Information and network security SEM V Prof. Priyanka Jadhav

36
Information and network security SEM V Prof. Priyanka Jadhav .The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform. a) TCP/IP b) Cloud c) OSI d) OIS The full form of OSI is OSI model is ______________ a) Open Systems Interconnection b) Open Software Interconnection c) Open Systems Internet d) Open Software Internet Which of them is not a wireless attack? a) Eavesdropping b) MAC Spoofing c) Wireless Hijacking d) Phishing . An attempt to harm, damage or cause threat to a system or network is broadly termed as ______ a) Cyber-crime b) Cyber Attack c) System hijacking d) Digital crime . _________ are the special type of programs used for recording and tracking user’s keystroke. a) Keylogger b) Trojans c) Virus d) Worms Packet sniffers involve ____________ a) Active receiver b) Passive receiver c) Legal receiver d) Partially-active receive _____________________ is the art & science of cracking the cipher-text without knowing the key. a) Cracking b) Cryptanalysis c) Cryptography d) Crypto-hacking The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is called _________________ a) cryptanalysis b) decryption c) reverse engineering d) encryption The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as ________________

Transcript of Information and network security SEM V Prof. Priyanka Jadhav

Information and network security SEM V Prof. Priyanka Jadhav

.The ____________ model is 7-layer architecture where each layer is having some specific

functionality to perform.

a) TCP/IP

b) Cloud

c) OSI

d) OIS

The full form of OSI is OSI model is ______________

a) Open Systems Interconnection

b) Open Software Interconnection

c) Open Systems Internet

d) Open Software Internet

Which of them is not a wireless attack?

a) Eavesdropping

b) MAC Spoofing

c) Wireless Hijacking

d) Phishing

. An attempt to harm, damage or cause threat to a system or network is broadly

termed as ______

a) Cyber-crime

b) Cyber Attack

c) System hijacking

d) Digital crime

. _________ are the special type of programs used for recording and tracking

user’s keystroke.

a) Keylogger

b) Trojans

c) Virus

d) Worms

Packet sniffers involve ____________

a) Active receiver

b) Passive receiver

c) Legal receiver

d) Partially-active receive

_____________________ is the art & science of cracking the cipher-text without

knowing the key.

a) Cracking

b) Cryptanalysis

c) Cryptography

d) Crypto-hacking

The process of disguising plaintext in such a way that its substance gets hidden

(into what is known as cipher-text) is called _________________

a) cryptanalysis

b) decryption

c) reverse engineering

d) encryption

The method of reverting the encrypted text which is known as cipher text to its

original form i.e. plain text is known as ________________

Information and network security SEM V Prof. Priyanka Jadhav

a) cryptanalysis

b) decryption

c) reverse engineering

d) encryption

. Which of the following is not the primary objective of cryptography?

a) Confidentiality

b) Data Integrity

c) Data Redundancy

d) Authentication

. Cryptography offers a set of required security services. Which of the following is

not among that 4 required security services?

a) Encryption

b) Message Authentication codes

c) Hash functions

d) Steganography

. ______________ is the mathematical procedure or algorithm which produces a

cipher-text for any specified plaintext.

a) Encryption Algorithm

b) Decryption Algorithm

c) Hashing Algorithm

d) Tuning Algorithm

. In __________________ 2 different keys are implemented for encrypting as well

as decrypting that particular information.

a) Symmetric Key Encryption

b) Asymmetric Key Encryption

c) Asymmetric Key Decryption

d) Hash-based Key Encryption

. ____________ is a mono-alphabetic encryption code wherein each & every

letter of plain-text is replaced by another letter in creating the cipher-text.

a) Polyalphabetic Cipher

b) Caesar Cipher

c) Playfair Cipher

d) Monoalphabetic Cipher

. _____________ is the concept that tells us about the replacement of every

alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed

quantity.

a) Rolling Cipher

b) Shift Cipher

c) Playfair Cipher

d) Block Cipher

. ________________ is a cipher formed out of substitution where for a given keyvalue the

cipher alphabet for every plain text remains fixed all through the

encryption procedure.

