Information and network security SEM V Prof. Priyanka Jadhav
-
Upload
khangminh22 -
Category
Documents
-
view
2 -
download
0
Transcript of Information and network security SEM V Prof. Priyanka Jadhav
Information and network security SEM V Prof. Priyanka Jadhav
.The ____________ model is 7-layer architecture where each layer is having some specific
functionality to perform.
a) TCP/IP
b) Cloud
c) OSI
d) OIS
The full form of OSI is OSI model is ______________
a) Open Systems Interconnection
b) Open Software Interconnection
c) Open Systems Internet
d) Open Software Internet
Which of them is not a wireless attack?
a) Eavesdropping
b) MAC Spoofing
c) Wireless Hijacking
d) Phishing
. An attempt to harm, damage or cause threat to a system or network is broadly
termed as ______
a) Cyber-crime
b) Cyber Attack
c) System hijacking
d) Digital crime
. _________ are the special type of programs used for recording and tracking
user’s keystroke.
a) Keylogger
b) Trojans
c) Virus
d) Worms
Packet sniffers involve ____________
a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receive
_____________________ is the art & science of cracking the cipher-text without
knowing the key.
a) Cracking
b) Cryptanalysis
c) Cryptography
d) Crypto-hacking
The process of disguising plaintext in such a way that its substance gets hidden
(into what is known as cipher-text) is called _________________
a) cryptanalysis
b) decryption
c) reverse engineering
d) encryption
The method of reverting the encrypted text which is known as cipher text to its
original form i.e. plain text is known as ________________
Information and network security SEM V Prof. Priyanka Jadhav
a) cryptanalysis
b) decryption
c) reverse engineering
d) encryption
. Which of the following is not the primary objective of cryptography?
a) Confidentiality
b) Data Integrity
c) Data Redundancy
d) Authentication
. Cryptography offers a set of required security services. Which of the following is
not among that 4 required security services?
a) Encryption
b) Message Authentication codes
c) Hash functions
d) Steganography
. ______________ is the mathematical procedure or algorithm which produces a
cipher-text for any specified plaintext.
a) Encryption Algorithm
b) Decryption Algorithm
c) Hashing Algorithm
d) Tuning Algorithm
. In __________________ 2 different keys are implemented for encrypting as well
as decrypting that particular information.
a) Symmetric Key Encryption
b) Asymmetric Key Encryption
c) Asymmetric Key Decryption
d) Hash-based Key Encryption
. ____________ is a mono-alphabetic encryption code wherein each & every
letter of plain-text is replaced by another letter in creating the cipher-text.
a) Polyalphabetic Cipher
b) Caesar Cipher
c) Playfair Cipher
d) Monoalphabetic Cipher
. _____________ is the concept that tells us about the replacement of every
alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed
quantity.
a) Rolling Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
. ________________ is a cipher formed out of substitution where for a given keyvalue the
cipher alphabet for every plain text remains fixed all through the
encryption procedure.
a) Polyalphabetic Cipher
b) Caesar Cipher
c) Playfair Cipher
d) Monoalphabetic Cipher
. __________at first, a key table is produced. That key table is a 5 by 5 grid of
Information and network security SEM V Prof. Priyanka Jadhav
alphabets which operates as the key to encrypt the plaintext.
a) Rolling Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
. ______________ employs a text string as a key that is implemented to do a
series of shifts on the plain-text.
a) Vigenere Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
. The ________________ has piece of the keyword that has the same length as
that of the plaintext.
a) Block Cipher
b) One-time pad
c) Hash functions
d) Vigenere Cipher
In _____________ a sequence of actions is carried out on this block after a
block of plain-text bits is chosen for generating a block of cipher-text bits.
a) Block Cipher
b) One-time pad
c) Hash functions
d) Vigenere Cipher
Which of the following is not an example of a block cipher?
