Security Nca 6th Sem
Security Nca 6th Sem
Security Nca 6th Sem
Q.7 In Handshake protocol action, which is the last step of the phase 2:
Server Authentication and key exchange.
(A) Server_done
(B) Server_key_exchange
(C) Certificate_request
(D) Certificate_verify
Q.8 In the SSL protocol, each upper layer message is fragmented into a
maximum of ____ bytes.
(A) 216
(B) 232
(C) 214
(D) 212
Q.10 IPsec in the _____ mode does not protect the IP header .
(A) Transport
(B) Tunnel
(C) Either (A) or (B)
(D) Neither (A) or (B)
Q.11 ______ uniquely identifies the MIME entities uniquely with reference to
multiple contexts .
(A) Content description
(B) Content_ID
(C) Content Type
(D) Content transfer encoding
Q.13 The Subject unique identifier of the X.509 certificate was added in
which version.
(A) 1
(B) 2
(C) 3
(D) 4
Q.14 The main difference between MAC and digital signature is that , In
digital signature the hash value of the message is encrypted with the user’s
(A) Public Key
(B) Private Key
(C) We can use any key
(D) None of the above
Q.15 Internet Key Exchange Creates security association for
(A) SSL
(B) PGP
(C) IPsec
(D) VP
Q.24 Which protocol is used for the purpose of copying the pending state into
the current state ?
(A) Alert protocol
(B) Handshake protocol
(C) Upper-layer protocol
(D) Change cipher spec protocol
Q.3 Which of the following are the programs that copy themselves
throughout a computer or a network.
(A) Worms
(B) Trojans
(C) Viruses
(D) Rootkits
Q.9 Which Malware are often the armies behind today’s Distributed Denial-
of-Services (DDoS) Attacks?
(A) Botnets
(B) BotnetsSpyware
(C) Trojans
(D) Viruses
Q.15 In mid-1981, the 1st virus for apple computers with the name ________
came into existence.
(A) Apple I
(B) Apple II
(C) Apple III
(D) Apple Virus
Q.16 The virus hide himself from getting detected by _______ different ways.
(A) 2
(B) 3
(C) 4
(D) 5
Q.17 _________ infects the master boot record and it is challenging and a
complex task to remove this virus.
(A) Boot Sector virus
(B) Polymorphic
(C) Multipartite
(D) Trojans
Q.18 __________ gets installed and stays hidden in your computers memory.
It stays involved to the specific types of files which is infects.
(A) Boot sector Virus
(B) Direct Action Virus
(C) Polymorphic Virus
(D) Multipartite Virus
Q.19 Direct Action Virus is also known as____________
(A) Non-Resident Virus
(B) Boot Sector Virus
(C) Polymorphic Virus
(D) Multipartite Virus
Q.22 Which of the below-mentioned reasons does not satisfy the reason why
people create a computer virus.
(A) Research Purpose
(B) Pranks
(C) Identity Theft
(D) Protection
Q.6 The issuer unique identifier of the X.509 certificates was added in which
version?
(A) 1
(B) 2
(C) 3
(D) 4
Q.10 How many handshake rounds are required in the Public-Key Distribution
Scenario?
(A) 7
(B) 5
(C) 3
(D) 4
Q.11 Certificate extensions fall into 3 categories. Which one of the following is
not a Certificate extensions category?
(A) Subject and Issuer attributes
(B) Key and Policy information
(C) Certification Path Constraints
(D) All of the above are Certificate Extensions Categories
Q.14 Which of the following public key distribution systems is most secure?
(A) Public Key certificates
(B) Public Announcements
(C) Publicly Available Directories
(D) Public Key Authority
Q.17 Publicly Available directory is more secure than which other system?
(A) Public Key certificates
(B) Public Announcements
(C) Public Key Authority
(D) None of the Mentioned
Q.7 These three ciphers can operate of ______ of plaintext and cipher text
(A) 128 bit blocks
(B) 64 bit blocks
(C) 256 bit blocks
(D) 156 bit blocks
Q.1 In the SSLv3 the padding bits are _______ with the secret key.
(A) Padded
(B) XORed
(C) Concatenated
(D) ANDed
Q.2 Which of the following is not a valid input to the PRF in SSLv3?
(A) Secret value
(B) Identifying level
(C) Initialization vector
(D) Secret value
Q.7 An HTTP Connection uses port______ whereas HTTPS uses port ______
and invokes SSL.
(A) 40;80
(B) 60;620
(C) 80;443
(D) 620;80
Q.9 Which layer divides each message into packets at the source and re-
assembles them at the destination?
(A) Network layer
(B) Transport layer
(C) Data link layer
(D) Physical layer
Q.10 Basic data transfer, Reliability, flow control, Error Control, multiplexing,
connection control, precedence and security are functions of which layer.
(A) Data link layer
(B) Application layer
(C) Network layer
(D) Transport layer
Q.12 Transport layer may be responsible for process to process delivery of the
(A) Message
(B) Address of message
(C) Few Packets of Message
(D) Partial Message
Q.14 To uses the services of the UDP we need ______ socket addresses.
(A) Four
(B) Two
(C) Three
(D) Five
Q.7 The _____ cipher reorders the plain text characters to create a ciphertext.
(A) Substitution
(B) Transportation
(C) either (a) or (b)
(D) neither (a) or (b)
Q.9 DES has an initial and final permutation block and ______ rounds.
(A) 14
(B) 15
(C) 16
(D) none of the above
Q.11 DES uses a key generator to generate sixteen __________ round keys.
(A) 32-bit
(B) 48-bit
(C) 54-bit
(D) 42-bit
Q.12 ______ DES was designed to increase the size of the DES key.