a) Polyalphabetic Cipher

b) Caesar Cipher

c) Playfair Cipher

d) Monoalphabetic Cipher

. __________at first, a key table is produced. That key table is a 5 by 5 grid of

Information and network security SEM V Prof. Priyanka Jadhav

alphabets which operates as the key to encrypt the plaintext.

a) Rolling Cipher

b) Shift Cipher

c) Playfair Cipher

d) Block Cipher

. ______________ employs a text string as a key that is implemented to do a

series of shifts on the plain-text.

a) Vigenere Cipher

b) Shift Cipher

c) Playfair Cipher

d) Block Cipher

. The ________________ has piece of the keyword that has the same length as

that of the plaintext.

a) Block Cipher

b) One-time pad

c) Hash functions

d) Vigenere Cipher

In _____________ a sequence of actions is carried out on this block after a

block of plain-text bits is chosen for generating a block of cipher-text bits.

a) Block Cipher

b) One-time pad

c) Hash functions

d) Vigenere Cipher

Which of the following is not an example of a block cipher?

a) DES

b) IDEA

c) Caesar cipher

d) Twofish

Which is implemented using the Feistel Cipher which employs 16 round of

Feistel structure.

a) DES

b) IDEA

c) Caesar cipher

d) Twofish

DES stands for ________________

a) Data Encryption Security

b) Data Encrypted Standard

c) Device Encryption Standard

d) Data Encryption Standard

AES stands for ________________

a) Advanced Encryption Security

b) Advanced Encryption Standard

c) Advanced Encrypted Standard

d) Active Encryption Standard

_____________ is hiding of data within data, where we can hide images, text,

and other messages within images, videos, music or recording files.

a) Cryptography

b) Tomography

Information and network security SEM V Prof. Priyanka Jadhav

c) Steganography

d) Chorography

. In asymmetric key cryptography, the private key is kept by __________

a) sender

b) receiver

c) sender and receiver

d) all the connected devices to the network

. In cryptography, the order of the letters in a message is rearranged by

__________

a) Transpositional ciphers

b) substitution ciphers

c) both transpositional ciphers and substitution ciphers

d) quadratic ciphers

. Using Rivest, Shamir, Adleman (RSA)cryptosystem with p=7 and q=9. Encrypt

M=24 to find ciphertext. The Ciphertext is:

a. 42

b. 93

c. 114

d. 103

. Conventional cryptography is also known as _____________ or symmetric-key

encryption.

a) secret-key

b) public key

c) protected key

d) primary key

. ____________ cryptography operates on binary-bit series and strings.

a) Modern

b) Classic

c) Traditional

d) Primitive

ECB and CBC are ______ ciphers

a. block

b. stream

c. field

d. none of the above

The method provides a one-time session key for two parties

a. Diffie-Hellman

b. RSA

c. DES

d. AES

Message _______means that the receiver is ensured that the message is coming from the

intended sender, not an imposter.

a. confidentiality

b. integrity

c. authentication

d. none of the above

Digital signature provides

Information and network security SEM V Prof. Priyanka Jadhav

a. authentication

b. nonrepudiation

c. both (a) and (b)

d. neither (a) nor (b)

A(n) ________ is a trusted third party that assigns a symmetric key to two parties.

A. KDC

B. CA

C. KDD

D. none of the above

Intrusion is action or process that compromises Authication, integrity, availability of system

A. force fully

B. With Permission

C. Without Permission

D . Both A and C

Intruder is ____.

A. Action

B. User

C System

D. Data

What are the different types of intruder?

A. Miscount intruder.

B. Masquerader intruder.

C.Clandestine intruder

D. Both B and C

Misfeasor intruder is normally?

A. Insider

B. Outsider

C. Both A and B

D. Middle

What are the different ways to classify IDS?

A. Statistical anomaly detection

B. Rule based detection

C. Both A and B

D. Stack based.

What is anomaly detection in IDS?

A. Rules Based.

B. Action based

C. Custom based

D. Stack based.

. In which approach an expert system is used to search for suspicious behavior of user?