a) DES
b) IDEA
c) Caesar cipher
d) Twofish
Which is implemented using the Feistel Cipher which employs 16 round of
Feistel structure.
a) DES
b) IDEA
c) Caesar cipher
d) Twofish
DES stands for ________________
a) Data Encryption Security
b) Data Encrypted Standard
c) Device Encryption Standard
d) Data Encryption Standard
AES stands for ________________
a) Advanced Encryption Security
b) Advanced Encryption Standard
c) Advanced Encrypted Standard
d) Active Encryption Standard
_____________ is hiding of data within data, where we can hide images, text,
and other messages within images, videos, music or recording files.
a) Cryptography
b) Tomography
Information and network security SEM V Prof. Priyanka Jadhav
c) Steganography
d) Chorography
. In asymmetric key cryptography, the private key is kept by __________
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
. In cryptography, the order of the letters in a message is rearranged by
__________
a) Transpositional ciphers
b) substitution ciphers
c) both transpositional ciphers and substitution ciphers
d) quadratic ciphers
. Using Rivest, Shamir, Adleman (RSA)cryptosystem with p=7 and q=9. Encrypt
M=24 to find ciphertext. The Ciphertext is:
a. 42
b. 93
c. 114
d. 103
. Conventional cryptography is also known as _____________ or symmetric-key
encryption.
a) secret-key
b) public key
c) protected key
d) primary key
. ____________ cryptography operates on binary-bit series and strings.
a) Modern
b) Classic
c) Traditional
d) Primitive
ECB and CBC are ______ ciphers
a. block
b. stream
c. field
d. none of the above
The method provides a one-time session key for two parties
a. Diffie-Hellman
b. RSA
c. DES
d. AES
Message _______means that the receiver is ensured that the message is coming from the
intended sender, not an imposter.
a. confidentiality
b. integrity
c. authentication
d. none of the above
Digital signature provides
Information and network security SEM V Prof. Priyanka Jadhav
a. authentication
b. nonrepudiation
c. both (a) and (b)
d. neither (a) nor (b)
A(n) ________ is a trusted third party that assigns a symmetric key to two parties.
A. KDC
B. CA
C. KDD
D. none of the above
Intrusion is action or process that compromises Authication, integrity, availability of system
A. force fully
B. With Permission
C. Without Permission
D . Both A and C
Intruder is ____.
A. Action
B. User
C System
D. Data
What are the different types of intruder?
A. Miscount intruder.
B. Masquerader intruder.
C.Clandestine intruder
D. Both B and C
Misfeasor intruder is normally?
A. Insider
B. Outsider
C. Both A and B
D. Middle
What are the different ways to classify IDS?
A. Statistical anomaly detection
B. Rule based detection
C. Both A and B
D. Stack based.
What is anomaly detection in IDS?
A. Rules Based.
B. Action based
C. Custom based
D. Stack based.
. In which approach an expert system is used to search for suspicious behavior of user?
A. Anomaly detection.
B. Penetration identification.
C. Profile based
D. Machine based
. Is Auditing Records keeping the Track of ongoing?
A. Activity in the system.
Information and network security SEM V Prof. Priyanka Jadhav
B. Function in system.
C. Variable in System.
d. Method in system
. IDS stand for?
A. Information Detection System
B. Intrusion Detection System
C. Institute Detection System
D. Image Detection System
. Connection authentication is offered for ensuring that the remote host has the likely Internet
Protocol (IP) ___________ & _________
a) address, name
b) address, location
c) network, name
d) network, location
. Full form of SSL is __?
a) Secure Socket Layer
b) Series Socket Layer
c) System Security Layer
d) Spoofing Socket Layer.
. Which Protocols Design to create session between client and server?
a) Handshake
b) FTP
c) Alert
d) UDP.
