606u4 - Network Security
606u4 - Network Security
606u4 - Network Security
1 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
9. Which of the following describes someone who gains illegal access to a computer system?
A. Hacker
B. Identity thief
C. Intruder
D. Cyber-terrorist
ANSWER: A
11. Which of the following are used to provide computer security in businesses?
A. Digital signatures
B. Firewalls
C. Encryption
D. All of the above
ANSWER: D
12. Which of the following is/are methods of providing secure communication between two entities through
the use of mathematical coding?
A. Digital signature encryption
B. Public key encryption
C. Private key encryption
D. All of the above
ANSWER: B
13. Which of the following requires two keys - a public and private one - that are used by the sender and
receiver to encode a message?
A. Digital signature encryption
2 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
19. __________ are used in denial of service attacks, typically against targeted web sites.
A. Worm
B. Zombie
C. Virus
D. Trojan horse
ANSWER: B
20. Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant
phase iii)Execution phase iv) Triggering phase
A. i, ii, iii, and iv
3 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
B. i, iii, ii and iv
C. ii, i, iv and iii
D. ii, iii, iv and i
ANSWER: C
21. A _________attaches itself to executable files and replicates, when the infected program is executed,
by finding other executable files to infect.
A. Stealth virus
B. Polymorphic Virus
C. Parasitic Virus
D. Macro Virus
ANSWER: C
22. ______________ is a form of virus explicitly designed to hide itself from detection by antivirus
software.
A. Stealth virus
B. Polymorphic Virus
C. Parasitic Virus
D. Macro Virus
ANSWER: A
23. A _______ creates copies during replication that are functionally equivalent but have distinctly
different bit patterns.
A. Boot Sector Virus
B. Polymorphic Virus
C. Parasitic Virus
D. Macro Virus
ANSWER: B
24. A portion of the Polymorphic virus, generally called a ______, creates, a random encryption, key to
encrypt the remainder of the virus.
A. mutual engine
B. mutation engine
C. multiple engine
D. polymorphic engine
ANSWER: B
25. State whether the following statement is true. i) A macro virus is platform independent. ii) Macro
viruses infect documents, not executable portions of code.
A. i-only
B. ii-only
C. Both i and ii
D. Not i and ii
ANSWER: C
26. ______ is an encryption/decryption key known only to the party or parties that exchange secret
messages.
A. e-signature
B. digital certificate
C. private key
D. security token
4 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
ANSWER: C
27. _____ is the most widely used privacy-ensuring program by individuals and is also used by many
corporations which is developed by Philip R. Zimmermann.
A. DSS
B. OCSP
C. Secure HTTP
D. Pretty Good Privacy
ANSWER: D
28. _____ is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and
later Triple DES - over the next few years as the new standard encryption algorithm.
A. Rijndael
B. kerberos
C. blowfish
D. IPsec
ANSWER: A
29. ____ is a mode of operation for a block cipher, with the characteristic that each possible block of
plaintext has a defined corresponding ciphertext value and vice versa.
A. footprinting
B. hash function
C. watermark
D. electronic code block
ANSWER: D
30. ____ is a trial and error method used to decode encrypted data through exhaustive effort rather than
employing intellectual strategies.
A. chaffing and winnowing
B. cryptanalysis
C. serendipity
D. brute force cracking
ANSWER: D
5 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
C. 14
D. 16
ANSWER: D
6 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
ANSWER: A
46. __________ is a popular session key creator protocol that requires an authentication server and a
ticket-granting server.
A. KDC
B. Kerberos
C. CA
D. none of the above
ANSWER: B
7 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
50. A ________ signature is included in the document; a _______ signature is a separate entity.
A. conventional; digital
B. digital; digital
C. either a or b
D. either a or b
ANSWER: B
52. A(n) _____ can be used to preserve the integrity of a document or a message.
A. message digest
B. message summary
C. message confidentiality
D. none of the above
ANSWER: A
53. ____ means to prove the identity of the entity that tries to access the system's resources.
A. message authentication
B. entity authentication
C. message confidentiality
D. none of the above
ANSWER: B
54. _____ means that a sender must not be able to deny sending a message that he sent.
A. Confidentiality
B. integrity
C. authentication
D. none of the above
ANSWER: D
55. Message ___ means that the receiver is ensured that the message is coming from the intended sender,
8 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
not an imposter.
A. Confidentiality
B. integrity
C. authentication
D. none of the above
ANSWER: C
56. Message ____ means that the data must arrive at the receiver exactly as sent.
A. Confidentiality
B. integrity
C. authentication
D. none of the above
ANSWER: B
57. Message ____ means that the sender and the receiver expect privacy.
A. Confidentiality
B. integrity
C. authentication
D. none of the above
ANSWER: A
58. The bank ___________the customer's message after getting the email request for emoney.
A. integrate.
B. access.
C. authenticates.
D. non-repudiate.
ANSWER: C
9 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
63. ___________ substitution is a process that accepts 48 bits from the XOR operation.