A. Anomaly detection.

B. Penetration identification.

C. Profile based

D. Machine based

. Is Auditing Records keeping the Track of ongoing?

A. Activity in the system.

Information and network security SEM V Prof. Priyanka Jadhav

B. Function in system.

C. Variable in System.

d. Method in system

. IDS stand for?

A. Information Detection System

B. Intrusion Detection System

C. Institute Detection System

D. Image Detection System

. Connection authentication is offered for ensuring that the remote host has the likely Internet

Protocol (IP) ___________ & _________

a) address, name

b) address, location

c) network, name

d) network, location

. Full form of SSL is __?

a) Secure Socket Layer

b) Series Socket Layer

c) System Security Layer

d) Spoofing Socket Layer.

. Which Protocols Design to create session between client and server?

a) Handshake

b) FTP

c) Alert

d) UDP.

Which protocol is used to transmit error, bad records, system Negotiation failure alerts to the

peer entity?

a) Alert Protocol

b) Handshake Protocol

c) Upper-layer Protocol

d) Change Cipher Spec Protocol

Which protocol is used for the purpose of reproducing the pending state into the Present

state?

a) Alert Protocol

b) Handshake Protocol

c) Upper-Layer Protocol

d) Change Cipher Spec Protocol

. Secure Electronic Transaction Protocol used for?

a) Credit Card payment.

b) Cheque payment.

c) Cash Payment

d) Payment of small amount for internet Service

Full form of “CA” in term of SET Protocols?

a) Chartered Accountant.

b) Certificate Authority.

c) Communication Authority.

d) Combination Assurances

Authority who is trusted to provide public key Certificate to Merchant, Card holder and

Information and network security SEM V Prof. Priyanka Jadhav

Payment gateway?

a) Serial Authority.

b) Certificate Authority.

c) Communication Authority.

d) Combination Authority

Which of them is not a wireless attack?

a) Eavesdropping

b) MAC Spoofing

c) Wireless Hijacking

d) Phishing

An attempt to harm, damage or cause threat to a system or network is broadly termed as

______

a) Cyber-crime

b) Cyber Attack

c) System hijacking

d) Digital crime

_____________________ is the art & science of cracking the cipher-text without knowing

the key.

a) Cracking

b) Cryptanalysis

c) Cryptography

d) Crypto-hacking

_____________________ is the art & science of cracking the cipher-text without knowing

the key.

a) Cracking

b) Cryptanalysis

c) Cryptography

d) Crypto-hacking

The process of disguising plaintext in such a way that its substance gets hidden (into what is

known

as cipher-text) is called _________________

a) cryptanalysis

b) decryption

c) reverse engineering

d) encryption

Which of the following is not the primary objective of cryptography?

a) Confidentiality

b) Data Integrity

c) Data Redundancy

d) Authentication

______________ is the mathematical procedure or algorithm which produces a cipher-text

for any specified plaintext.

a) Encryption Algorithm

b) Decryption Algorithm

c) Hashing Algorithm

d) Tuning Algorithm

In __________________ 2 different keys are implemented for encrypting as well as

decrypting that particular information.

Information and network security SEM V Prof. Priyanka Jadhav

a) Symmetric Key Encryption

b) Asymmetric Key Encryption

c) Asymmetric Key Decryption

d) Hash-based Key Encryption

as the key to encrypt the plaintext.

a) Rolling Cipher

b) Shift Cipher

c) Playfair Cipher

d) Block Cipher

In _____________ a sequence of actions is carried out on this block after a block of plain-text

bits is chosen for generating a block of cipher-text bits.

a) Block Cipher

b) One-time pad

c) Hash functions

d) Vigenere Cipher

________ is the science to make them secure and immune to attacks.

A. Cryptography

B. Cryptoanalysis

C. both (a) or (b)

D. neither (a) nor (b)

A combination of an encryption algorithm and a decryption algorithm is called a ________.

A. cipher

B. secret

C. key

D. none of the above

_________ ciphers can be categorized into two broad categories:

monoalphabetic and polyalphabetic.