Which protocol is used to transmit error, bad records, system Negotiation failure alerts to the
peer entity?
a) Alert Protocol
b) Handshake Protocol
c) Upper-layer Protocol
d) Change Cipher Spec Protocol
Which protocol is used for the purpose of reproducing the pending state into the Present
state?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
. Secure Electronic Transaction Protocol used for?
a) Credit Card payment.
b) Cheque payment.
c) Cash Payment
d) Payment of small amount for internet Service
Full form of “CA” in term of SET Protocols?
a) Chartered Accountant.
b) Certificate Authority.
c) Communication Authority.
d) Combination Assurances
Authority who is trusted to provide public key Certificate to Merchant, Card holder and
Information and network security SEM V Prof. Priyanka Jadhav
Payment gateway?
a) Serial Authority.
b) Certificate Authority.
c) Communication Authority.
d) Combination Authority
Which of them is not a wireless attack?
a) Eavesdropping
b) MAC Spoofing
c) Wireless Hijacking
d) Phishing
An attempt to harm, damage or cause threat to a system or network is broadly termed as
______
a) Cyber-crime
b) Cyber Attack
c) System hijacking
d) Digital crime
_____________________ is the art & science of cracking the cipher-text without knowing
the key.
a) Cracking
b) Cryptanalysis
c) Cryptography
d) Crypto-hacking
_____________________ is the art & science of cracking the cipher-text without knowing
the key.
a) Cracking
b) Cryptanalysis
c) Cryptography
d) Crypto-hacking
The process of disguising plaintext in such a way that its substance gets hidden (into what is
known
as cipher-text) is called _________________
a) cryptanalysis
b) decryption
c) reverse engineering
d) encryption
Which of the following is not the primary objective of cryptography?
a) Confidentiality
b) Data Integrity
c) Data Redundancy
d) Authentication
______________ is the mathematical procedure or algorithm which produces a cipher-text
for any specified plaintext.
a) Encryption Algorithm
b) Decryption Algorithm
c) Hashing Algorithm
d) Tuning Algorithm
In __________________ 2 different keys are implemented for encrypting as well as
decrypting that particular information.
Information and network security SEM V Prof. Priyanka Jadhav
a) Symmetric Key Encryption
b) Asymmetric Key Encryption
c) Asymmetric Key Decryption
d) Hash-based Key Encryption
as the key to encrypt the plaintext.
a) Rolling Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
In _____________ a sequence of actions is carried out on this block after a block of plain-text
bits is chosen for generating a block of cipher-text bits.
a) Block Cipher
b) One-time pad
c) Hash functions
d) Vigenere Cipher
________ is the science to make them secure and immune to attacks.
A. Cryptography
B. Cryptoanalysis
C. both (a) or (b)
D. neither (a) nor (b)
A combination of an encryption algorithm and a decryption algorithm is called a ________.
A. cipher
B. secret
C. key
D. none of the above
_________ ciphers can be categorized into two broad categories:
monoalphabetic and polyalphabetic.
