0

Cryptography - 1

Description: Cryptography basics Computer Science & Information Technology - CS
Number of Questions: 15
Created by:
Tags: Cryptography basics Computer Science & Information Technology - CS
Attempted 0/15 Correct 0 Score 0

A confidential email message sent by user A to user B, which is accessed by user C without the permission or knowledge of A and B. This type of attack is called

  1. interception

  2. fabrication

  3. modification

  4. spoofing

  5. none of these


Correct Option: A
Explanation:

This type of attack is called interception.

Which of the following statements is/are true about Network Level Attack? i. This attack generally makes an attempt to either slowdown or completely bring to halt an computer network. ii. It can automatically lead to application level attack. iii. Virus can cause network level attack only.

An unauthorized user X sends too many login requests to a server Susing random user id's one after other in quick succession, so as to flood the network and deny the network access of all other legitimate users.

  1. only i

  2. only ii

  3. i and iii

  4. ii and iii

  5. i and ii


Correct Option: E
Explanation:

Both i and ii are correct statements. 

Which of the following statements is/are not true about passive attack? i. Attacker tries to modify data. ii. Attacker aims to obtain information that is in transit. iii. Passive attack is easier to detect.

  1. i

  2. ii

  3. iii

  4. i and iii

  5. i, ii and iii


Correct Option: D
Explanation:

Both statements are incorrect about passive attack.

Which of the following are forms of active attack? i. Interruption ii. Masquerade iii. Fabrication iv. Eavesdropping

  1. i and ii

  2. ii and iii

  3. iii and iv

  4. i, ii and iv

  5. i, ii and iii


Correct Option: E
Explanation:

These all are active attacks.

An unauthorised user X sends too many login requests to a server S using random user ids one after another in quick succession, so as to flood the network and deny the network access of all other legitimate users. What is this type of attack is called?

  1. Masquearade

  2. Denial Of Services (DOS)

  3. Alteration of message

  4. Eavesdropping

  5. Interception


Correct Option: B
Explanation:

This is an example of DOS attack. DOS attacks make an attempt to prevent users from accessing some services, which they are eligible for.

Which of the following statements is/are NOT true about worm? i. It replicates itself again and again. ii. It performs destructive actions. iii. It is a piece of program code that attaches itself to legitimate program code and runs when the legitimate program runs.

  1. i

  2. ii

  3. iii

  4. i and iii

  5. ii and iii


Correct Option: E
Explanation:

Both the statements are false about worm.

Which of the following principles ensures that only the sender and the intended recipient(s) has/have access to the content of the message?

  1. Confidentiality

  2. Authentication

  3. Integrity

  4. Access control

  5. None of these


Correct Option: A
Explanation:

Principle of confidentiality specifies that only the sender and the intended recipient(s) should be able to access the content of the message.

Which of the following replicate(s) itself by creating its own copies?

  1. Virus

  2. Worm

  3. Trojan horse

  4. 1 and 3

  5. 1, 2 and 3


Correct Option: D
Explanation:

ii replicates itself and so does iii.

Which of the following are the basic security principles related to a message? i. Integrity ii. Confidentiality iii. Authentication iv. Non-repudiation v. Availability vi. Fabrication

  1. i, ii and iii

  2. ii, iii and iv

  3. ii, iii, iv and v

  4. i, ii, iii and iv

  5. all are principles of security


Correct Option: D
Explanation:

All the four are principles of security.

A person who attempts to break a cipher text message to obtain the original plain text message is called

  1. cryptographer

  2. cryptanalyst

  3. cryptanalysis

  4. cryptography

  5. none of these


Correct Option: B
Explanation:

Person who breaks cipher text back into plain text is called a cryptanalyst.

Applets and ActiveX controls are ________

  1. both client side programs

  2. both server side programs

  3. both database programs

  4. client side and server side programs

  5. server side and client side programs


Correct Option: A
Explanation:

Sun Microsystems provides Java applets and Microsoft Technology provides ActiveX. Both are small programs that get downloaded along with a Web page and execute on the client side.

An attack on cipher text in which the attacker attempts to use all possible permutations and combinations is called

  1. Cryptanalysis

  2. Rain Fence Technique

  3. Man in Middle Attack

  4. Brute-force attack

  5. Steganography


Correct Option: D
Explanation:

An attack on a cipher text message, wherein the attacker attempts to use all possible permutation and combination is called Brute-force attack. 

In a certain encoding technique HELLO is replaced by JGNNQ and HELL is replaced by IFMM. Which type of substitution cipher has been used here?

  1. Polygram Substitution Cipher

  2. Caesar cipher

  3. Mono-alphabetic Cipher

  4. Homophonic Substitution Cipher

  5. None of these


Correct Option: A
Explanation:

In polygran substitution cipher, rather than replacing one plain text alphabet with onr cipher text alphabet at a time, a block of alphabets is replaced with another block.

Match the following tables ||| |---|---| |Table A|Table B| |1. Interception|A. Authentication| |2. Fabrication|B. Integrity| |3. Modification|C. Availability| |4. Interruption|D. Confidentiality|

  1. 1 - A, 2 - D, 3 - B, 4 - C

  2. 1 - D, 2 - A, 3 - B, 4 - C

  3. 1 - A, 2 - B, 3 - C, 4 - D

  4. 1 - D, 2 - C, 3 - B, 4 - A

  5. 1 - D, 2 - A, 3 - C, 4 - B


Correct Option: B
Explanation:

This is the appropriate matching of principles of security and types of attack.

Which of the following principles of security has been used in this case?

Let us assume a person A wants to send a check of $100 to B. A writes a check of $100 and deposited in B's account, the money is transferred from A's account to B's account, and then A refuses having sent the check. The court of law will use A's signature to disallow A to refuse the claim and settle the dispute.

  1. Confidentiality

  2. Integrity

  3. Non-repudiation

  4. Authentication

  5. None of these


Correct Option: C
Explanation:

Non-repudiation disallows A to refuse this claim that he had not written the check.

- Hide questions