A. Substitution

B. Transposition

C. both (a) or (b)

D. neither (a) nor (b)

A _________ is a keyless transposition cipher with N inputs and M outputs that uses a

table to define the relationship between the input stream and the output stream

a. S-box

b. P-box

c. T-box

D. none of the above

Information and network security SEM V Prof. Priyanka Jadhav

DES has an initial and final permutation block and rounds

A. 14

B. 15

C. 16

D. 18

a. Substitution

b. Transposition

c. Substituotion and transposition

Permutation and transposition

a.authentication

b. nonrpudation

d. Authentication and non repudation

a. Statistical anomaly detection

b. Rule based dection

c. Statistical anomaly detection & Rule based dection

d. Stack based

Information and network security SEM V Prof. Priyanka Jadhav

a. Activity in the system

b. Function in system

c. variable in system

d. Method in systm

a. Alert

b. Handshake

c. Upper layer protocol

d. Changecipher spec

C e r t i f i c a t e a u t h o r i t y

C o m m u n i a t i o n a u t h o r i t y

C o m b i n a t i o n a u t h o r i t y

C r y p t a n a l y s i s

C r y p t o g r a p h y

C r y p t o h a c k i n g

a. Confidentiality

b. Data integrity

c. Data redundancy

d. authentication

a. Rolling cipher

b. Shift cipher

c. Playfair cipher

d. Block cipher

Information and network security SEM V Prof. Priyanka Jadhav

a. International data encryption algorithm

b. Private data encryption algorithm

c. Internet data encryption algorithm

d. Local data encryption algorithm

a. Message field

b. Message digest

c. Message score

d. Message le

a. One time password file

b. Key wrapping

c. Virus detection

d. Intrusion detection

a. Poyalphabet

b. Mono alphabetic cipher

c. Multi alphabetic cipher

d. Bi alphabetic cipher

Information and network security SEM V Prof. Priyanka Jadhav

Information and network security SEM V Prof. Priyanka Jadhav

a. Certificate Authority (CA)

b. Cert Authoirty(CA)

c. Cert authorization (CA)

d. Certificate authorization(CA)