A. Substitution
B. Transposition
C. both (a) or (b)
D. neither (a) nor (b)
A _________ is a keyless transposition cipher with N inputs and M outputs that uses a
table to define the relationship between the input stream and the output stream
a. S-box
b. P-box
c. T-box
D. none of the above
Information and network security SEM V Prof. Priyanka Jadhav
DES has an initial and final permutation block and rounds
A. 14
B. 15
C. 16
D. 18
a. Substitution
b. Transposition
c. Substituotion and transposition
Permutation and transposition
a.authentication
b. nonrpudation
d. Authentication and non repudation
a. Statistical anomaly detection
b. Rule based dection
c. Statistical anomaly detection & Rule based dection
d. Stack based
Information and network security SEM V Prof. Priyanka Jadhav
a. Activity in the system
b. Function in system
c. variable in system
d. Method in systm
a. Alert
b. Handshake
c. Upper layer protocol
d. Changecipher spec
C e r t i f i c a t e a u t h o r i t y
C o m m u n i a t i o n a u t h o r i t y
C o m b i n a t i o n a u t h o r i t y
C r y p t a n a l y s i s
C r y p t o g r a p h y
C r y p t o h a c k i n g
a. Confidentiality
b. Data integrity
c. Data redundancy
d. authentication
a. Rolling cipher
b. Shift cipher
c. Playfair cipher
d. Block cipher
Information and network security SEM V Prof. Priyanka Jadhav
a. International data encryption algorithm
b. Private data encryption algorithm
c. Internet data encryption algorithm
d. Local data encryption algorithm
a. Message field
b. Message digest
c. Message score
d. Message le
a. One time password file
b. Key wrapping
c. Virus detection
d. Intrusion detection
a. Poyalphabet
b. Mono alphabetic cipher
c. Multi alphabetic cipher
d. Bi alphabetic cipher
Information and network security SEM V Prof. Priyanka Jadhav
a. Certificate Authority (CA)
b. Cert Authoirty(CA)
c. Cert authorization (CA)
d. Certificate authorization(CA)
a. Boot sector
Information and network security SEM V Prof. Priyanka Jadhav
e. message
a. Confidentiality
b. Integrity
c. Authentication
d. accountability
Information and network security SEM V Prof. Priyanka Jadhav
a. Anomaly detection
b. Penetration identification
c. Profile based
d. Machine based
c. IP address and location
Information and network security SEM V Prof. Priyanka Jadhav
a. Alert
b. Handshake
c. Upper layer
d. Change cipher spec
a. Chartered accountant
b. Certificate authority
c. Communication authority
d. Combination assurance
a. Cyber crime
b. Cyber attack
c. System hijacking
a. crypanalysis
b. reverse engineering
a. Symmetric key encryption
b. Symmetric key encryption
c. Symmetric key encryption
d. Hash based key encryption
b. packet filter
Information and network security SEM V Prof. Priyanka Jadhav
c. content filter
a. b. H a s h c o d e
c. K e y e d h a s h f u n c t i o n
d. M e s s a g e k e y h a s h f u n c t i o n
a. Output feedback mode
b. Electronic code block mode
c. Cipher block chaining mode
d. Cipher feedback mode
Information and network security SEM V Prof. Priyanka Jadhav
C . p e n t e s t i n g
f. Network security protocol
a. Message access code
b. Message authentication code
c. Machine authentication code
d. Machine access code
a. Anomaly detection
b. Signature based detection
c. Stack based
d. Anomaly detection, Anomaly detection and Stack based
a. Prime number only
b. Prime number with its primitivr root
c. Random number
d. Prime number with one of its root
Information and network security SEM V Prof. Priyanka Jadhav
a. Miscount intruder
b. Masquerader
c. Clandestine
d. Masquerader and Clandestine
Information and network security SEM V Prof. Priyanka Jadhav
a. Rule based \
b. Action based
c. Custom based
d. Stack based
a. Credit card payment
b. Cheque payment
c. Cash payment
d. Payment of small amount for internet service
b. mac spoofing
a. mechanisms
Information and network security SEM V Prof. Priyanka Jadhav
a. Block cipher
b. One time pad
c. Hash function
d. Vigenere cipher
b. Application layer
a. Browser security
b. Email security
c. FtP security
d. Wifi security
Aschem in which-
Pawword is jumbled in a box
Password is XOR with key and stored
Hash of the password is stored
Psword is passed through a PRF which is then stored
a. Depends on the length of plain text
b. Depends on logic
c. On hash function
d. Depends on processor
Information and network security SEM V Prof. Priyanka Jadhav
a. Secirity policies
b. Protocols
c. Wireless network
d. Network algorithm
a. Buffer overflow
b. unexpected combination and unhandled pin
c. Race condition
d .
