Security Multiple-Choice Questions
Security Multiple-Choice Questions
A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
3. What are the types of threats to the security of a computer system or a network?
A. Interruption
B. Interception
C. C Modification
D. Creation
E. Fabrication
4. Which of the following programs is a standalone malicious program that does not require
no other program?
A. Trap Door
B. Trojan Horse
C. Virus
D. See
A. Trap door
B. Trojan Horse
C. Logical bomb
D. Virus
A. Trap door
B. Trojan Horse
C. Logical bomb
D. Virus
7. Which of the following malicious programs does not replicate automatically?
A. Trojan Horse
B. Virus
C. See
D. Zombie
A. Stealth Virus
B. Polymorphic virus
C. Virus parasite
D. Macro virus
A. True
B. False
A. True
B. False
1. ______ is a program that can infect other programs by modifying them. This
Modification includes a copy of the viral program, which can then infect other programs.
To see
B. Virus
C. Zombie
D. Trap doors
A. See
B. Virus
C. Zombie
D. Trojan Horse
3. The type of encoding in which the manipulation of bit streams is done without regard to the
The meaning of bits is called _________?
A. Destination coding
B. Entropy coding
C. Source Coding
D. Differential coding
A. POP
B. PGP
C. SNMP
D. HTTP
A. Cryptology
B. Cryptography
C. Cryptanalysis
D. Encryption
A. 54
B. 48
C. 52
D. 50
A. 4
B. 8
C. 16
D. 32
A. RSA
B. DES
C. IREA
D. RC5
A. C = (p + 3) mod3
B. C = (p + 26) mod 3
C. C = (p - 3) mod 26
D. C = (p + 3) mod 26
IT Security Quiz - Part 3
The ______ attaches to executable files and replicates when the infected program is
executed, by searching for other executable files to infect.
2. The number of rounds in the DES (Data Encryption Standard) algorithm is ______?
A. 8 tours
B. 12 tours
C. 16 tours
D. 24 tours
3. ________ transforms the message into a format that cannot be read by hackers.
A. Decryption
B. Encryption
C. Transformation
D. None of these answers are true.
A. 43
B. 443
C. 445
D. 444
A. Session layer
B. Network layer
Transport layer
D. Presentation layer
6. What is the key exchange algorithm used in the parameters of a cryptographic suite (Cipher
Suite)?
A. RSA
B. Fixed Diffie-Hellman
C. Ephemeral Diffie-Hellman
D. All the answers are true
The certificate message is required for any agreed key exchange method, except
A. Ephemeral Diffie-Hellman
B. Anonymous Diffie-Hellman
C. Fixed Diffie-Hellman
D. RSA
8. What are the types of threats to the security of a computer system or network?
A. Interruption
B. Interception
C. Modification
D. Creation
E. Fabrication
A. Routing
Security
C. The tunneling
D. Congestion control
10. _________ is used to validate the identity of the message sender to the recipient.
A. Encryption
B. Decryption
C. Digital certificate
D. None of these answers is true.
1. When you log into an online service, you are prompted to provide some sort
of identification, such as your name, account number, and password. What is the name given
to this brief dialogue?
A. Security procedure
B. Connection Procedure
C. Backup procedure
D. Identification procedure
A. MD5
B. SHA-2
C. SHA-1
D. Does not use a hashing algorithm
A. Stealthy virus
B. Polymorphic virus
C. Virus parasite
D. Macro virus
4. A part of the polymorphic virus, generally called ________, creates random encryption.
and a key allowing to encrypt the rest of the virus.
A. Mutual motor
B. Mutation engine
C. Multiple engine
D. Polymorphic engine
A. True
B. False
A. True
B. False
To see
B. Zombie
C. Virus
D. Trap doors
A. MD5
B. SHA-1
C. MD5 and SHA-1
D. Trap doors
A
B. Certificate creation
C. Certificate_exchange
D.
10. What is the size of an RSA signature after the MD5 and SHA-1 processing?
A. 42 bytes
B. 32 bytes
C. 36 bytes
D. 48 octets