adplus-dvertising
1. Consider the two statements.
(A) Protection is an internal problem.
(B) Security is considered as an external environment within which the system works.
Which of the statement is not true?
a. Only A
b. Only B
c. Both A and B
d. None of the above
Discuss
Answer: (d).None of the above

2. Which of the following is true ?
a. Block cipher technique is an encryption technique.
b. Steam cipher technique is an encryption technique.
c. Both a and b.
d. Neither of a and b.
Discuss
Answer: (c).Both a and b.

3. Program generation activity aims at
a. Automatic generation of program
b. Organize execution of a program written in PL
c. Skips generation of program
d. Speedens generation of program
Discuss
Answer: (a).Automatic generation of program

4. The main reason to encrypt a file is to ______________.
a. Reduce its size
b. Secure it for transmission
c. Prepare it for backup
d. Include it in the start-up sequence
Discuss
Answer: (b).Secure it for transmission

5. A public key encryption system
a. Allows only the correct receiver to decode the data
b. Allows only one to decode the transmission
c. Allows only the correct sender to decode the data
d. Does not encode the data before transmitting it
Discuss
Answer: (a).Allows only the correct receiver to decode the data

6. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message.
a. (I) and (II) only
b. (I) only
c. (II) only
d. (II) and (III) only
Discuss
Answer: (b).(I) only

7. In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________.
a. 11
b. 13
c. 16
d. 17
Discuss
Answer: (a).11

8. Which of the following are forms of malicious attack ?
a. Theft of information
b. Modification of data
c. Wiping of information
d. All of the mentioned
Discuss
Answer: (d).All of the mentioned

9. What are common security threats ?
a. File Shredding
b. File sharing and permission
c. File corrupting
d. File integrity
Discuss
Answer: (b).File sharing and permission

10. From the following, which is not a common file permission ?
a. Write
b. Execute
c. Stop
d. Read
Discuss
Answer: (c).Stop

Page 1 of 14