Online Technical Quiz (Nis)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rajendra Rathod
R
Rajendra Rathod
Community Contributor
Quizzes Created: 1 | Total Attempts: 106
| Attempts: 106 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. In DES algorithm, 56 bit key can be obtained by

Explanation

In the DES algorithm, a 64-bit key is initially used. However, to obtain a 56-bit key, every 8th bit of the original 64-bit key is discarded. This is done because the parity bits in the 64-bit key are not used in the encryption process. Therefore, by removing these bits, a 56-bit key is obtained which is used for the encryption and decryption operations in the DES algorithm.

Submit
Please wait...
About This Quiz
Online Technical Quiz (Nis) - Quiz

Online Technical Quiz Competition conducted by Prof. R. H. Rathod, Computer Eng. Deptt.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. In ________ authentication, the claimant proves that she knows a secret without actually sending it.

Explanation

Challenge response authentication is a method where the claimant proves their identity by responding correctly to a challenge issued by the system. In this case, the claimant proves their knowledge of a secret without actually sending it. This method is commonly used in authentication protocols where the claimant needs to prove their identity without transmitting sensitive information over the network.

Submit
3. There are two ways by which plain text message can be converted in to cipher text messages.....

Explanation

The correct answer is Substitution & Transposition, Symmetric & Asymmetric. These are the two ways by which plain text messages can be converted into cipher text messages. Substitution involves replacing each letter or character in the message with a different letter or character according to a specific rule or key. Transposition, on the other hand, involves rearranging the letters or characters in the message to create a new order. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys for encryption and decryption.

Submit
4. The same key is used for encryption and decryption is known as ………………. Cryptography

Explanation

A private key is a type of symmetric key used for both encryption and decryption. In symmetric key cryptography, the same key is used for both processes. This means that the sender and receiver must have access to the same key in order to encrypt and decrypt the message. Private key cryptography is often used for secure communication between two parties who have previously shared the same key.

Submit
5. A packet filter firewall filters at __________

Explanation

A packet filter firewall filters at the network layer or transport layer because these layers are responsible for handling the routing and delivery of packets in a network. By filtering at these layers, the firewall can inspect the packet headers and make decisions based on information such as source and destination IP addresses, port numbers, and protocol types. This allows the firewall to control the flow of network traffic and enforce security policies by allowing or blocking certain types of packets based on predefined rules.

Submit
6. Parties involved in Kerberos protocol are……

Explanation

The correct answer is User, AS, TGS, SS. In the Kerberos protocol, the User initiates the authentication process by requesting a ticket from the Authentication Server (AS). The AS then issues a Ticket Granting Ticket (TGT) to the User, which is used to request a Service Ticket (ST) from the Ticket Granting Server (TGS). The User presents the ST to the Service Server (SS) to gain access to the requested service. Therefore, the parties involved in the Kerberos protocol are the User, AS, TGS, and SS.

Submit
7. Following are the four basic for security 1.Confidentiality   2.Integrity    3.Avaliability    4.Accountability

Explanation

The given answer is true because confidentiality, integrity, availability, and accountability are indeed the four basic principles of security. Confidentiality ensures that information is only accessible to authorized individuals. Integrity ensures that information is accurate and has not been tampered with. Availability ensures that information and resources are accessible when needed. Accountability ensures that individuals are responsible for their actions and can be traced back if necessary. These principles form the foundation of a secure system or network.

Submit
8. What are the drawbacks of the host based IDS?

Explanation

The drawback of host-based IDS is that unselective logging of messages may increase the audit burdens. This means that the IDS may log a large number of messages, including irrelevant ones, which can make it difficult for auditors to sift through the logs and identify the important information. This can result in increased workload and potentially lead to missed or overlooked security incidents. Selective logging, on the other hand, runs the risk of missing attacks, but it can help in reducing the audit burden by only logging relevant events. Additionally, the speed of detection and the need for programming new patterns are not mentioned as drawbacks of host-based IDS in the given options.

