Information Security
Semester: viii
Batch: 2019
i.Which of the following process can convert cipher text to plain text?
a) Hashing b) Encryption c) Decryption d) Substitution
The correct answer is:
c) Decryption
iiWhich of the following concept is not part of CIA triad?
a) Confidentinlity b) Integrity c) Authenticity d) Availability
The correct answer is:
c) Authenticity
III. How many rounds docs AES-256 perform?
a) 12 b) 14 c) 10 d) 16
The correct answer is:
b) 14
iv.What is multiplicative inverse of 7 in 2,?
a) 7 b) 5 c)6 d) 8
The correct answer is:
b) 5
v.What does a message authentication code (MAC) provide?
a) Confidentiality of the message b) Integrity and authenticity of message
c) Encryption message d) Decryption of message
The correct answer is:
b) Integrity and authenticity of the message
vi. Which of the following is a vulnerability of password-based authentication?
a) Passwords can be easily shared
b) Passwords are too complex to remember
c) Passwords are always encrypted
d) Passwords are never exposed to attackers
The correct answer is:
a) Passwords can be easily shared
vii.Which of the following is not a typical component of an IDS?
a) Sensors b) Analysis engine
c) Response system d) Antivirus software
The correct answer is:
d) Antivirus software
viii.Which mode of IPSec provides encryption and authentication for the entire IP packet?
a) Transport mode b) Tunnel mode
c) Application mode d) Network mode
The correct answer is:
b) Tunnel mode
ix. Which of the following type of firewall work on the basis of rules defined by Access Control List?
a) Packet filtering Firewall b) Circuit level gateway Firewall
c) Next generation Firewall d) Application Level gateway Firewall
The correct answer is:
a) Packet filtering Firewall
x. Which of the following is typically not a phase in a security audit process?
a) Planning and scoping b) Information gathering
c) Performance review d) Reporting and follow-up
The correct answer is:
c) Performance review