Cryptography - 1
Description: Cryptography basics Computer Science & Information Technology - CS | |
Number of Questions: 15 | |
Created by: Jatin Goyal | |
Tags: Cryptography basics Computer Science & Information Technology - CS |
A confidential email message sent by user A to user B, which is accessed by user C without the permission or knowledge of A and B. This type of attack is called
Which of the following statements is/are true about Network Level Attack? i. This attack generally makes an attempt to either slowdown or completely bring to halt an computer network. ii. It can automatically lead to application level attack. iii. Virus can cause network level attack only.
An unauthorized user X sends too many login requests to a server Susing random user id's one after other in quick succession, so as to flood the network and deny the network access of all other legitimate users.
Which of the following statements is/are not true about passive attack? i. Attacker tries to modify data. ii. Attacker aims to obtain information that is in transit. iii. Passive attack is easier to detect.
Which of the following are forms of active attack? i. Interruption ii. Masquerade iii. Fabrication iv. Eavesdropping
An unauthorised user X sends too many login requests to a server S using random user ids one after another in quick succession, so as to flood the network and deny the network access of all other legitimate users. What is this type of attack is called?
Which of the following statements is/are NOT true about worm? i. It replicates itself again and again. ii. It performs destructive actions. iii. It is a piece of program code that attaches itself to legitimate program code and runs when the legitimate program runs.
Which of the following principles ensures that only the sender and the intended recipient(s) has/have access to the content of the message?
Which of the following replicate(s) itself by creating its own copies?
Which of the following are the basic security principles related to a message? i. Integrity ii. Confidentiality iii. Authentication iv. Non-repudiation v. Availability vi. Fabrication
A person who attempts to break a cipher text message to obtain the original plain text message is called
Applets and ActiveX controls are ________
An attack on cipher text in which the attacker attempts to use all possible permutations and combinations is called
In a certain encoding technique HELLO is replaced by JGNNQ and HELL is replaced by IFMM. Which type of substitution cipher has been used here?
Match the following tables ||| |---|---| |Table A|Table B| |1. Interception|A. Authentication| |2. Fabrication|B. Integrity| |3. Modification|C. Availability| |4. Interruption|D. Confidentiality|
Which of the following principles of security has been used in this case?
Let us assume a person A wants to send a check of $100 to B. A writes a check of $100 and deposited in B's account, the money is transferred from A's account to B's account, and then A refuses having sent the check. The court of law will use A's signature to disallow A to refuse the claim and settle the dispute.