1.
Which of the following statements about the SHA (Security Hash Algorithm) are true?
Correct Answer(s)
A. Its latest version is SHA-1
C. It is used with encryption protocols
Explanation
SHA is a security hash algorithm that is used with encryption protocols. Its latest version is SHA-1.
2.
Which of the following are encryption systems?
Correct Answer(s)
A. RC5
B. Blowfish
Explanation
RC5 and Blowfish are encryption systems. MAC is a type of hardware address. ARP is a protocol that resolves MAC address to IP address.
3.
Which of the following is true about Public/Private key pairs?
Correct Answer(s)
A. They form an essential part of Website security
B. They are used by Certificate security system
Explanation
They forma an essential part of Web site security system, as it is the most convenient security system for Web sites considering that clients would be accessing the Web site over the public network. The Certificate security system uses the basic logic of Public/Private key pairs.
4.
RSA is the encryption system used in cellular devices.
Correct Answer
B. False
Explanation
ECC is the encryption system used in cellular devices.
5.
What is the requirement for cryptography?
Correct Answer(s)
A. To avoid unauthorized access of information being stored
C. To avoid unauthorized access of information being transmitted.
Explanation
Network resource access will have to be controlled through access permissions. Server access will have to be controlled through physical security to the server. Unauthorized access prevention of stored information or information being transmitted is the role of cryptography.
6.
Which of the following is responsible for key issues relating to the security of inter-bank communications?
Correct Answer
D. ABA
Explanation
ABA concerns itself with key issues in providing security to financial transaction/communication between banks.
7.
Which of the following will be required to perform Cryptanalysis?
Correct Answer(s)
A. Mathematical tools
B. Analytical reasoning
C. Pattern finding
Explanation
Cryptanalysis is a process of studying the pattern of secure communication and breaking it. It involves complex combinations such as patience and determination combined with skills of pattern finding, mathematical tools and analytical reasoning.
8.
When employing Caesar's Cipher key value of 3, which of the following will be the decrypted equivalent of JGOOQ?
Correct Answer
A. HELLO
Explanation
According to Caesar�s Cipher key value of 3, you would be sliding up the alphabetical value by 3. Hence �H� would be represented as J, �E� as G, �L� as O and �O� as Q.
9.
Which of the following is an advantage of using conventional encryption?
Correct Answer
B. It is very fast
Explanation
When conventional encryption is used for stored data rather than the data being transmitted, encryption and decryption process can be very fast.
10.
The concept of public-key cryptography was introduced by Diffie-Hellman.
Correct Answer
A. True
Explanation
The issues with key distribution faced by conventional encryption was overcome by the Public-key cryptography concepts introduced by Diffie-Hellman.
11.
Which of the following statements about Public Key Cryptography are true?
Correct Answer(s)
B. You do not need an existing security setup
C. Public key can only encrypt and private key can only decrypt.
Explanation
The implementation of Public-key cryptography does not need any existing security measures to be implemented. The public key can only encrypt and the Private key can only decrypt.
12.
The keys are measured by bytes.
Correct Answer
B. False
Explanation
Keys are measured by bits.
13.
A digital signature is synonymous to which of the following?
Correct Answer
B. Hand written signature
Explanation
A digital signature is synonymous with the handwritten signature. A signature though unique to that person varies with the person's age. Similarly, although a digital signature is unique and is used to establish the origin of that signature, it can vary from situation to situation.
14.
When employing message digest, if data does get modified, which of the following will be the result of that modification?
Correct Answer
B. The resulting digest after data modification will contain a completely different value.
Explanation
When cryptography uses hash function on a plain text, a fixed length of data called the message digest is generated. This message digest helps to preserve the data integrity by generating a a digest value when the data was originally transmitted. If during transmission the data gests modified, the message digest value that will be resulting will be a totally different value from the original one. This is usually verified at the receiving end before accepting and confirming the receipt of data.
15.
Which of the following are the two key-based algorithms?
Correct Answer(s)
A. Symmetric algorithm
B. Asymmetric algorithm
Explanation
There are two types of key-based algorithms. Depending on the key pair types they use, they can be categorized as symmetric or asymmetric algorithms.
16.
Which of the following can be termed as �brute force attack�?
Correct Answer
A. Trying all combinations to break a code
Explanation
When a particular message has been encrypted using random combinations, a person who is capturing this message will have to try all combinations of deciphering possible to expose the original message. This is known as brute force attack.
17.
Which of the following types of cryptography is possible?
Correct Answer(s)
A. CryptograpHy with keys
B. CryptograpHy without keys
Explanation
Cryptography without encryption and before encryption is not cryptography at all. Cryptography is possible with keys and without keys. When used without keys, it will be using simple or complex substitution.
18.
Cryptography without keys is more secure than cryptography with keys. T/F?
Correct Answer
B. False
Explanation
Cryptography without keys is not at all secure as the deciphering program will reside on the same media where the data or message is being received. In case of thest, the data can be stolen along with the deciphering program.
19.
Which of the following is required by the cipher when it is important to maintain a message as a secret?
Correct Answer
C. Generate several cipHer text.
Explanation
To keep a message a secret it is required that the cipher must be able to generate several cipher text.
20.
Which of the following is the most common attack faced by the DES algorithm?
Correct Answer
B. Brute force attack
Explanation
Brute force attack is the most common attack faced by the DES algorithm
21.
Differential cryptanalysis is nothing but pattern studying.
Correct Answer
A. True
Explanation
Differential Cryptanalysis is nothing but pattern studying. It chooses a pair of plain text with specific differences.
22.
Which of the following is provided by IDEA?
Correct Answer(s)
A. High level security
C. Ease of implementation
Explanation
IDEA provides high level of security along with ease of implementation.
23.
Which of the following best describes Ron�s Code 2?
Correct Answer
A. 64-bit block cipHer
Explanation
RC2 or Ron�s code 2 is a 64-bit block cipher. It was devised by Ron Rivest.
24.
The block size in RC5 can range from 0 to 255. Y/N?
Correct Answer
B. No
Explanation
The block size in RC5 can be 32-bit, 64-bit or 128-bit.