Information and network security SEM V Prof. Priyanka Jadhav
c. Anything distinct from the noise is assumend to be intrusion activity
.The principles of _________ ensures that only the sender and the
intended recipients have access to the content of a message
a)Confidentiality
b)authentication
c)integrity
d)access control
In ______ attacks, there is no modification of message contents.
a)passive
b)active
c)both of the above
d)none of the above
.If the recipient of a message has to be satisfied with the identity of the
sender, the principle of ______________ is observed
a)Confidentiality
b)authentication
c)integrity
Information and network security SEM V Prof. Priyanka Jadhav
d)access control
.Allowing specific users specific access is termed as ________
a)Confidentiality
b)authentication
c)integrity
d)access control
.The principle of _________ ensures that the sender of a message
cannot later claim that the message was never sent.
a)access control
b)availability
c)authentication
d)non-repudiation
.In _______ attack, the message contents are modified
a)passive
b)active
c)both of the above
d)none of the above
.Virus is a computer _______
a)file
b)program
c)database
d)network
.A ______ replicates itself by creating its own copies, in order to bring
the network to a halt.
a)virus
b)Worm
c)Trojan
d)bomb
.The language that we commonly used can be termed as ________
a)plaint text
b)pair text
c)simple text
d)rough test
.The codified language can be termed as __________
a)caeser text
b)cipher text
c)complex text
d)clear text
.In substitution cipher, the following happens
a)characters are replaced by other characters
b)rows are replaced by characters
c)columns are replaced by rows
d)none of the above
.caesar cipher is an example of __________
a)substitution cipher
b)transposition cipher
Information and network security SEM V Prof. Priyanka Jadhav
c)a and b both
d)none of the above
Crytanalysis is a person who ___________
a)devices cryptography solutions
b)attempts to break cryptography solutions
c)none of this
d)both a and b
.Homophonic cipher is __________ type of cipher
a)substitution cipher
b)transposition cipher
c)a and b both
d)none of the above
.Conversion of plain text into cipher text is called as _______
a)encryption
b)decryption
c)digital signature
d)data signature
Conversion of cipher text into plain text is called as _______
a)encryption
b)decryption
c)digital signature
d)data signature
.The matrix theory is used in the _________ technique.
a)Hill cipher
b)Monoalphabetic cipher
c)playfair cipher
d)code cipher
In diffie-hellman Key exchange algorithm , the initial two numbers are
called as ___________ and __________
a)p,q
b)a,b
c)r,s
d)n,g
.In ___________ , one bit of plain text is encrypted at a time
a)block cipher
b)bit cipher
c)stream cipher
d)straight cipher
In ____________, one block of plaint text is encrypted at a time.
a)block cipher
b)bit cipher
c)stream cipher
d)straight cipher
__________________ works on block mode.
a)CFB
b)OFB
c)CCB
Information and network security SEM V Prof. Priyanka Jadhav
d)CBC
DES encrypts blocks of __________ bits.
a)64
b)32
c)56
d)128
.In AES , the 16-byte key is expanded into ___________
a)176 bytes
b)200 bytes
c)78 bytes
d)184 bytes
In IDEA, the key size is __________
a)128 bytes
b)256 bytes
c)128bits
d)256 bits
.In asymmetric key cryptography , _____ keys are required per
communicating party
a)2
b)3
c)5
d)4
__________ is a technique that facilitates hiding of a message which
is to be kept secret inside other message.
a)substitution
b)transposition
c)steganography
d)none of the above
An attack on cipher text message ,where the attacker attempts to use
all possible permutation and combination is called as ___________
a)cipher attack
b)brute force attack
c)smurf attack
d)packet sniffing
In Cipher Block Chaining the initialization vector is used to maintain
__________ for cipher text.
a)simpler
b)unique
c)valuable
d)perfect
The private key ___________
a)must be distributed
b)must remain secret with individual
c)must be shared with everyone
d)must be duplicated
If A and B want to communicate securely with each other, B must not
know __________
Information and network security SEM V Prof. Priyanka Jadhav
a)A’s private key
b)A’s public key
c)B’ private key
d)B’s public key
if the sender encrypts the message with her private key, it achieves
the purpose of _______
a)confidentiality
b)authentication
c)integrity
d)none of the above
.A ______ is used to verify the integrity of the message.