A. S-box.
B. P-box.
C. Expansion permutations.
D. Key transformation.
ANSWER: A
65. DES consists of __________ rounds to perform the substitution and transposition.
A. 16.
B. 18.
C. 21.
D. 25.
ANSWER: A
10 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
D. RSA.
ANSWER: A
72. The processed S/MIME along with security related data is called as ________.
A. public key cryptography standard.
B. private key cryptography standard.
C. S/MIME.
D. MIME.
ANSWER: A
74. The number of rounds used for encryption in DES algorithm _____.
A. 48
B. 8
C. 16
D. 32
ANSWER: C
76. In DES, the plain text is _______ bits and the key is ____ bits in length.
A. 128,32
B. 64,16
C. 64,56
D. 256,32
ANSWER: C
11 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
79. If the key size is 56 than the time required to dercyption requires______.
A. 2.15 milliseconds
B. 10hrs
C. 3 hours
D. 13 seconds
ANSWER: B
80. The study of principles/methods of deciphering ciphertext without knowing key is known as ________.
A. code breaking
B. cryptanalysis
C. both a and b
D. decipher analysis
ANSWER: B
84. _______ prevents the normal use or management of communication facilities or degrade performance.
12 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
A. denial of services
B. masquerade
C. modification of messages
D. replay
ANSWER: A
85. When one entity pretends to be a different entity is a ________ type of active attacks.
A. replay
B. modification of messages
C. denial of services
D. masquerade
ANSWER: D
87. To prevent the opponent from learning the contents of message during transmissions is ________ type
of attack .
A. traffic analysis
B. system performance
C. release of message
D. active attack.
ANSWER: C
88. _____ attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
A. active attacks
B. passive attacks
C. both a and b
D. none of the above
ANSWER: B
91. An asset of the system is destroyed or becomes unavailable or unsuable. This type of attack is called as
_____.
13 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
A. Interception
B. Interruption
C. Non repudiation
D. Confidentiality
ANSWER: B
93. _______ ensures that the information in a computer system and transmitted information are accessible
only for reading by authorized parties.
A. Integrity
B. Availability
C. Non repudiation
D. Confidentiality
ANSWER: D
94. _____ requires that neither the sender nor the reciver of a message be able to deny the transmission.
A. Access control
B. Non repudiation
C. Integrity
D. Availability
ANSWER: B
95. A ________ is a program that secretly takes over another Internet-attached computer and then uses
that computer to launch attacks.
A. Worm
B. Zombie
C. Virus
D. Trap doors
ANSWER: B
96. In _______ the virus places an identical copy of itself into other programs or into certain system areas
on the disk.
A. Dormant phase
B. Propagation phase
C. Triggering phase
D. Execution phase
ANSWER: B
97. The type(s) of auto executing macros, in Microsoft word is/are _____.
A. Auto execute
B. Auto macro
C. Command macro
D. All of the above
ANSWER: D
14 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
98. __________ will ensure the merchant and their payment information.
A. Digital certificate.
B. Merchant.
C. Dual signature.
D. Certificate authority.
ANSWER: C
101. _________ uniquely identifies the MIME entities uniquely with reference to multiple contexts.
A. Content description.
B. Content -id.
C. Content type.
D. Content transfer encoding.
ANSWER: B
15 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
111. Which metrics can be used to find out the number of logical connection assigned to user application?
A. counter
B. gauge
C. interval timer
D. resource utilization
ANSWER: B
16 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
D. execution frequency
ANSWER: D
117. ____ defines a format for text message that are sent using electronic mail.
A. RFC836
B. RFC822
C. RFC348
D. RFC356
ANSWER: B
17 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
120. Which of the following public key algorithm is not used by the Digital Signature?
A. RSA
B. DSS
C. Elliptic curve
D. Diffie - Hellman
ANSWER: D
121. Which of the following algorithm is used for the key exchange?
A. RSA
B. DSS
C. both a and b
D. none of the above
ANSWER: C
122. The RSA public key encryption algorithm was developed by___.
A. John
B. Rivert
C. Mohammed
D. schildt
ANSWER: B
18 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
19 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
C. data is changed
D. none of the above
ANSWER: A
139. The study of secret codes associated with classified information and intelligence gathering is called
____.
A. encryption.
B. scripting.
C. cryptography.
D. Secure Sockets Layers.
ANSWER: C
140. When you receive a public key that has been signed by a number of individuals, that key is part of
___.
A. an illegal scam
B. a certificate authority
C. the web of trust.
D. a digital fingerprint.
ANSWER: C
141. An organization known as _______________ sends out information about known security holes in
software.
A. RSA
20 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
B. CERT
C. PKI
D. PGP
ANSWER: B
142. Keys that are _____ bits long cannot be cracked by brute-force means within a reasonable period of
time.
A. 28
B. 128
C. 64
D. 56
ANSWER: B
143. ________ is the science and art of transforming messages to make them secure and immune to
attacks.
A. Cryptography
B. Cryptoanalysis
C. either (a) or (b)
D. neither (a) nor (b)
ANSWER: A
145. ________ DES was designed to increase the size of the DES key
A. Double
B. Triple
C. Quadruple
D. none of the above
ANSWER: B
146. The ________ method provides a one-time session key for two parties.
A. Diffie-Hellman
B. RSA
C. DES
D. AES
ANSWER: A
147. The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not
authenticated to each other.
A. man-in-the-middle
B. ciphertext attack
C. plaintext attack
D. none of the above
ANSWER: A
148. In _____ Mode, the authentication header is inserted immediately after the IP header.
21 of 22 1/30/2017 3:16 PM
http://172.16.2.20/printqp.php?heading=III BCA 'B' [2014-2017], Semest...
A. transport
B. tunnel
C. authentication
D. both a and b
ANSWER: B
150. Which of the following pieces of information can be found in the IP header?
A. Source address of the IP packet
B. Destination address for the IP packet
C. Sequence number of the IP packet
D. Both (A) and (B) only.
ANSWER: D
Staff Name
Srividhya R .
22 of 22 1/30/2017 3:16 PM