a. Boot sector

Information and network security SEM V Prof. Priyanka Jadhav

e. message

a. Confidentiality

b. Integrity

c. Authentication

d. accountability

Information and network security SEM V Prof. Priyanka Jadhav

a. Anomaly detection

b. Penetration identification

c. Profile based

d. Machine based

c. IP address and location

Information and network security SEM V Prof. Priyanka Jadhav

a. Alert

b. Handshake

c. Upper layer

d. Change cipher spec

a. Chartered accountant

b. Certificate authority

c. Communication authority

d. Combination assurance

a. Cyber crime

b. Cyber attack

c. System hijacking

a. crypanalysis

b. reverse engineering

a. Symmetric key encryption

b. Symmetric key encryption

c. Symmetric key encryption

d. Hash based key encryption

b. packet filter

Information and network security SEM V Prof. Priyanka Jadhav

c. content filter

a. b. H a s h c o d e

c. K e y e d h a s h f u n c t i o n

d. M e s s a g e k e y h a s h f u n c t i o n

a. Output feedback mode

b. Electronic code block mode

c. Cipher block chaining mode

d. Cipher feedback mode

Information and network security SEM V Prof. Priyanka Jadhav

C . p e n t e s t i n g

f. Network security protocol

a. Message access code

b. Message authentication code

c. Machine authentication code

d. Machine access code

a. Anomaly detection

b. Signature based detection

c. Stack based

d. Anomaly detection, Anomaly detection and Stack based

a. Prime number only

b. Prime number with its primitivr root

c. Random number

d. Prime number with one of its root

Information and network security SEM V Prof. Priyanka Jadhav

a. Miscount intruder

b. Masquerader

c. Clandestine

d. Masquerader and Clandestine

Information and network security SEM V Prof. Priyanka Jadhav

a. Rule based \

b. Action based

c. Custom based

d. Stack based

a. Credit card payment

b. Cheque payment

c. Cash payment

d. Payment of small amount for internet service

b. mac spoofing

a. mechanisms

Information and network security SEM V Prof. Priyanka Jadhav

b. decryption algorithm

Information and network security SEM V Prof. Priyanka Jadhav

a. Block cipher

b. One time pad

c. Hash function

d. Vigenere cipher

b. Application layer

a. Browser security

b. Email security

c. FtP security

d. Wifi security

Aschem in which-

Pawword is jumbled in a box

Password is XOR with key and stored

Hash of the password is stored

Psword is passed through a PRF which is then stored

a. Depends on the length of plain text

b. Depends on logic

c. On hash function

d. Depends on processor

Information and network security SEM V Prof. Priyanka Jadhav

a. Secirity policies

b. Protocols

c. Wireless network

d. Network algorithm

a. Buffer overflow

b. unexpected combination and unhandled pin

c. Race condition

d .

Information and network security SEM V Prof. Priyanka Jadhav

c. Anything distinct from the noise is assumend to be intrusion activity

.The principles of _________ ensures that only the sender and the

intended recipients have access to the content of a message

a)Confidentiality

b)authentication

c)integrity

d)access control

In ______ attacks, there is no modification of message contents.

a)passive

b)active

c)both of the above

d)none of the above

.If the recipient of a message has to be satisfied with the identity of the

sender, the principle of ______________ is observed

a)Confidentiality

b)authentication

c)integrity

Information and network security SEM V Prof. Priyanka Jadhav

d)access control

.Allowing specific users specific access is termed as ________

a)Confidentiality

b)authentication

c)integrity

d)access control

.The principle of _________ ensures that the sender of a message

cannot later claim that the message was never sent.

a)access control

b)availability

c)authentication

d)non-repudiation

.In _______ attack, the message contents are modified

a)passive

b)active

c)both of the above

d)none of the above

.Virus is a computer _______

a)file

b)program

c)database

d)network

.A ______ replicates itself by creating its own copies, in order to bring

the network to a halt.

a)virus

b)Worm

c)Trojan

d)bomb

.The language that we commonly used can be termed as ________

a)plaint text

b)pair text

c)simple text

d)rough test

.The codified language can be termed as __________

a)caeser text

b)cipher text

c)complex text

d)clear text

.In substitution cipher, the following happens

a)characters are replaced by other characters

b)rows are replaced by characters

c)columns are replaced by rows

d)none of the above

.caesar cipher is an example of __________

a)substitution cipher

b)transposition cipher

Information and network security SEM V Prof. Priyanka Jadhav

c)a and b both

d)none of the above

Crytanalysis is a person who ___________

a)devices cryptography solutions

b)attempts to break cryptography solutions

c)none of this

d)both a and b

.Homophonic cipher is __________ type of cipher

a)substitution cipher

b)transposition cipher

c)a and b both

d)none of the above

.Conversion of plain text into cipher text is called as _______

a)encryption

b)decryption

c)digital signature

d)data signature

Conversion of cipher text into plain text is called as _______

a)encryption

b)decryption

c)digital signature

d)data signature

.The matrix theory is used in the _________ technique.

a)Hill cipher

b)Monoalphabetic cipher

c)playfair cipher

d)code cipher

In diffie-hellman Key exchange algorithm , the initial two numbers are

called as ___________ and __________

a)p,q

b)a,b

c)r,s

d)n,g

.In ___________ , one bit of plain text is encrypted at a time

a)block cipher

b)bit cipher

c)stream cipher

d)straight cipher

In ____________, one block of plaint text is encrypted at a time.

a)block cipher

b)bit cipher

c)stream cipher

d)straight cipher

__________________ works on block mode.

a)CFB

b)OFB

c)CCB

Information and network security SEM V Prof. Priyanka Jadhav

d)CBC

DES encrypts blocks of __________ bits.

a)64

b)32

c)56

d)128

.In AES , the 16-byte key is expanded into ___________

a)176 bytes

b)200 bytes

c)78 bytes

d)184 bytes

In IDEA, the key size is __________

a)128 bytes

b)256 bytes

c)128bits

d)256 bits

.In asymmetric key cryptography , _____ keys are required per

communicating party

a)2

b)3

c)5

d)4

__________ is a technique that facilitates hiding of a message which

is to be kept secret inside other message.