a)Message Digest
b)Digital envelop
c)decryption
d)encryption
.when two different message digest have the same value, it is called
as _________
a)attack
b)hash
c)collision
d)cipher
.__________ is a message digest algorithm
a)DES
b)IDEA
c)RSA
d)MD5
To verify the digital signature ,we need the _____________
a)sender’s private key
a)sender’s public key
a)receiver’s private key
a)receiver’s public key
.A ___________ can issue digital certificates.
a)CA
b)bank
c)shopkeeper
d)government
The CA with highest authority is called as ______________ CA
a)main
b)master
c)manager
d)root
.Firewall should be situated _____________
a)inside a corporate network
b)outside a corporate network
c)anywhere
d)none of the above
A packet filter examines _____________ packet
Information and network security SEM V Prof. Priyanka Jadhav
a)all
b)no
c)some
d)alternate
.Application gateways are ____________ than packet filters.
a)less secure
b)more secure
c)equally secure
d)slowewer
Ipsec provides security at the __________ layer.
a)application
b)transport
c)network
d)data link
NAT stands for
a)natural account transfer
b)network account test
c)network address translation
d)network address transmission
.Network address in the range 10.0.0.0 to 10.255.255.255 are called
_____________ addresses
a)public
b)private
c)protected
d) mac
___________ type of virus infects a master boot record and spreads
when a system is booted from the disk containing the virus
a)Stealth virus
b)Polymorphic virus
c)Boot sector virus
d)Parasitic virus
___________ type of virus explicitly designed to hide itself from
detection by antivirus software.
a)Stealth virus
b)Polymorphic virus
c)Boot sector virus
d)Parasitic virus
.A ___________ is a program that can replicate itself and send copies
from computer to computer across network connections.
a)virus
b)Worm
c)Trojan
d)Bot
In ____________ phase virus is activated to perform the function for
which it was intended.
a)Dormant phase
b)propagation Phase
c)Triggering Phase
Information and network security SEM V Prof. Priyanka Jadhav
d)Execution phase
A __________ also known as trapdoor is a secret entry point into a
program .
a)backdoor
b)frontdoor
c)secretgate
d)none of the above
_________ malicious program captures keystrokes on a
compromised system.
a)Kit
b)Keylogger
c)Flodders
d)zombie
___________ is set of hacker tool used after attacker has broken into
a computer system and gained root-level access.
a)zombie
b)Kit
c)Rootkit
d)exploits
The three classes of intruders are _____________
a)Masquerader
b)Misfeasor
c)Cladestine users
d)All of the above
.password crackers reports the following techniques for learning
passwords are __________
a)Try user’s hone number, room number etc.
b)Exhaustively try all short passwords
c)both 1 and 2
d)none of the above
A system maintain a file that contains password for each authorized
user. This password file can be protect in ___________ ways.
a)one-way function
b)Access control
c)a and b both
d)none of the above
______________ involves the collection of data relating to the
behaviour of legitimate users over a period of time.
a)Statistical anomaly detection
b)Rule-based detection
c)Access control
d)Role- based detection
___________ approach involves defining thresholds ,independent of
user , for the frequency of occurrence of various events.
a)Threshold detection
b)Profile based
c)Anomaly detection
d)Penetration identification
Information and network security SEM V Prof. Priyanka Jadhav
____________ a profile of the activity of each user is developed and
used to detect changes in the behavior of individual accounts.
a)Threshold detection
b)Profile based
c)Anomaly detection
d)Penetration identification
In __________ rules are developed to detect deviation from previous
usage pattern
a)Threshold detection
b)Profile based
c)Anomaly detection
d)Penetration identification
______________ is an expert system approach that searches for
suspicious behavior.
