Computer Hardware and Networking MCQ Quiz Hub

Information and Network Security Set 1

Choose a topic to test your knowledge and improve your Computer Hardware and Networking skills

1. An algorithm in encryption is called _____________.




2. The information that gets transformed in encryption is ____________.




3. In brute force attack, on average half of all possible keys must be tried to achievesuccess.




4. A (n) ______ algorithm transforms ciphertext to plaintext.




5. The ________ is the message after transformation.




6. Which of the following is not a type of virus?




7. A computer ________ is a malicious code which self-replicates by copying itself to otherprograms.




8. __________ infects the master boot record and it is challenging and a complex task toremove this virus.




9. _______ infects the executable as well as the boot sectors.




10. Trojan creators do not look for _______________.




11. Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system.




12. During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted.




13. The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website.




14. In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware.




15. Trojan creators do not look for _________




16. When one participant in a communication pretends to be someone else, it is called_________?




17. _____ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.




18. Compromising confidential information comes under _________.




19. When an attacker sends unsolicited communication, it is an example of_____.




20. Masquerading is _______.




21. Integrity is protection of data from all of the following except ____




22. A security program cannot address which of the following business goals?




23. The absence of a fire-suppression system would be best characterized as_______.




24. Asymmetric key cryptography is used for all of the followingexcept_______




25. Firewalls are to protect against________.




26. The first computer virus is__________.




27. ___ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.




28. From the options below, which of them is not a vulnerability to information security?




29. Possible threat to any information cannot be ________________.




30. A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase.




31. ____________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa.




32. When plain text is converted to unreadable format, it is termed as _____




33. __ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.




34. Cryptography can be divided into ______ types.




35. Data which is easily readable & understandable without any special algorithm ormethod is called _____________




36. Plain text are also called _____________.




37. There are ________ types of cryptographic techniques used in general.




38. Conventional cryptography is also known as _____________ or symmetric-keyencryption.




39. Data Encryption Standard is an example of a _____________ cryptosystem.




40. ____ Cryptography deals with traditional characters, i.e., letters & digits directly.




41. ________ Cryptography operates on binary-bit series and strings.




42. _____ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.




43. _______ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.




44. n Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.




45. ___________ employs a text string as a key that is implemented to do a series ofshifts on the plain-text.




46. The ________________ has piece of the keyword that has the same length as that of theplaintext.




47. In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.




48. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.




49. The procedure to add bits to the last block is termed as _______________




50. Which of the following is not an example of a block cipher?




51. DES stands for ________________.




52. ____ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.




53. AES stands for ________________.




54. AES is at least 6-times faster than 3-DES.




55. ___________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.




56. ______ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.




57. Steganography follows the concept of security through obscurity.




58. The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.




59. Which of the following is not a steganography tool?




60. Which of the following is not a steganography tool?