a)substitution

b)transposition

c)steganography

d)none of the above

An attack on cipher text message ,where the attacker attempts to use

all possible permutation and combination is called as ___________

a)cipher attack

b)brute force attack

c)smurf attack

d)packet sniffing

In Cipher Block Chaining the initialization vector is used to maintain

__________ for cipher text.

a)simpler

b)unique

c)valuable

d)perfect

The private key ___________

a)must be distributed

b)must remain secret with individual

c)must be shared with everyone

d)must be duplicated

If A and B want to communicate securely with each other, B must not

know __________

Information and network security SEM V Prof. Priyanka Jadhav

a)A’s private key

b)A’s public key

c)B’ private key

d)B’s public key

if the sender encrypts the message with her private key, it achieves

the purpose of _______

a)confidentiality

b)authentication

c)integrity

d)none of the above

.A ______ is used to verify the integrity of the message.

a)Message Digest

b)Digital envelop

c)decryption

d)encryption

.when two different message digest have the same value, it is called

as _________

a)attack

b)hash

c)collision

d)cipher

.__________ is a message digest algorithm

a)DES

b)IDEA

c)RSA

d)MD5

To verify the digital signature ,we need the _____________

a)sender’s private key

a)sender’s public key

a)receiver’s private key

a)receiver’s public key

.A ___________ can issue digital certificates.

a)CA

b)bank

c)shopkeeper

d)government

The CA with highest authority is called as ______________ CA

a)main

b)master

c)manager

d)root

.Firewall should be situated _____________

a)inside a corporate network

b)outside a corporate network

c)anywhere

d)none of the above

A packet filter examines _____________ packet

Information and network security SEM V Prof. Priyanka Jadhav

a)all

b)no

c)some

d)alternate

.Application gateways are ____________ than packet filters.

a)less secure

b)more secure

c)equally secure

d)slowewer

Ipsec provides security at the __________ layer.

a)application

b)transport

c)network

d)data link

NAT stands for

a)natural account transfer

b)network account test

c)network address translation

d)network address transmission

.Network address in the range 10.0.0.0 to 10.255.255.255 are called

_____________ addresses

a)public

b)private

c)protected

d) mac

___________ type of virus infects a master boot record and spreads

when a system is booted from the disk containing the virus

a)Stealth virus

b)Polymorphic virus

c)Boot sector virus

d)Parasitic virus

___________ type of virus explicitly designed to hide itself from

detection by antivirus software.

a)Stealth virus

b)Polymorphic virus

c)Boot sector virus

d)Parasitic virus

.A ___________ is a program that can replicate itself and send copies

from computer to computer across network connections.

a)virus

b)Worm

c)Trojan

d)Bot

In ____________ phase virus is activated to perform the function for

which it was intended.

a)Dormant phase

b)propagation Phase

c)Triggering Phase

Information and network security SEM V Prof. Priyanka Jadhav

d)Execution phase

A __________ also known as trapdoor is a secret entry point into a

program .

a)backdoor

b)frontdoor

c)secretgate

d)none of the above

_________ malicious program captures keystrokes on a

compromised system.

a)Kit

b)Keylogger

c)Flodders

d)zombie

___________ is set of hacker tool used after attacker has broken into

a computer system and gained root-level access.

a)zombie

b)Kit

c)Rootkit

d)exploits

The three classes of intruders are _____________

a)Masquerader

b)Misfeasor

c)Cladestine users

d)All of the above

.password crackers reports the following techniques for learning

passwords are __________

a)Try user’s hone number, room number etc.

b)Exhaustively try all short passwords

c)both 1 and 2

d)none of the above

A system maintain a file that contains password for each authorized

user. This password file can be protect in ___________ ways.

a)one-way function

b)Access control

c)a and b both

d)none of the above

______________ involves the collection of data relating to the

behaviour of legitimate users over a period of time.

a)Statistical anomaly detection

b)Rule-based detection

c)Access control

d)Role- based detection

___________ approach involves defining thresholds ,independent of

user , for the frequency of occurrence of various events.