Submit
9. Unauthorized access and viruses are issues dealing  with network …..

Explanation

Unauthorized access and viruses are issues dealing with network security. Security measures are put in place to prevent unauthorized access to a network and to protect it from viruses, malware, and other malicious threats. These measures can include firewalls, encryption, authentication protocols, and antivirus software. By implementing strong security measures, organizations can ensure the confidentiality, integrity, and availability of their network and data.

Submit
10. The form of cryptography where pair of keys are used for encryption and decryption is known as ......

Explanation

Public key cryptography, also known as asymmetric key cryptography, is a form of cryptography where a pair of keys (a public key and a private key) are used for encryption and decryption. The public key is shared with others, while the private key is kept secret. The public key is used to encrypt the message, and only the corresponding private key can decrypt it. This form of cryptography provides secure communication between two parties without the need to share a secret key beforehand.

Submit
11. A firewall protects which of the following attacks?

Explanation

A firewall protects against Denial of Service (DoS) attacks. A DoS attack is when an attacker overwhelms a system or network with a flood of illegitimate requests or traffic, causing it to become unavailable to legitimate users. A firewall can detect and block these malicious requests, preventing the system from being overwhelmed and ensuring that legitimate traffic can still access the network or system.

Submit
12. Select the proper attributes of Firewall ___

Explanation

The correct answer is a combination of the three attributes listed. All the traffic should pass through the firewall ensures that all network traffic is filtered and monitored by the firewall. The firewall should allow only authorized traffic ensures that only legitimate and approved traffic is allowed through the firewall. The firewall itself can stop attacks indicates that the firewall has built-in security measures to prevent and block malicious attacks.

Submit
13. The feature of Control Objectives for Information and Related Technology (COBIT) is….

Explanation

The feature of Control Objectives for Information and Related Technology (COBIT) includes all of the mentioned components. It is a supporting toolset that helps managers in bridging the gap between control requirements, technical issues, and business risks. COBIT provides a framework to organize IT governance objectives and good practices, linking them to business requirements. It also offers process descriptions, which serve as a reference process model and a common language for everyone in an organization. Therefore, the correct answer is "All of this."

Submit
14. The main two protocols of IPSec are _____ & _____

Explanation

IPSec (Internet Protocol Security) is a framework of protocols used to secure internet communication. The two main protocols of IPSec are AH (Authentication Header) and ESP (Encapsulating Security Payload). AH provides data integrity, authentication, and protection against replay attacks. ESP, on the other hand, provides confidentiality, data integrity, and authentication. Both protocols work together to ensure secure and private communication over IP networks.

Submit
15. Kerberos is _______ protocol

Explanation

Kerberos is an authentication protocol used to verify the identity of users and services in a network. It provides a secure method for users to prove their identity to access resources and services. Through a series of exchanges involving tickets and encryption, Kerberos ensures that only authorized users can gain access to the network and its resources. It does not involve authorization or encryption directly, although it can be used in conjunction with other protocols to provide these functionalities.

Submit
16. DES  encrypts ……………… bit clear text blocks under the control of ………….. bit keys

Explanation

DES (Data Encryption Standard) is a symmetric encryption algorithm that operates on 64-bit blocks of plaintext. However, the key used in DES is actually 56 bits long, with the remaining 8 bits being used for error detection and parity checking. Therefore, the correct answer is 64 bits for the plaintext blocks and 56 bits for the keys.

Submit
17. Identify the configuration of firewall__

Explanation

A screened subnet firewall is a type of firewall that is designed to protect a network by creating a separate subnet or network segment between the internal network and the external network. This configuration allows for more granular control over incoming and outgoing traffic, as well as providing an additional layer of security by isolating the internal network from the external network. It typically consists of a router, a screening router, and one or more screening hosts.

Submit
18. Identify the cryptography technique........

