You are on page 1of 3

1. Which is not an objective of network security?

a) Identification b) Authentication
c) Access control d) Lock
2. Which of these is a part of network identification?
a) UserID b) Password
c) fingerprint d) OTP
3. What will be called any event or software that can damage computer system?
a) Threat b) Intruder
c) Virus d) None
4. Who has better knowledge of organization's IT environment?
a) Intruders b) Criminal Organizations
c) Insiders d) Contractors
5. In which attack connection session is hijacked to gain unauthorized access to
system?
a) DOS b) Man in Middle attack
c) Spoofing d) Sniffing
6. Which of the following attack is a type of social engineering attack?
a) Man in the middle b) Phishing
c) Spoofing d) Sniffing
7. _______ gets executed when certain conditions occur?
a) Trojan Horse b) Logic Bomb
c) Auto Rooter d) Virus
8. In which of following step, information of the organization is collected?
a) Vulnerability Researching b) Scanning
c) Reconnaissance d) None
Explanation: Foot printing (also known as reconnaissance) is the technique used for gathering information
about computer systems and the entities they belong to. ...
9. Which of the following is used to send large numbers of unwanted emails?
a) Trojan Horse b) Zombie
c) Logic Bomb d) Spammer
10. Which of following attack does send fake SYN packets to target system?
a) DOS b) Sniffing
c) Trapdoor d) None
11. __________ will not allow unauthorized modification of information?
a) Integrity b) Availability
c) Confidentiality d) None
12. Which of the following will not allow unauthorized information access?
a) Authentication b) Availability
c) Confidentiality d) None
13. The process of verifying the identity of a user.
a) Authentication b) Identification
c) Validation d) Verification
14. Security features that control that can access resources in the OS.
a) Authentication b) Identification
c) Validation d) Access control
15. An algorithm in encryption is called _____________
a) Algorithm b) Procedure
c) Cipher d) Module
16. The information that gets transformed in encryption is ____________
a) Plain text b) Parallel text
c) Encrypted text d) Decrypted text
17. SHA-1 has a message digest of ______
a) 512 bits b) 160 bits
c) 256 bits d) 1024 bits
18. A hash function guarantees the integrity of a message. It guarantees the message has not been
__________
a) Violated b) Replaced
c) Changed d) Overview
19. In Message Confidentiality, the transmitted message must make sense to only intended .
a) Sender b) Receiver
c) Translator d) None
20. Use Caesar’s Cipher to decipher the following
HQFUBSWHG WHAW
a) ABANDONED LOCK b) ENCRYPTED TEXT
c) ABANDONED TEXT d) ENCRYPTED LOCK
21. Caesar Cipher is an example of
a) Poly-alphabetic Cipher b) Mono-alphabetic Cipher
c) Multi-alphabetic Cipher d) Bi-alphabetic Cipher
22. On Encrypting “cryptography” using Vignere Cipher System using the keyword “LUCKY” we get
cipher text
a) nlazeiibljji b) nlazeiibljii
c) olaaeiibljki d) mlaaeiibljki
Explanation: Cipher text:= Ci = Pi + ki mod m (mod 26).
23. Which of the following is difficult to detect?
a) Passive Attack b) Active Attack
24. The DES algorithm has a key length of
a) 128 Bits b) 32 Bits
c) 64 Bits d) 16 Bits
25. When a hash function is used to provide message authentication, the hash function value is referred to
as
a) Message Field b) Message Digest
c) Message Score d) Message Leap
26. Which one of the following is not an application hash functions?
a) One-way password file b) Virus Detection
c) Intrusion detection d) Key wrapping
27. Modification in IP packet with fake IP address will be called as _______
a) DDos b) Sniffing
c) Phishing d) Spoofing

You might also like