a)Threshold detection
b)Profile based
c)Anomaly detection
d)Penetration identification
_______ involves an attempt to define a set of rules that can be used
to decide that a given behavior is that of an intruder.
a)Statistical anomaly detection
b)Rule-based detection
c)Access control
d)Role- based detection
.The fundamental tool for intrusion detection is the __________
a)Audit
b)Audit Record
c)subject
d)Action
Each audit record contains the following fields
a)subject
b)Action
c)a and b both
d)none of the above
For intrusion detection audit record contains various fields and
_________ field contains receptors of action like programs, message
records.
a)subject
b)Action
c)Object
d)Resource-Usage
For intrusion detection audit record contains various fields and
_________ field defines unique time- and – date stamp identifying when
the action took place.
a)Time-Stamp
b)Action
c)Object
d)Resource-Usage
Information and network security SEM V Prof. Priyanka Jadhav
Examples of metrics that are useful for profile –based intrusion
detection are _______________ which stores the record of the length of
time between two related events.
a)Counter
b)Gauge
c)Interval timer
d)Resource utilization
Examples of metrics that are useful for profile –based intrusion
detection are _______________ which keeps the record of quantity of
resources consumed during a specified period.
a)Counter
b)Gauge
c)Interval timer
d)Resource utilization
_______________ technique to accelerate the spread of worm is to
conduct a prior Internet scan to to accumulate Internet addresses of
vulnerable machines.
a)Multiplatform
b)Polymorphic
c)Metamorphic
d)Ultrafast spreading
______________ defines that newer worms are not limited to
windows machine but can attack a variety of platforms.
a)Multiplatform
b)Polymorphic
c)Metamorphic
d)Ultrafast spreading
.For virus detection ___________ approach helps to identify the
specific virus that has infected a program
a)Detection
b)Identification
c)Removal
d)none of the above
For virus detection ___________ approach helps to remove all
traces of the virus from the infected program and restore it to its original
state.
a)Detection
b)Identification
c)Removal
d)none of the above
___________ generation of antivirus software requires virus
signature to identify a virus, which may contain wildcards.
a)first generation
b)Second generation
c)Third generation
d)Fourth generation
A Second generation scanner uses _____________ rules to search
for probable virus infection.
Information and network security SEM V Prof. Priyanka Jadhav
a)simple scanner
b)Heuristic scanners
c)Activity traps
d)Full featured protection
.A second generation approach for antivirus software is integrity
checking where ___________ is appended to each program.
a)file
b)password
c)Checksum
d)LRC
___________ generation of antivirus program are memory resident
that identify a virus by its action rather than its structure in an infected
program.
a)first generation
b)Second generation
c)Third generation
d)Fourth generation
Behavior blocking software helps in monitoring behavior which
includes following _______________
a)Attempts to open ,view, delete, and/or modify files
b)Attempts to format disk drives and other unrecoverable disk operation
c)Modification of critical system settings, like start-up settings
d)All of the above
.In _______ attack, an attacker is able to recruit a number of host
throughout the internet to simultaneously or in a coordinated fashion
launch an attack upon the target.
a)DDOS
b)OSS
C)DSS
D)FOSS
.In ________________ attack the attacker takes control of multiple
hosts over the Internet, instructing them to contact the target Web
server.
a)SYN flood attack
b)TCP attack
c)IP attack
d)unknown attack
.In a ______________ attack the attacker is able to implant zombie
software on a number of sites distributed throughout the Internet.
a)direct DDOS
b)reflector DDOS
c)TCP attack
d)none of the above
.A ___________ attack adds another layer of machines
a)direct DDOS
b)reflector DDOS
c)TCP attack
d)none of the above
Information and network security SEM V Prof. Priyanka Jadhav
.A strategy for locating vulnerable machines, a process known as
scanning is used.______________ scanning method uses information
contained on an infected victim machine to find more host to scan.