Explanation

Asymmetric key cryptography is a type of cryptography technique where two different keys, a public key and a private key, are used for encryption and decryption. The public key is used for encryption and can be freely shared with others, while the private key is kept secret and used for decryption. This technique provides a secure way of communication as it ensures that only the intended recipient can decrypt the message using their private key.

Submit
19. It is a stealing ideas or creations of others…..

Explanation

The correct answer is "All of these" because all the options mentioned - plagiarism, intellectual property rights, and piracy - are related to stealing ideas or creations of others. Plagiarism refers to the act of using someone else's work without giving them proper credit, intellectual property rights protect the ownership and rights of creators, and piracy involves unauthorized copying or distribution of copyrighted material. Therefore, all these options encompass different aspects of the same concept.

Submit
20. What is the cipher text if the plain text message is "STAY AT HOME STAY SAFE" and the encryption algorithm used is simple columnar transposition technique with the key as VIRUS

Explanation

The given cipher text is obtained by applying the simple columnar transposition technique with the key "VIRUS" to the plain text message "STAY AT HOME STAY SAFE". The encryption algorithm rearranges the letters of the message by writing them in columns under the letters of the key, and then reading the columns in the order specified by the alphabetical order of the key. In this case, the columns are read in the order V-I-R-U-S, resulting in the cipher text "THTFAOAEAESYMYSTSA".

Submit
21. A system that performs attack recognition and alerting for a network is what?

Explanation

A system that performs attack recognition and alerting for a network is known as a Network Intrusion Detection System (NIDS). NIDS is designed to monitor network traffic and identify any suspicious or malicious activity that may indicate an attack. It uses various techniques such as anomaly detection and signature-based detection to identify potential threats and generate alerts to notify network administrators.

Submit
22. The idea of IPSec is to __________  the data packet and seal the __________layer and __________layer data during transmission

Explanation

IPSec is a protocol that provides secure communication over IP networks. It achieves this by encrypting the data packet, ensuring the confidentiality and integrity of the transmitted data. The encryption is done at the Application layer, where the data is transformed into a format that can only be read by the intended recipient. The sealed data is then transported securely over the network, ensuring that it cannot be tampered with or intercepted. Therefore, the correct answer is "Encrypt, Transport, Application".

Submit
23. What are the characteristics of Host based IDS?

Explanation

Host based IDS refers to a type of intrusion detection system that is installed on individual host systems. It monitors and analyzes the audit information logged by the host operating system. This includes activities such as logins, file opens, and program executions. By analyzing these logs, the host based IDS is able to detect any suspicious or malicious activity that may indicate an intrusion. Therefore, all of the mentioned characteristics are true for host based IDS.

Submit
24. Which of the following is digital certificate standard?

Explanation

X.509 is the correct answer because it is a widely used digital certificate standard. It defines the format for public key certificates, which are used to verify the authenticity and integrity of digital communications. X.508 and D.509 are not recognized standards for digital certificates, so they are not the correct answer.

Submit
25. Digital signatures are used to ……                                   1. Encrypt and secure the document     2. Authenticate the identity of sender    3. Not repudiate later by the sender

Explanation

Digital signatures are used to authenticate the identity of the sender and ensure that the sender cannot later deny sending the document. They do not encrypt or secure the document itself, but rather provide a way to verify the integrity and authenticity of the document and its sender. Therefore, the correct answer is 2 and 3.

Submit
26. Which of the following is not an example of a computer as weapon cyber-crime?

Explanation

Spying someone using a keylogger is not an example of a computer as a weapon cyber-crime because a keylogger is a software or hardware device used to monitor and record keystrokes on a computer. While it can be used for malicious purposes, such as stealing personal information or login credentials, it does not involve using a computer as a weapon to cause harm or damage to others. Instead, it is a tool used for unauthorized surveillance or invasion of privacy.

Submit
27. What is the purpose of a Denial of Service attack?