a)Threshold detection

b)Profile based

c)Anomaly detection

d)Penetration identification

Information and network security SEM V Prof. Priyanka Jadhav

____________ a profile of the activity of each user is developed and

used to detect changes in the behavior of individual accounts.

a)Threshold detection

b)Profile based

c)Anomaly detection

d)Penetration identification

In __________ rules are developed to detect deviation from previous

usage pattern

a)Threshold detection

b)Profile based

c)Anomaly detection

d)Penetration identification

______________ is an expert system approach that searches for

suspicious behavior.

a)Threshold detection

b)Profile based

c)Anomaly detection

d)Penetration identification

_______ involves an attempt to define a set of rules that can be used

to decide that a given behavior is that of an intruder.

a)Statistical anomaly detection

b)Rule-based detection

c)Access control

d)Role- based detection

.The fundamental tool for intrusion detection is the __________

a)Audit

b)Audit Record

c)subject

d)Action

Each audit record contains the following fields

a)subject

b)Action

c)a and b both

d)none of the above

For intrusion detection audit record contains various fields and

_________ field contains receptors of action like programs, message

records.

a)subject

b)Action

c)Object

d)Resource-Usage

For intrusion detection audit record contains various fields and

_________ field defines unique time- and – date stamp identifying when

the action took place.

a)Time-Stamp

b)Action

c)Object

d)Resource-Usage

Information and network security SEM V Prof. Priyanka Jadhav

Examples of metrics that are useful for profile –based intrusion

detection are _______________ which stores the record of the length of

time between two related events.

a)Counter

b)Gauge

c)Interval timer

d)Resource utilization

Examples of metrics that are useful for profile –based intrusion

detection are _______________ which keeps the record of quantity of

resources consumed during a specified period.

a)Counter

b)Gauge

c)Interval timer

d)Resource utilization

_______________ technique to accelerate the spread of worm is to

conduct a prior Internet scan to to accumulate Internet addresses of

vulnerable machines.

a)Multiplatform

b)Polymorphic

c)Metamorphic

d)Ultrafast spreading

______________ defines that newer worms are not limited to

windows machine but can attack a variety of platforms.

a)Multiplatform

b)Polymorphic

c)Metamorphic

d)Ultrafast spreading

.For virus detection ___________ approach helps to identify the

specific virus that has infected a program

a)Detection

b)Identification

c)Removal

d)none of the above

For virus detection ___________ approach helps to remove all

traces of the virus from the infected program and restore it to its original

state.

a)Detection

b)Identification

c)Removal

d)none of the above

___________ generation of antivirus software requires virus

signature to identify a virus, which may contain wildcards.

a)first generation

b)Second generation

c)Third generation

d)Fourth generation

A Second generation scanner uses _____________ rules to search

for probable virus infection.

Information and network security SEM V Prof. Priyanka Jadhav

a)simple scanner

b)Heuristic scanners

c)Activity traps

d)Full featured protection

.A second generation approach for antivirus software is integrity

checking where ___________ is appended to each program.

a)file

b)password

c)Checksum

d)LRC

___________ generation of antivirus program are memory resident

that identify a virus by its action rather than its structure in an infected

program.

a)first generation

b)Second generation

c)Third generation

d)Fourth generation

Behavior blocking software helps in monitoring behavior which

includes following _______________

a)Attempts to open ,view, delete, and/or modify files

b)Attempts to format disk drives and other unrecoverable disk operation

c)Modification of critical system settings, like start-up settings

d)All of the above

.In _______ attack, an attacker is able to recruit a number of host

throughout the internet to simultaneously or in a coordinated fashion

launch an attack upon the target.

a)DDOS

b)OSS

C)DSS

D)FOSS

.In ________________ attack the attacker takes control of multiple

hosts over the Internet, instructing them to contact the target Web

server.

a)SYN flood attack

b)TCP attack

c)IP attack

d)unknown attack

.In a ______________ attack the attacker is able to implant zombie

software on a number of sites distributed throughout the Internet.