a)Random
b)Hit-list
c)Topological
d)Local subnet
. A strategy for locating vulnerable machines, a process known as
scanning is used._________________ scanning technique produces a
high volume of Internet traffic, which may cause generalized disruption.
a)Random
b)Hit-list
c)Topological
d)Local subnet
The DDOS countermeasures defines
a)Attack prevention and pre-emption
b)Attack detection and filtering
c)Attack source traceback and identification
d)All the above
________________ mechanisms enable the victim to endure attack
attempts without denying service to legitimate clients.
a)Attack prevention and pre-emption
b)Attack detection and filtering
c)Attack source traceback and identification
d)All the above
________________ is an attempt to identify the source of the attack
is a first step in preventing future attacks.
a)Attack prevention and pre-emption
b)Attack detection and filtering
c)Attack source traceback and identification
d)All the above
In Rotor machines each cylinder has ____ input and output pin.
a)25
b)26
c)32
d)64
The OSI security architecture focuses on ________
a)Security attack
b)Security Mechanism
c)Security service
d)All of the above
.In connectionless transfer ,provides assurance that the source of
received data is as claimed is defined by ________ security service.
a)Peer Entity Authentication
b)Data origin Authentication
c)both a and b
d)none of the above
___________ security service provides proof that the message was
Information and network security SEM V Prof. Priyanka Jadhav
sent by the specified party.
a)Nonrepudiation Origin
b) Nonrepudiation Destination
c) both a and b
d)none of the above
__________ security mechanism defines the use of mathematical
algorithm to transform data into a form that is readily intelligible.
a)Digital signature
b)Access control
c)Data Integrity
d)Encipherment
The insertion of bits into gaps in a data stream to frustrate traffic
analysis attempts is known as _________________.
a)Traffic padding
b)Access control
c)Data Integrity
d)Security label
The task involved in designing a particular security service are
1)The algorithm should be such that an opponent cannot defeat its
purpose.
2)Generate the secret information to be used with the algorithm
a)statement 1 is true and 2 is false
b)statement 2 is true and 1 is false
a)statement 1 and 2 are false
a)statement 1 and 2 are true
.The symmetric cipher model contains _______ components.
a)one
b)Four
c)Five
d)Six
In ___________ type , the attacker knows about some pairs of plain
text and corresponding cipher text for those pairs.
a)Known plain text attack
b)Chosen plaint text attack
c)Cipher text only attack
d)Chosen text attack
.In ____________ attacker knows the cipher text ,encryption
algorithm, corresponding plain text block but attacker wants to discover
the key used for encryption.
a)Known plain text attack
b)Chosen cipher text attack
c)Cipher text only attack
d)Chosen text attack
.The cipher text for Meet me by using Caesar cipher is _________
a)Phhw ph
b)oggy og
c)jbbq jb
d)nffu nf
Information and network security SEM V Prof. Priyanka Jadhav
.Man in the middle attack is also called ___________ .
a)bucket brigade attack
b)Woman in the middle attack
c)both a and b
d)none of the above
.The XOR result of the operation 010101 and 010101 is ___
a)010101
b)000000
c)111111
d)101010
.Double DES involves use of ___________ keys
a)Two
b)one
c)Sixty four
d)fifty six
.The attack which count the time required to decrypt the different
blocks of cipher text.
a)logic attack
b)timing attack
c)birthday attack
d)none of the above
.In _____________ type of steganograhy technique selected letters of
printed or typewritten text are overwritten in pencil.
a)Character marking
b)Invisible ink
c)pin punctures
d)Typewriter correction ribbon
.In _____________ type of steganograhy technique small pin
punctures on selected letters are ordinarily not visible unless the paper
is held up in front of a light.
a)Character marking
b)Invisible ink
c)pin punctures
d)Typewriter correction ribbon