Explanation

A Denial of Service (DoS) attack is carried out with the intention of overwhelming a system or network, rendering it unable to function properly or provide services to legitimate users. By flooding the target system with a massive amount of traffic or requests, the attacker exhausts its resources, such as bandwidth, processing power, or memory, causing it to become unresponsive or crash. The purpose of a DoS attack is to disrupt the availability of the targeted system, rather than exploiting any specific vulnerability or gaining unauthorized access.

Submit
28. ------------------- is the art of achieving security by encoding messages to make them non-readable

Explanation

Cryptography is the art of achieving security by encoding messages to make them non-readable. It involves using various techniques and algorithms to transform plain text into cipher text, which can only be deciphered by authorized individuals who possess the key. Cryptography ensures confidentiality and integrity of information by preventing unauthorized access and tampering. Cryptology is a broader term that encompasses both cryptography and cryptanalysis, which involves analyzing and breaking codes. Therefore, the correct answer is Cryptography.

Submit
29. Firewall cannot protect against attacks that bypass the firewall_____

Explanation

A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. However, there are certain attacks that can bypass the firewall's protection. For example, attacks that originate from within the network or attacks that exploit vulnerabilities in the network infrastructure may not be detected or prevented by the firewall. Additionally, attacks that use encrypted communication or social engineering techniques can also bypass the firewall's defenses. Therefore, it is true that a firewall cannot fully protect against all types of attacks that can bypass its protection.

Submit
30. What is the name of the IT law that India is having in the Indian legislature?

Explanation

India's Information Technology (IT) Act, 2000 is the correct answer because it is the law that governs electronic commerce and digital signatures in India. It provides legal recognition for electronic transactions, regulates the use of digital signatures, and establishes the framework for cybersecurity in the country. The act was enacted to facilitate e-governance, promote electronic commerce, and ensure the security and confidentiality of electronic records and communications.

Submit
31. Kerberos uses  secret key cryptography.

Explanation

Kerberos is a network authentication protocol that uses secret key cryptography to securely authenticate users and services on a network. Secret key cryptography involves the use of a shared secret key between the client and the server to encrypt and decrypt messages. This ensures that only authorized parties with the correct secret key can access the network resources. Therefore, the statement "Kerberos uses secret key cryptography" is true.

Submit
32. What is backdoor ?

Explanation

A backdoor refers to a vulnerability in software that enables someone to bypass the regular authentication process. This means that unauthorized individuals can gain access to a system or network without having to provide the necessary credentials or follow the usual security protocols. This can pose a significant security risk as it allows attackers to exploit the vulnerability and potentially gain control over the system, steal sensitive information, or carry out malicious activities. It is essential for software developers to identify and fix backdoors to ensure the integrity and security of their systems.

Submit
33. The cipher message of the plain text "network security" is ……………………. When uses Caesar's cipher

Explanation

The given cipher message "qhwzrun vhfxulwb" is the correct answer because it is the result of using Caesar's cipher on the plain text "network security". Caesar's cipher is a substitution cipher where each letter in the plain text is shifted a certain number of positions down the alphabet. In this case, each letter in "network security" has been shifted one position down the alphabet, resulting in "qhwzrun vhfxulwb".

Submit
34. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

Explanation

Entity Authentication is the correct answer because it refers to the process of proving one's identity to another entity. In this process, the claimant provides evidence or witnesses to verify her identity to the verifier. This can be done through various means such as presenting a government-issued ID, providing a password or PIN, or using biometric data. Entity Authentication ensures that the claimant is indeed who she claims to be, providing a level of trust and security in communication or transactions between entities.

Submit
35. Password-based authentication can be divided into two broad categories: _______ and _______.

Explanation

Password-based authentication can be divided into two broad categories: fixed and one-time. Fixed passwords are those that remain the same over a long period of time and are typically chosen by the user. One-time passwords, on the other hand, are temporary and can only be used for a single authentication session. These categories provide different levels of security and are used in different scenarios depending on the specific requirements of the system.

Submit
36. This logo is used by which company? 

Explanation

The given logo is used by Logitech.

