The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 2 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Good evening, I need assistance with the following multiple choice document. I appreciate your help; thank you!
1.   Symmetric encryption is used primarily to provide confidentiality
2.   Two of the most important applications of public-key encryption are digital signatures and key management.
3.   Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.
4.   The secret key is input to the encryption algorithm.
5.   Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits.
6.   Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data.
Â
MULTIPLE CHOICES QUESTIONS
7.   Which of the following ciphers is/are symmetric?
A. DES                                                         C. DES, Skytale and Caesar’s cipher
B. DES & Skytale                                         D. DES, Skytale, Caesar cipher and RSA
Â
8.   Which algorithm provides for key distribution but does not provide encryption or nonrepudiation?
A. Diffie-Hellman                                         C. RSA
B. ElGamal                                                   D. Elliptic Curve Crypto System (ECC)
Â
9.   Which type of cipher operates in real time on a single character or single bits of data
A. Block                                                       C. Stream
B. Rolling                                                      D. Continuous
Â
10. Which of the following is not one of the three types of access control?
           A. Administrative                                          C. Technical
           B. Personnel                                                D. Physical
Â
11. Which of the following is not one of the three types of user authentication?
           A. Something you remember                                  C. Something you are
           B. Something you know                              D. Something you have
Â
12. What is the weakest form of authentication?
     A. Password                                                 C. Facial Recognition
B. Retina Scans                                           D. Tokens
Â
13. Which of the following is not one of the primary categories of access control methods?
A. Discretionary                                           C. Role-based
B. Mandatory                                               D. Delegated
Â
14. Auditing is a __________ method of access control.
           A. Preventive                                               C. Administrative
           B. Technical                                                  D. Physical
Â
15. _________ is the granting of a right or permission to a system entity to access a system resource.
     A. Authorization                                            C. Authentication
     B. Control                                                     D. Monitoring
Â
16. A bank teller most likely fall under __________ access control.
     A. Discretionary                                            C. Role-based
     B. Mandatory                                                D. Rule-based
Â
17. __________ is the easiest and most common way of password attack used by pick off insecure passwords.
     A. Hybrid                                                      C. Brute-force
     B. Dictionary                                                 D. Man-in-the middle
Â
18. _____is not an example of single-sign-on service.
     A. RADIUS                                                 C. SESAME
B. Kerberos                                                   D. CryptoKnight
Â
19. ________is the most time-intensive time of password attack to attempt.
     A. Hybrid                                                       C. Brute-force
B. Plin-text                                                    D. Man-in-the middle
Â
20. Which of the following protocols transmits user names and passwords in clear-text
     A. SSH                                                          C. Telnet
B. HTTPS                                                     D. TFTP
Â
21. The failure to check the size of input stream deatined to temporary storage by programs could lead to__________
A.   Failover                                                    C. Buffer overflow
B.   Backdoor                                                D. Maintenance hook
Â
22. In addition to message authentication, a message digest also provides:
           A. Data integrity                                          C. Data confidentiality
B. Data availability                                       D. All of the above
Â
23. Which security model prevents a user from directly accessing data stored in the computer?
     A. Biba                                                         C. Bell-LaPadula
B. Clark-Wilson                                              D. Brewer Nash
Â
24. What document is similar to a standard but provides only broad guidance and recommendations?
     A. Policies                                                     C. Procedures
B. Guidelines                        D. Baselines
Â
25. Which of the followings can be used to protect confidentiality?
     A. CCTV                                                       C. checksums
B. Encryption                       D. RAID
Â
26. Jennifer has just downloaded a game form a peer-to-peer network. Although the game did seem to install, his computer now seems to act strangely. Her mouse now moves around by itself, URLs are opening without her assistance, and her webcam keeps turning itself on. Which of the following has happened?
A.   A Trojan horse was installed
B.   A logic bomb was installed
C.  A DDoS client was installed
D.  An email virus was installed
Â
27. Which of the following is considered a connection-oriented protocol?
a.   ICMP
b.   UDP
c.   TCP
d.   ARP
Â
28. Nickolas waited until his victim established a connection with the organization’s FTP connection. Then Nickolas executed a program that allowed him to take over the established session. What type of attack has taken place?
a.   Spoofing
b.   Session hijacking
c.   Password attack
d.   ARP redirection
Â
29. Which of the following is not a denial-of-service attack?
a.   Exploiting a flaw in a program to consume 100 percent of the CPU
b.   Sending malformed packets to a system, causing it to freeze
c.   Performing a brute-force attack against a known user account
d.   Sending thousands of emails to a single address
Â
30. Which one of the following cannot be achieved by a symmetric cryptosystem?
a.   Nonrepudiation
b.   Confidentiality
c.   Availability
d.   Key distribution
Answer Table
|
1 |
 |
|
2 |
 |
|
3 |
 |
|
4 |
 |
|
5 |
 |
|
6 |
 |
|
7 |
 |
|
8 |
 |
|
9 |
 |
|
10 |
 |
|
11 |
 |
|
12 |
 |
|
13 |
 |
|
14 |
 |
|
15 |
 |
|
16 |
 |
|
17 |
 |
|
18 |
 |
|
19 |
 |
|
20 |
 |
|
21 |
 |
|
22 |
 |
|
23 |
 |
|
24 |
 |
|
25 |
 |
|
26 |
 |
|
27 |
 |
|
28 |
 |
|
29 |
 |
|
30 |
 |
Â
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly