Computer Hardware and Networking MCQ Quiz Hub

Information and Network Security Set 1

Choose a topic to test your knowledge and improve your Computer Hardware and Networking skills

An algorithm in encryption is called _____________.





✅ Correct Answer: 3

The information that gets transformed in encryption is ____________.





✅ Correct Answer: 1

In brute force attack, on average half of all possible keys must be tried to achievesuccess.





✅ Correct Answer: 1

A (n) ______ algorithm transforms ciphertext to plaintext.





✅ Correct Answer: 2

The ________ is the message after transformation.





✅ Correct Answer: 1

Which of the following is not a type of virus?





✅ Correct Answer: 1

A computer ________ is a malicious code which self-replicates by copying itself to otherprograms.





✅ Correct Answer: 2

__________ infects the master boot record and it is challenging and a complex task toremove this virus.





✅ Correct Answer: 1

_______ infects the executable as well as the boot sectors.





✅ Correct Answer: 4

Trojan creators do not look for _______________.





✅ Correct Answer: 2

Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system.





✅ Correct Answer: 3

During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted.





✅ Correct Answer: 3

The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website.





✅ Correct Answer: 2

In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware.





✅ Correct Answer: 3

Trojan creators do not look for _________





✅ Correct Answer: 4

When one participant in a communication pretends to be someone else, it is called_________?





✅ Correct Answer: 4

_____ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.





✅ Correct Answer: 3

Compromising confidential information comes under _________.





✅ Correct Answer: 2

When an attacker sends unsolicited communication, it is an example of_____.





✅ Correct Answer: 1

Masquerading is _______.





✅ Correct Answer: 2

Integrity is protection of data from all of the following except ____





✅ Correct Answer: 3

A security program cannot address which of the following business goals?





✅ Correct Answer: 1

The absence of a fire-suppression system would be best characterized as_______.





✅ Correct Answer: 3

Asymmetric key cryptography is used for all of the followingexcept_______





✅ Correct Answer: 4

Firewalls are to protect against________.





✅ Correct Answer: 4

The first computer virus is__________.





✅ Correct Answer: 4

___ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.





✅ Correct Answer: 3

From the options below, which of them is not a vulnerability to information security?





✅ Correct Answer: 3

Possible threat to any information cannot be ________________.





✅ Correct Answer: 1

A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase.





✅ Correct Answer: 2

____________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa.





✅ Correct Answer: 4

When plain text is converted to unreadable format, it is termed as _____





✅ Correct Answer: 3

__ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.





✅ Correct Answer: 2

Cryptography can be divided into ______ types.





✅ Correct Answer: 2

Data which is easily readable & understandable without any special algorithm ormethod is called _____________





✅ Correct Answer: 2

Plain text are also called _____________.





✅ Correct Answer: 3

There are ________ types of cryptographic techniques used in general.





✅ Correct Answer: 2

Conventional cryptography is also known as _____________ or symmetric-keyencryption.





✅ Correct Answer: 1

Data Encryption Standard is an example of a _____________ cryptosystem.





✅ Correct Answer: 1

____ Cryptography deals with traditional characters, i.e., letters & digits directly.





✅ Correct Answer: 3

________ Cryptography operates on binary-bit series and strings.





✅ Correct Answer: 1

_____ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.





✅ Correct Answer: 2

_______ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.





✅ Correct Answer: 2

n Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.





✅ Correct Answer: 3

___________ employs a text string as a key that is implemented to do a series ofshifts on the plain-text.





✅ Correct Answer: 4

The ________________ has piece of the keyword that has the same length as that of theplaintext.





✅ Correct Answer: 1

In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.





✅ Correct Answer: 3

In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.





✅ Correct Answer: 4

The procedure to add bits to the last block is termed as _______________





✅ Correct Answer: 1

Which of the following is not an example of a block cipher?





✅ Correct Answer: 1

DES stands for ________________.





✅ Correct Answer: 4

____ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.





✅ Correct Answer: 4

AES stands for ________________.





✅ Correct Answer: 3

AES is at least 6-times faster than 3-DES.





✅ Correct Answer: 1

___________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.





✅ Correct Answer: 3

______ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.





✅ Correct Answer: 1

Steganography follows the concept of security through obscurity.





✅ Correct Answer: 1

The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.





✅ Correct Answer: 3

Which of the following is not a steganography tool?





✅ Correct Answer: 2

Which of the following is not a steganography tool?





✅ Correct Answer: 4