Submit
37. The certificate authority signs the digital certificate with…

Explanation

The certificate authority signs the digital certificate with its own private key. This is because the certificate authority is responsible for verifying the authenticity and integrity of the digital certificate. By signing the certificate with its private key, the certificate authority ensures that the certificate has not been tampered with and can be trusted by others. The certificate can then be verified using the certificate authority's public key, which is widely available.

Submit
38. In public key encryption if A want to send an encrypted message to B then….

Explanation

In public key encryption, if A wants to send an encrypted message to B, A encrypts the message using B's public key. This is because public key encryption uses a pair of keys: a public key and a private key. B's public key is available to everyone and is used for encryption, while B's private key is kept secret and is used for decryption. By encrypting the message using B's public key, only B will be able to decrypt it using their private key, ensuring the security and confidentiality of the message.

Submit
39. What is the cipher text if the plain text message is "HOW ARE YOU" and the encryption algorithm used is Vernam cipher (one time pad) technique with one time pad NCBTTZQARX   [  Consider  A=0 ]

Explanation

not-available-via-ai

Submit
40. The full form of SMTP is …..

Explanation

SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol used for sending and receiving email messages over a network. SMTP is responsible for the transmission of emails between mail servers. It allows the transfer of email messages from the sender's mail server to the recipient's mail server. This protocol is widely used in the email communication system and is essential for the proper functioning of email services.

Submit
41. Which of the following malicious program do not replicate automatically?

Explanation

Trojan Horse is a type of malicious program that does not replicate automatically. Unlike viruses and worms, Trojan Horses do not have the ability to self-replicate and spread to other systems. Instead, they rely on social engineering techniques to trick users into executing them. Once executed, Trojan Horses can perform various malicious activities, such as stealing sensitive information or providing unauthorized access to the attacker. However, they do not have the ability to automatically replicate themselves like viruses or worms.

Submit
42. Which of the following technique is used to verify the integrity of the message?

Explanation

A message digest is a technique used to verify the integrity of a message. It involves creating a unique hash value for the message using a cryptographic algorithm. This hash value is then compared with the recipient's copy of the message to ensure that it has not been tampered with during transmission. Digital signatures and decryption algorithms are not specifically used for verifying the integrity of a message.

Submit
43. Which of the following is independent malicious program that need not any host program?

Explanation

A worm is an independent malicious program that can replicate itself and spread to other computers without the need for a host program. Unlike viruses, which require a host program to attach themselves to, worms can function independently and spread through networks or the internet. They can exploit vulnerabilities in operating systems or software to gain access to a computer and then use that access to propagate themselves to other machines. Worms can cause significant damage by consuming network bandwidth, deleting files, or installing backdoors for remote control.

Submit
44. In PEM operation, the 4 steps are.....

Explanation

not-available-via-ai

Submit
45. What is meant by the term 'cyber-crime'?

Explanation

The term 'cyber-crime' refers to any crime that uses computers to jeopardize or attempt to jeopardize national security. This can include activities such as hacking into government systems, launching cyber-attacks on critical infrastructure, or stealing classified information. The focus is on crimes that have the potential to cause significant harm to a country's security and stability, and that are facilitated through the use of computers and technology.

Submit
46. What are characteristics of Network based IDS?

Explanation

Network-based IDS (Intrusion Detection Systems) are designed to monitor and analyze network traffic in order to detect and prevent malicious activities. One of the key characteristics of network-based IDS is that they look for attack signatures in network traffic. This means that they are programmed to identify specific patterns or behaviors that are indicative of known attacks or security threats. By analyzing the network traffic and comparing it to a database of known attack signatures, the IDS can identify and alert administrators about any potential security breaches or unauthorized activities happening within the network.