a)direct DDOS

b)reflector DDOS

c)TCP attack

d)none of the above

.A ___________ attack adds another layer of machines

a)direct DDOS

b)reflector DDOS

c)TCP attack

d)none of the above

Information and network security SEM V Prof. Priyanka Jadhav

.A strategy for locating vulnerable machines, a process known as

scanning is used.______________ scanning method uses information

contained on an infected victim machine to find more host to scan.

a)Random

b)Hit-list

c)Topological

d)Local subnet

. A strategy for locating vulnerable machines, a process known as

scanning is used._________________ scanning technique produces a

high volume of Internet traffic, which may cause generalized disruption.

a)Random

b)Hit-list

c)Topological

d)Local subnet

The DDOS countermeasures defines

a)Attack prevention and pre-emption

b)Attack detection and filtering

c)Attack source traceback and identification

d)All the above

________________ mechanisms enable the victim to endure attack

attempts without denying service to legitimate clients.

a)Attack prevention and pre-emption

b)Attack detection and filtering

c)Attack source traceback and identification

d)All the above

________________ is an attempt to identify the source of the attack

is a first step in preventing future attacks.

a)Attack prevention and pre-emption

b)Attack detection and filtering

c)Attack source traceback and identification

d)All the above

In Rotor machines each cylinder has ____ input and output pin.

a)25

b)26

c)32

d)64

The OSI security architecture focuses on ________

a)Security attack

b)Security Mechanism

c)Security service

d)All of the above

.In connectionless transfer ,provides assurance that the source of

received data is as claimed is defined by ________ security service.

a)Peer Entity Authentication

b)Data origin Authentication

c)both a and b

d)none of the above

___________ security service provides proof that the message was

Information and network security SEM V Prof. Priyanka Jadhav

sent by the specified party.

a)Nonrepudiation Origin

b) Nonrepudiation Destination

c) both a and b

d)none of the above

__________ security mechanism defines the use of mathematical

algorithm to transform data into a form that is readily intelligible.

a)Digital signature

b)Access control

c)Data Integrity

d)Encipherment

The insertion of bits into gaps in a data stream to frustrate traffic

analysis attempts is known as _________________.

a)Traffic padding

b)Access control

c)Data Integrity

d)Security label

The task involved in designing a particular security service are

1)The algorithm should be such that an opponent cannot defeat its

purpose.

2)Generate the secret information to be used with the algorithm

a)statement 1 is true and 2 is false

b)statement 2 is true and 1 is false

a)statement 1 and 2 are false

a)statement 1 and 2 are true

.The symmetric cipher model contains _______ components.

a)one

b)Four

c)Five

d)Six

In ___________ type , the attacker knows about some pairs of plain

text and corresponding cipher text for those pairs.

a)Known plain text attack

b)Chosen plaint text attack

c)Cipher text only attack

d)Chosen text attack

.In ____________ attacker knows the cipher text ,encryption

algorithm, corresponding plain text block but attacker wants to discover

the key used for encryption.

a)Known plain text attack

b)Chosen cipher text attack

c)Cipher text only attack

d)Chosen text attack

.The cipher text for Meet me by using Caesar cipher is _________

a)Phhw ph

b)oggy og

c)jbbq jb

d)nffu nf

Information and network security SEM V Prof. Priyanka Jadhav

.Man in the middle attack is also called ___________ .

a)bucket brigade attack

b)Woman in the middle attack

c)both a and b

d)none of the above

.The XOR result of the operation 010101 and 010101 is ___

a)010101

b)000000

c)111111

d)101010

.Double DES involves use of ___________ keys

a)Two

b)one

c)Sixty four

d)fifty six

.The attack which count the time required to decrypt the different

blocks of cipher text.

a)logic attack

b)timing attack

c)birthday attack

d)none of the above

.In _____________ type of steganograhy technique selected letters of

printed or typewritten text are overwritten in pencil.

a)Character marking

b)Invisible ink

c)pin punctures

d)Typewriter correction ribbon

.In _____________ type of steganograhy technique small pin

punctures on selected letters are ordinarily not visible unless the paper

is held up in front of a light.

a)Character marking

b)Invisible ink

c)pin punctures

d)Typewriter correction ribbon