Title | Quiz 1 (Security Fundamentals) |
---|---|
Course | Bachelor of Business Bachelor of Science in Information Technology |
Institution | University of Technology Sydney |
Pages | 7 |
File Size | 281.8 KB |
File Type | |
Total Downloads | 95 |
Total Views | 159 |
Quiz 1...
Quiz 1 (Security Fundamentals)
Question 1
Fr equenc yanal y si sal onei ss uffic i entt obr eakavi gener eci pher
Selected Answer: Answers:
Fals e True Fals e
Question 2 0 out of 10 points Which of the following provides diffusion in the AES algorithm?
Selected Answer:
SP-Network
Answers:
XOR Round Key SP-Network Initial Permutation (IP) Substitution Box Shift Rows Expander Function
Question 3 10 out of 10 points Fr equenc yanal y si sal onei ss uffic i entt obr eakabasi cs ubst i t ut i onci pher
Selected Answer: Answers:
Tru e Tru e False
Question 4 10 out of 10 points A real One Time Pad is perfectly secure.
Selected Answer: Answers:
Tru e Tru e False
Question 5 10 out of 10 points
The operation performed in the vigenere cipher is the character-equivalent of XOR
Selected Answer: Answers:
Tru e Tru e False
Question 6 0 out of 10 points The key to a Feistel network's operation is that the round functions must be invertible.
Selected Answer: Answers:
Tru e True Fals e
Question 7 10 out of 10 points Birthday attacks are easier to perform than attacks on pre-image resistance.
Selected Answer: Answers:
Tru e Tru e False
Question 8 10 out of 10 points Which of the following algorithms is a malleable cipher
Selected Answer:
RC4
Answers: RC4 SHA25 6 DES AES MD5
Question 9 4 out of 10 points Identify and briefly explain three cryptanalysis attacks other than RHA
Selected Answer:
ciphertext on attack (COA) - The attackers has a ciphertext of the messages Ciphertext plaintext attack(CPA) -
Known plaintext attack(KPA) -
Correct Answer:
Response Feedback:
Ciphertext only attack (COA) - Attacker only has access to the ciphertext Known Plaintext Attack (KPA) - Attacker intercepts a random plaintext / ciphertext pair: (m, c) Chosen Plaintext Attack (CPA) - Attacker selects a message m and receives the ciphertext c Chosen Ciphertext Attack (CCA) - Attacker specifies a ciphertext c and receives the plaintext m CPA is chosen plaintext (COA is ciphertext only but you wont be penalised for that)
Question 10 10 out of 10 points A global deduction is a more powerful break than local deduction
Selected Answer: Answers:
Tru e Tru e False
Question 11 10 out of 10 points A Linear Congruential Generator is a secure PRNG
Selected Answer: Answers:
Fals e True Fals e
Question 12 10 out of 10 points How many rounds does DES have in it's Feistel network?
Selected Answer:
16
Answers:
12 16 32 64
Question 13 0 out of 10 points What is the key size for the DES algorithm?
Selected Answer: Answers:
256 bits 192 bits 64 bits 32 bits 256 bits 56 bits 128 bits
Question 14 0 out of 10 points What is the primary aspect of security provided by Encryption?
Selected Answer:
Authenticity
Answers:
Authenticity Confidentialit y Integrity Nonrepudiation Availability
Question 15 0 out of 10 points What is the primary aspect of security provided by Passwords?
Selected Answer:
Integrity
Answers:
Integrity Availability Nonrepudiation Authenticity Confidentialit y
Question 16 0 out of 10 points Stream ciphers are resistant to bit-flipping attacks
Selected Answer: Answers:
Tru e True Fals e
Question 17 0 out of 10 points What is the general aim of security?
Selected Answer:
To protect information
Answers:
To stop attackers at all cost To protect information To build reliable systems To increase the cost of breaking a system
Question 18 0 out of 10 points Merkles Puzzles provide an efficient mechanism for key exchange.
Selected Answer: Answers:
Tru e True Fals e
Question 19 0 out of 10 points A Linear Feedback Shift Register (LFSR) is a secure PRNG
Selected Answer: Answers:
Tru e True Fals e
Question 20 0 out of 10 points What is the primary aspect of security provided by HMACs?
Selected Answer:
Nonrepudiation
Answers:
Nonrepudiation Availability Integrity Confidentialit y Covertness
Question 21 10 out of 10 points What modifications did the NSA make to IBM's Lucifer, before it was announced as DES?
Selected Answer:
Modified S-Box
Answers:
Modified P-Box Increased Key Size Modified S-Box Improved Key Scheduling Algorithm
Question 22 10 out of 10 points El ect r oni cCodeBook( ECB)modeofoper at i oni smor es ec ur et hanCi pherBl ockChai ni ng ( CBC)
Selected Answer: Answers:
Fals e True Fals e
Question 23 10 out of 10 points Fr equenc yanal y si sal onei ssuffici entt obr eakaOneTi mePad
Selected Answer: Answers:
Fals e True Fals e
Question 24 10 out of 10 points What is the block size for the AES algorithm?
Selected Answer: Answers:
128 bits 256 bits 32 bits 192 bits 64 bits 128 bits 56 bits
Question 25 10 out of 10 points Which block cipher mode of operation effectively turns a block cipher into a stream cipher?
Selected Answer:
Output Feedback Mode (OFM)
Answers: Output Feedback Mode (OFM) Cipher Block Chaining (CBC) Galois/Counter Mode (GCM) Electronic Code Book (ECB)...