Quiz 1 (Security Fundamentals) PDF

Title Quiz 1 (Security Fundamentals)
Course Bachelor of Business Bachelor of Science in Information Technology
Institution University of Technology Sydney
Pages 7
File Size 281.8 KB
File Type PDF
Total Downloads 95
Total Views 159

Summary

Quiz 1...


Description

Quiz 1 (Security Fundamentals) 

Question 1

Fr equenc yanal y si sal onei ss uffic i entt obr eakavi gener eci pher

Selected Answer: Answers:



Fals e True Fals e

Question 2 0 out of 10 points Which of the following provides diffusion in the AES algorithm?

Selected Answer:

SP-Network

Answers:

XOR Round Key SP-Network Initial Permutation (IP) Substitution Box Shift Rows Expander Function



Question 3 10 out of 10 points Fr equenc yanal y si sal onei ss uffic i entt obr eakabasi cs ubst i t ut i onci pher

Selected Answer: Answers:

Tru e Tru e False



Question 4 10 out of 10 points A real One Time Pad is perfectly secure.

Selected Answer: Answers:



Tru e Tru e False

Question 5 10 out of 10 points

The operation performed in the vigenere cipher is the character-equivalent of XOR

Selected Answer: Answers:



Tru e Tru e False

Question 6 0 out of 10 points The key to a Feistel network's operation is that the round functions must be invertible.

Selected Answer: Answers:



Tru e True Fals e

Question 7 10 out of 10 points Birthday attacks are easier to perform than attacks on pre-image resistance.

Selected Answer: Answers:



Tru e Tru e False

Question 8 10 out of 10 points Which of the following algorithms is a malleable cipher

Selected Answer:

RC4

Answers: RC4 SHA25 6 DES AES MD5



Question 9 4 out of 10 points Identify and briefly explain three cryptanalysis attacks other than RHA

Selected Answer:

ciphertext on attack (COA) - The attackers has a ciphertext of the messages Ciphertext plaintext attack(CPA) -

Known plaintext attack(KPA) -

Correct Answer:

Response Feedback:



Ciphertext only attack (COA) - Attacker only has access to the ciphertext Known Plaintext Attack (KPA) - Attacker intercepts a random plaintext / ciphertext pair: (m, c) Chosen Plaintext Attack (CPA) - Attacker selects a message m and receives the ciphertext c Chosen Ciphertext Attack (CCA) - Attacker specifies a ciphertext c and receives the plaintext m CPA is chosen plaintext (COA is ciphertext only but you wont be penalised for that)

Question 10 10 out of 10 points A global deduction is a more powerful break than local deduction

Selected Answer: Answers:



Tru e Tru e False

Question 11 10 out of 10 points A Linear Congruential Generator is a secure PRNG

Selected Answer: Answers:

Fals e True Fals e



Question 12 10 out of 10 points How many rounds does DES have in it's Feistel network?

Selected Answer:

16

Answers:

12 16 32 64



Question 13 0 out of 10 points What is the key size for the DES algorithm?

Selected Answer: Answers:

256 bits 192 bits 64 bits 32 bits 256 bits 56 bits 128 bits



Question 14 0 out of 10 points What is the primary aspect of security provided by Encryption?

Selected Answer:

Authenticity

Answers:

Authenticity Confidentialit y Integrity Nonrepudiation Availability



Question 15 0 out of 10 points What is the primary aspect of security provided by Passwords?

Selected Answer:

Integrity

Answers:

Integrity Availability Nonrepudiation Authenticity Confidentialit y



Question 16 0 out of 10 points Stream ciphers are resistant to bit-flipping attacks

Selected Answer: Answers:



Tru e True Fals e

Question 17 0 out of 10 points What is the general aim of security?

Selected Answer:

To protect information

Answers:

To stop attackers at all cost To protect information To build reliable systems To increase the cost of breaking a system



Question 18 0 out of 10 points Merkles Puzzles provide an efficient mechanism for key exchange.

Selected Answer: Answers:



Tru e True Fals e

Question 19 0 out of 10 points A Linear Feedback Shift Register (LFSR) is a secure PRNG

Selected Answer: Answers:



Tru e True Fals e

Question 20 0 out of 10 points What is the primary aspect of security provided by HMACs?

Selected Answer:

Nonrepudiation

Answers:

Nonrepudiation Availability Integrity Confidentialit y Covertness



Question 21 10 out of 10 points What modifications did the NSA make to IBM's Lucifer, before it was announced as DES?

Selected Answer:

Modified S-Box

Answers:

Modified P-Box Increased Key Size Modified S-Box Improved Key Scheduling Algorithm



Question 22 10 out of 10 points El ect r oni cCodeBook( ECB)modeofoper at i oni smor es ec ur et hanCi pherBl ockChai ni ng ( CBC)

Selected Answer: Answers:



Fals e True Fals e

Question 23 10 out of 10 points Fr equenc yanal y si sal onei ssuffici entt obr eakaOneTi mePad

Selected Answer: Answers:



Fals e True Fals e

Question 24 10 out of 10 points What is the block size for the AES algorithm?

Selected Answer: Answers:

128 bits 256 bits 32 bits 192 bits 64 bits 128 bits 56 bits



Question 25 10 out of 10 points Which block cipher mode of operation effectively turns a block cipher into a stream cipher?

Selected Answer:

Output Feedback Mode (OFM)

Answers: Output Feedback Mode (OFM) Cipher Block Chaining (CBC) Galois/Counter Mode (GCM) Electronic Code Book (ECB)...


Similar Free PDFs