)to find some insecurity in a cryptographic scheme
B)to increase the speed
C)to encrypt the data
D)to make new ciphers
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck