I) Which of the following is not category of active attack?
a) Masquerade
b) Replay
c) Modification of Message
d) Traffic analysis
ii.Which cipher is best known diagraph substitution cipher?
a) Ceasar cipher
b) Vigenere cipher
c) Playfair Cipher
d)Shift chipher
ili. In asymmetric cryptography, who is kept private key?
a)Receiver
b)Sender
c)Both sender and receiver
d) All the connected devices to the network
iv) How many bytes are required to store SHA-1 hash value?
a) 32 byte
b) 20 byte
c) 64 byte
d) 16 byte
v) Which one of the following produces a signature for the document?
a) Key generation algorithm.
b) Signature verifying algorithm
c) Signing algorithm
d) authentication
vi) Which of the following is the least secure method of authentication?
a) key card
b) Fingerprint
c) Retina pattern
d) Password
vii) Which of the following process is used for verifying identity of user?
a) Authentication
b) Identification
c) Validation
d) verification
viii) What are different ways to classify an IDS?
a) Zone based
c) Network and Zone based
b) Host and Network based
d) Level based
ix) A firewall protects which of following attacks?
a) Phishing
b) Dumpster diving
c) Denial of Service (DoS)
d) Shoulder surfing
x) Which of the following software module periodically extracts record from the audit trail to create archive of auditable events?
a) Audit analyzer
b) Audit archiver
c) Archives
d) Audit provider