(A) Double
(C) Triple
(C) Quadruple
(D) None of the above
Q.13 ________ is the round cipher based on the Rijndael algorithm that uses
a 128-bit block of data.
(A) AEE
(B) AED
(C) AER
(D) AES
Q.17 The ______ method provides a one time session key for two parties.
(A) Diffie-Hellman
(B) RSA
(C) DES
(D) AES
Q.28 ______ is the science and art of transforming message to make them
secure and immune to attacks.
(A) cryptography
(B) Calligraphy
(C) Cryptanalysis
(D) None of the above
Q.29 In symmetric-key cryptography, the key locks and unlocks the box is
(A) shared
(B) same
(C) Private
(D) Public
Q.44 Security features that control that can access resources in the OS.
(A) Authentication
(B) Identification
(C) Validation
(D) Access control
Q.49 Which of the following network devices is used to filter and forward
network traffic based on MAC addresses?
(A) Router
(B) Hub
(C) Switch
(D) Repeater
Q.51 Which of the following is a protocol used to securely transfer files over
the internet?
(A) Telnet
(B) FTP
(C) SMTP
(D) SFTP
Q.56 Which of the following is a protocol used to secure web traffic over the
internet?
(A) HTTPS
(B) FTPS
(C) SFTP
(D) SMTPS
Q.57 Which of the following is a type of attack in which an attacker sends a
flood of ICMP packets to a target network?
(A) Ping of death
(B) SYN flood
(C) Smurf Attack
(D) Teardrop Attack
Q.59 Which of the following is a type of firewall that examines the state of
network connections to determine whether to allow or block traffic?
(A) Packet filtering firewall
(B) Stateful inspection firewall
(C) Application firewall
(D) Network address translation firewall
Q.64 Which of the following is a type of firewall that examines the content of
network traffic to block traffic that matches specific patterns or signatures?
(A) Packet filtering firewall
(B) Stateful inspection firewall
(C) Application firewall
(D) Intrusion detection firewall
Q.65 Which of the following is a type of encryption that uses the same key for
both encryption and decryption?
(A) Symmetric encryption
(B) Asymmetric encryption
(C) Hashing
(D) Digital signature
Q.70 Which of the following is a type of security mechanism that uses a set of
rules to control access to network resources based on the identity of the user
or device?
(A) Access control list
(B) Intrusion prevention system
(C) Antivirus software
(D) Firewall
Q.72 Which of the following is a type of encryption that uses two keys, a
public key and a private key, to encrypt and decrypt data?
(A) Symmetric encryption
(B) Asymmetric encryption
(C) Hashing
(D) Digital signature
Q.73 Which of the following is a type of security mechanism that uses
machine learning and statistical analysis to detect and block attacks in real
time?
(A) Intrusion detection system
(B) Intrusion prevention system
(C) Antivirus software
(D) Firewall
Q.76 Which of the following is a type of encryption that uses the same key to
encrypt and decrypt data?
(A) Symmetric encryption
(B) Asymmetric encryption
(C) Hashing
(D) Digital signature
Q.77 Which of the following are forms of malicious attack?
(A) Theft of information
(B) Modification of data
(C) wiping of information
(D) All of the mentioned
Q.83 Why does Light Directory Access Protocol (LDAP) doesn’t store?
(A) Users
(B) Address
(C) Passwords
(D) Security Keys
Q.84 _______ can decrypt traffic to make it available to all other network
security functions such as web proxies.
(A) SSL visibility appliances
(B) RSA appliances
(C) Rodriguez cipher system
(D) Standard cipher system
Q.85 How many bits of message does the secure hash algorithm produce ?
(A) 160 bits
(B) 1035 bits
(C) 621 bits
(D) 3761 bits
Q.94 Confusion hides the relationship between the ciphertext and the plain
text .
(A) True
(B) False
Q.102 In which cipher each letter of the plain text is substituted by any other
letter to form the cipher message ?
(A) Shift cipher
(B) DES encryption
(C) Block cipher
(D) AES encryption
Q.103 When the DNS server accepts and uses incorrect information from a
host that has no authority giving that information , then it is called
(A) DNS lookup
(B) DNS hijacking
(C) DNS spoofing
(D) None of the mentioned
STEGANoGRAPHy
1. _____________ is another data hiding technique which can be used in conjunction
with cryptography for the extra-secure method of protecting data.
a) Cryptography
b) Steganography
c) Tomography
d) Chorography
2. _____________ is hiding of data within data, where we can hide images, text, and
other messages within images, videos, music or recording files.
a) Cryptography
b) Tomography
c) Steganography
d) Chorography
8. The main motive for using steganography is that hackers or other users can hide a
secret message behind a ______________
a) special file
b) ordinary file
c) program file
d) encrypted file
9. People will normally think it as a normal/regular file and your secret message will
pass on without any _______________
a) suspicion
b) decryption
c) encryption
d) cracking
10. By using ______________ you can diminish the chance of data leakage.
a) Cryptography
b) Tomography
c) Chorography
d) Steganography
4. In the DES algorithm, although the key size is 64 bits only 48bits are used for the
encryption procedure, the rest are parity bits.
a) True
b) False
5. In the DES algorithm the round key is __________ bit and the Round Input is
____________bits.
a) 48, 32
b) 64,32
c) 56, 24
d) 32, 32
6. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via
____________
a) Scaling of the existing bits
b) Duplication of the existing bits
c) Addition of zeros
d) Addition of ones
8. The number of unique substitution boxes in DES after the 48 bit XOR operation are
a) 8
b) 4
c) 6
d) 12
9. In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every
4th bit.
a) True
b) False