Submit
47. PEM supports three main cryptographic functions--_____, _____ & _____

Explanation

PEM (Privacy Enhanced Mail) is a protocol that supports three main cryptographic functions: encryption, non-repudiation, and message integrity. Encryption ensures that the message is securely transmitted and can only be accessed by authorized recipients. Non-repudiation ensures that the sender cannot deny sending the message, providing evidence of its origin. Message integrity ensures that the message remains unchanged during transmission, preventing unauthorized modifications. These three functions work together to ensure the confidentiality, authenticity, and integrity of the messages exchanged using PEM.

Submit
48. Is [ISMS long form is Information Security Manaement System ] true or false?

Explanation

The statement "ISMS long form is Information Security Management System" is true. ISMS stands for Information Security Management System, which is a framework of policies and procedures for managing an organization's information security risks. Therefore, the given statement is correct.

Submit
49. Identify the life cycle with full form of it._____

Explanation

The correct answer is Information Technology Infrastructure Library (ITIL). ITIL is a framework that provides best practices for managing and delivering IT services. It consists of a set of guidelines and processes that help organizations align their IT services with their business goals. ITIL encompasses the entire life cycle of IT services, from strategy and design to transition, operation, and continual improvement.

Submit
50. The two modes of IPSec _____ & _____

Explanation

IPSec (Internet Protocol Security) is a protocol suite used to secure internet communications. It provides two modes of operation: Transport mode and Tunnel mode.

Transport mode is used to secure the communication between two end hosts. In this mode, only the payload (data) of the IP packet is encrypted and authenticated, while the IP header remains intact. It is typically used for securing end-to-end communication within a private network.

Tunnel mode, on the other hand, is used to secure communication between two networks. In this mode, the entire IP packet, including the IP header, is encapsulated within a new IP packet. This provides protection for the entire packet during transit between the networks.

Therefore, the correct answer is Transport, Tunnel.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 30, 2020
    Quiz Created by
    Rajendra Rathod
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In DES algorithm, 56 bit key can be obtained by
In ________ authentication, the claimant proves that she knows a...
There are two ways by which plain text message can be converted in to...
The same key is used for encryption and decryption is known as...
A packet filter firewall filters at __________
Parties involved in Kerberos protocol are……
Following are the four basic for security ...
What are the drawbacks of the host based IDS?
Unauthorized access and viruses are issues dealing  with network...
The form of cryptography where pair of keys are used for encryption...
A firewall protects which of the following attacks?
Select the proper attributes of Firewall ___
The feature of Control Objectives for Information and Related...
The main two protocols of IPSec are _____ & _____
Kerberos is _______ protocol
DES  encrypts ………………...
Identify the configuration of firewall__
Identify the cryptography technique........
It is a stealing ideas or creations of others…..
What is the cipher text if the plain text message is "STAY AT HOME...
A system that performs attack recognition and alerting for a network...
The idea of IPSec is to __________  the data packet and seal the...
What are the characteristics of Host based IDS?
Which of the following is digital certificate standard?
Digital signatures are used to...
Which of the following is not an example of a computer as weapon...
What is the purpose of a Denial of Service attack?
------------------- is the art of achieving security by encoding...
Firewall cannot protect against attacks that bypass the firewall_____
What is the name of the IT law that India is having in the Indian...
Kerberos uses  secret key cryptography.
What is backdoor ?
The cipher message of the plain text "network security" is...
In _______, a claimant proves her identity to the verifier by using...
Password-based authentication can be divided into two broad...
This logo is used by which company? 
The certificate authority signs the digital certificate with…
In public key encryption if A want to send an encrypted message to B...
What is the cipher text if the plain text message is "HOW ARE YOU" and...
The full form of SMTP is …..
Which of the following malicious program do not replicate...
Which of the following technique is used to verify the integrity of...
Which of the following is independent malicious program that need not...
In PEM operation, the 4 steps are.....
What is meant by the term 'cyber-crime'?
What are characteristics of Network based IDS?
PEM supports three main cryptographic functions--_____, _____...
Is [ISMS long form is Information Security Manaement System ] true or...
Identify the life cycle with full form of it._____
The two modes of IPSec _____ & _____
Alert!

Advertisement