Professional Documents
Culture Documents
Answer: c
Explanation: PGP uses many encryption techniques such as private key cryptosystem
and also public key cryptosystem.
Answer: b
Explanation: Public key cryptosystem is used for encryption of messages and private
key cryptosystem is used for encryption of messages.
Answer: c
Explanation: The block ciphers IDEA and CAST has key length of 128 bits where as
Triple-DES has key size of 168 bits.
Answer: c
Explanation: The two algorithms used for public key encryption in PGP are RSA and
Diffie-Hellman algorithms.
Answer: b
Explanation: The recipient should first decrypt the message using private key and then
with the public key.
Answer: a
Explanation: In hash function the output length is fixed and it is easy to compute.
8. An asymmetric-key (or public_ cipher) uses
a) 1 key
b) 2 key
c) 3 key
d) 4 key
20. Which one of the following is a file transfer protocol using SSH?
a) SCP
b) SFTP
c) Rsync
d) All of the mentioned
Answer: d
Explanation: SCP (Secure copy protocol), SFTP (SSH File Transfer Protocol) and Rsync all
are file transfer protocols which are used by SSH.
28. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
Answer: c
Explanation: In DNS spoofing, also known as DNS cache poisoning, an attacker gets the
valid credentials from a victim by spoofing the intended resource, and tricking the
victim to give his/her valid authorization credentials.
29) Which of the following is a mode of operation for the Block ciphers in
cryptography?
30) Which of the following options is not correct according to the definition of the
Cipher Block Chaining (CBC)?
31) Which of the following modes of operations can be followed for both stream
ciphers as well as block ciphers?
a. 512 bits
b. 1024 bits
c. 2048 bits
d. None of the above
33) Which one of the following can be considered as the class of computer threats?
a. Dos Attack
b. Phishing
c. Soliciting
d. Both A and C
34) It can be a software program or a hardware device that filters all data packets
coming through the internet, a network, etc. it is known as the_______:
a. Antivirus
b. Firewall
c. Cookies
d. Malware
36) Which of the following are famous and common cyber-attacks used by hackers to
infiltrate the user's system?
a. Security
b. Longevity
c. Reliability
d. Performance
38) In the computer networks, the encryption techniques are primarily used for
improving the ________
a. Security
b. Performance
c. Reliability
d. Longevity
39. One of the protocols to provide security at the application layer is?
a) Pretty good Privacy
b) handshake protocol
c) Alert Protocol
d) Record
40. With reference to stream ciphers, the output of the generator is called?
a) Key Stream
b) Key Length
c) Re-seed Interval
d) Byte Stream
41. In the digital signature technique when the whole message is signed using
an asymmetric key, the receiver of the message uses _______ to verify the
signature.
a) the sender public key
b) her or his own public key
c) her or his own private key
d) none of them
42. . . . IP Security (IPSec) is a collection of protocols designed by the
IETF (Internet Engineering Task Force) to provide security for a packet at
the _________ level.
a) Network
b) data link
c) transport
d) none of them
44. In symmetric-key cryptography, the key used by the sender and the receiver is
a) Shared
b) Different
c) Two keys are used
d) Same keys are used