adplus-dvertising
1. Consider the two statements.
(A) Protection is an internal problem.
(B) Security is considered as an external environment within which the system works.
Which of the statement is not true?
a. Only A
b. Only B
c. Both A and B
d. None of the above
Answer: (d).None of the above

2. Which of the following is true ?
a. Block cipher technique is an encryption technique.
b. Steam cipher technique is an encryption technique.
c. Both a and b.
d. Neither of a and b.
Answer: (c).Both a and b.

3. Program generation activity aims at
a. Automatic generation of program
b. Organize execution of a program written in PL
c. Skips generation of program
d. Speedens generation of program
Answer: (a).Automatic generation of program

4. The main reason to encrypt a file is to ______________.
a. Reduce its size
b. Secure it for transmission
c. Prepare it for backup
d. Include it in the start-up sequence
Answer: (b).Secure it for transmission

5. A public key encryption system
a. Allows only the correct receiver to decode the data
b. Allows only one to decode the transmission
c. Allows only the correct sender to decode the data
d. Does not encode the data before transmitting it
Answer: (a).Allows only the correct receiver to decode the data

6. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message.
a. (I) and (II) only
b. (I) only
c. (II) only
d. (II) and (III) only
Answer: (b).(I) only

7. In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________.
a. 11
b. 13
c. 16
d. 17
Answer: (a).11

8. Which of the following are forms of malicious attack ?
a. Theft of information
b. Modification of data
c. Wiping of information
d. All of the mentioned
Answer: (d).All of the mentioned

9. What are common security threats ?
a. File Shredding
b. File sharing and permission
c. File corrupting
d. File integrity
Answer: (b).File sharing and permission

10. From the following, which is not a common file permission ?
a. Write
b. Execute
c. Stop
d. Read
Answer: (c).Stop

Page 1 of 14