Sample questions

Q1. Cryptographic algorithms would include all of the these except?

  1. Data Encryption Standard
  2. Advanced Encryption Standard
  3. Transport Layer Security
  4. Message Digest Algorithm

Q2. Which one of the following is called a crypto variable?

  1. Plain Text
  2. Cipher Text
  3. Cipher
  4. Cryptographic Key

Q3. Identify the best explanation from the following for a digital signature?

  1. Applying senders private key to the message
  2. Applying senders public key to the message
  3. Applying receivers private key to the message
  4. Applying receivers public key to the message

Q4. When a specific key is authorized for use by legitimate entities, and that usage is based on time, it is known as what?

  1. Cryptanalysis
  2. Cryptography
  3. Crypto period
  4. Key usage

Q5. Which one of the following is a type of cryptanalytic attack?

  1. Chosen image
  2. Chosen plaintext
  3. Adaptive image parameter
  4. Adaptive plain-cipher text

Q6. Which one of the following is an application of IPSec?

  1. Wireless Application Protocol
  2. Virtual Private Networking
  3. S/MIME
  4. Social engineering

Q7. An image file downloaded from the Internet conceals a secret code. Such a method of concealing information is known as what?

  1. Message hiding
  2. Message docking
  3. Steganography
  4. Watermarking

Q8. A birthday attack is a cryptographic attack and is used to guess a random input data. Which one of the following mathematical probability theories provides basis for such an attack?

  1. There is a chance that more than 50% of randomly chosen people in a group of 23 may have the same birthday
  2. There is a chance that less than 50% of randomly chosen people in a group of 23 may have the same birthday
  3. There is a chance that 50% of randomly chosen people in a group of 23 may have the same birthday
  4. There is a chance that more than 80% of randomly chosen people in a group of 23 may have the same birthday

Q9. Which of the following encryption standards is proposed as an official successor of the Data Encryption Standard (DES)?

  1. Triple-DES
  2. Advance Encryption Standard (AES)
  3. Blowfish
  4. Twofish

Q10. Which of the following choices are true statements pertaining to cryptographic algorithms?

Sample questions
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.250.11