Home
MCQS
Computer Hardware and Networking MCQ Quiz Hub
Information and Network Security Set 1
Choose a topic to test your knowledge and improve your Computer Hardware and Networking skills
1. An algorithm in encryption is called _____________.
Algorithm
Procedure
Cipher
Module
2. The information that gets transformed in encryption is ____________.
Plain text
Parallel text
Encrypted text
Decrypted text
3. In brute force attack, on average half of all possible keys must be tried to achievesuccess.
True
False
none
all
4. A (n) ______ algorithm transforms ciphertext to plaintext.
Encryption
Decryption
Either (a) or (b)
Neither (a) nor (b)
5. The ________ is the message after transformation.
Ciphertext
Plaintext
Secret-text
None of the above
6. Which of the following is not a type of virus?
Boot sector
Polymorphi
C Multipartite
Troj
7. A computer ________ is a malicious code which self-replicates by copying itself to otherprograms.
Program
Virus
Application
Worm
8. __________ infects the master boot record and it is challenging and a complex task toremove this virus.
Boot Sector Virus
Polymorphi
C Multipartite
Troj
9. _______ infects the executable as well as the boot sectors.
Non-resident virus
Boot Sector Virus
Polymorphic Virus
Multipartite Virus
10. Trojan creators do not look for _______________.
Deleting Data
Protecting Data
Modifying Data
Copying Data
11. Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system.
Virus, Cyber-Criminals
Malware, Penetration Testers
Trojans, Cyber-Criminals
Virus, Penetration Testers
12. During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted.
Network
System
Website
Router
13. The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website.
Phishing attack
DoS attack
Website attack
MiTM attack
14. In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware.
URL Redirection
DOS
Phishing
MiTM attack
15. Trojan creators do not look for _________
Credit card information
Confidential data
Important documents
Securing systems with such programs
16. When one participant in a communication pretends to be someone else, it is called_________?
Virus Attacks
Data Driven Attacks
Data Driven Attacks
Masquerade
17. _____ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.
Message Authentication Code
Steganography
Whale phishing
A cipher
18. Compromising confidential information comes under _________.
Bug
Threat
Vulnerability
Attack
19. When an attacker sends unsolicited communication, it is an example of_____.
Spoofing
Spamming
Crackers
Sniffers
20. Masquerading is _______.
Attempting to hack a system through backdoors to an operating system or application.
Pretending to be an authorized user
Always done through IP spoofing
Applying a subnet mask to an internal IP range
21. Integrity is protection of data from all of the following except ____
Unauthorized changes
Accidental changes
Data analysis
Intentional manipulation
22. A security program cannot address which of the following business goals?
Accuracy of information
Change control
User expectations
Prevention of fraud
23. The absence of a fire-suppression system would be best characterized as_______.
Exposure
Threat
Vulnerability
Risk
24. Asymmetric key cryptography is used for all of the followingexcept_______
Encryption of data
Access control
Nonrepudiation
Steganography
25. Firewalls are to protect against________.
Virus Attacks
Fire Attacks
Data Driven Attacks
Unauthorized Attacks
26. The first computer virus is__________.
The famous
HARLIE
PARAM
Creeper
27. ___ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.
Network Security
Database Security
Information Security
Physical Security
28. From the options below, which of them is not a vulnerability to information security?
Without deleting data, disposal of storage media
Latest patches and updates not done
Floo
D Unchanged default password
29. Possible threat to any information cannot be ________________.
Ignored
Protected
Transferre
D Reduced
30. A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase.
Security officer
Malicious hacker
Security auditor
Network analyst
31. ____________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa.
Malware Analysis
Exploit writing
Reverse engineering
Cryptography
32. When plain text is converted to unreadable format, it is termed as _____
Rotten text
Raw text
Cipher-text
Cipher
33. __ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
Malware Analysis
Cryptography
Reverse engineering
Exploit writing
34. Cryptography can be divided into ______ types.
4
2
7
3
35. Data which is easily readable & understandable without any special algorithm ormethod is called _____________
Cipher-text
Plain text
Raw text
Encrypted text
36. Plain text are also called _____________.
Encrypted text
Clear-text
Raw text
Cipher-text
37. There are ________ types of cryptographic techniques used in general.
2
3
4
5
38. Conventional cryptography is also known as _____________ or symmetric-keyencryption.
Secret-key
Public key
Protected key
Primary key
39. Data Encryption Standard is an example of a _____________ cryptosystem.
Conventional
Public key
Hash key
Asymmetric-key
40. ____ Cryptography deals with traditional characters, i.e., letters & digits directly.
Latest
Asymmetri
C Classic
Modern
41. ________ Cryptography operates on binary-bit series and strings.
Modern
Classi
C Traditional
Primitive
42. _____ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.
Polyalphabetic Cipher
Caesar Cipher
Playfair Cipher
Monoalphabetic Cipher
43. _______ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.
Rolling Cipher
Shift Cipher
Playfair Cipher
Block Cipher
44. n Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
Rolling Cipher
Shift Cipher
Playfair Cipher
Block Cipher
45. ___________ employs a text string as a key that is implemented to do a series ofshifts on the plain-text.
Shift Cipher
Block Cipher
Playfair Cipher
Vigenere Cipher
46. The ________________ has piece of the keyword that has the same length as that of theplaintext.
One-time pad
Hash functions
Vigenere Cipher
Block Cipher
47. In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.
Vigenere Cipher
Block Cipher
Stream cipher
One-time pad
48. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.
Hash functions
Vigenere Cipher
One-time pa
D Block Cipher
49. The procedure to add bits to the last block is termed as _______________
Padding
Hashing
Tuning
Decryption
50. Which of the following is not an example of a block cipher?
DES
Caesar cipher
Twofish
IDEA
51. DES stands for ________________.
Device Encryption Standard
Data Encrypted Standard
Data Encryption Security
Data Encryption Standard
52. ____ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.
Twofish
IDEA
DES
AES
53. AES stands for ________________.
Active Encryption Standard
Advanced Encrypted Standard
Advanced Encryption Standar
D Advanced Encryption Security
54. AES is at least 6-times faster than 3-DES.
True
False
none
all
55. ___________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.
Chorography
Tomography
Steganography
Cryptography
56. ______ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.
Steganography
Cryptography
Chorography
Tomography
57. Steganography follows the concept of security through obscurity.
True
False
none
all
58. The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.
Tomography
Chorography
Steganography
Cryptography
59. Which of the following is not a steganography tool?
Steghide
Reaper Exploit
Image steganography
Xaio steganography
60. Which of the following is not a steganography tool?
rSteg
Crypture
SteganographX Plus
Burp Suite
Submit