What is data encryption standard (DES)? a) 1 Answer: c a) passive This is referred to as the avalanche effect. Explanation: Sniffing which is also known as wiretapping is data interception method used by hackers. DNS poisoning is very dangerous because it can extend its reach from one DNS server to another. b) Procedure b) Physical Layer DoS Find out what is the full meaning of WTLS on Abbreviations.com! 218 = 274 distinct ciphertexts which all decrypt to plaintexts of length 56. d) If the plaintext/message is not an integer multiple of the cipher clock length eighteen 32-bit sub keys + four 8×32-bit s boxes = 4168. b) SATAN b) DoS attack Explanation: The OSI model is 7-layer architecture where each layer is having some specific functionality to perform. These are – Applications call access control to provide resources. d) Wireless Transport System Layer Answer: c 12. c) keyed hash function b) flow control Explanation: Router error is not a type of error-reporting message in ICMP. Explanation: In the AES-128 there are 9 similar rounds and the last round is different. d) Buffer Overflow attack What is one advantage of setting up a DMZ with two firewalls? d) DES b) Spoofing and hijacking of data based on failed authentication attempts A program that copies itself. d) Network layer firewall and session layer firewall Find out what is the full meaning of MCQS on Abbreviations.com! Explanation: Rabin Cryptosystem is a variant of the RSA Cryptosystem. The intent of this attack is to overkill the targeted server’s bandwidth and other resources of the target website. The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___________ bytes. b) 64; 128 or 192 Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________ Answer: d View Answer, 3. Which is not an objective of network security? The inverse of 3 modulo 7 is? c) 8 ; the first and last d) to make new ciphers Explanation: The client_key_exchange message uses a pre master key of size 48 bytes. a) 4096 Answer: b c) RSN 17. 11. Answer: c a) server_hello Answer: a d) 4864 Phase 2 : Server Authentication and Key Exchange Explanation: A DoS attack coming from a large number of IP addresses, making it hard to manually filter or crash the traffic from such sources is known as a Distributed Denial of Service (DDoS) attack. An algorithm in encryption is called _____________ All these layers work in collaboration for transmitting the data from 1 person to another worldwide. Answer: b View Answer, 4. a) MAC Address Spoofing c) 256 It is to be entered into a command line with the syntax “ping (IP address)” to be executed. Phase 4 : Finish/ End. Explanation: DMZ stands for De-Militarized Zone. Answer: a Which Extension among the following does this refer to? ______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings. a) Physical theft of data & hardware These types of software keep on collecting personal information, surfing habits, surfing history as well as credit card details. 6. c) 8, 16, 32 b) Anonymous Diffie-Hellman Answer: c The default key size of RC2 Feistel cipher is _______ Answer: b Explanation: An ICMP message has an 8-byte header and a variable size data section. c) Direct Distribution of Service b) Identity & Resource ID Vulnerability CRL stands for Verify your answers with MCQ on The Tale of Custard the Dragon provided and know where you went wrong. A program created by Farmer and Venema for auditing capability. In Elgamal cryptosystem, given the prime p=31. c) poor handling of unexpected input b) shell It is the process of making the information readable again. 54. Explanation: Poor handling of unexpected input is an example of presentation layer vulnerability. c) DNS query flooding d) quadratic ciphers Answer: a Explanation: Linear Crypt-analysis requires only 243 computations to decipher the DES algorithm. Explanation: For Double DES key is 2112 bits, should require 2111 tests to break. Explanation: Sniffing is data interception method which can be done using hardware also. Explanation: AES 192 performs 12 rounds. WTLS is listed in the World's largest and most authoritative dictionary database of abbreviations and acronyms The Free Dictionary b) 64 words c) certificate_request ii) Fixed Diffie-Hellman Answer: a b) 07 __________________ are those devices which can be plugged into your network at the hardware level & it can monitor traffic. a) True Wireless Transport Security Layer Wireless Transfer System Layer Wireless Transfer Security Layer Wireless Transport System Layer. 31. In AES the 4×4 bytes matrix key is transformed into a keys of size __________ Explanation: By using the Euclidean algorithm. 28. Answer: a UDP protocol is not susceptible to sniffing attack. Explanation: If a suspicious gain access to server room or into any confidential area with a malicious pen-drive loaded with malware which will get triggered automatically once inserted to USB port of any employee’s PC; such attacks come under physical hacking, because that person in gaining unauthorized physical access to any room or organization first, then managed to get an employee’s PC also, all done physically – hence breaching physical security. 56. b) 51 2. Answer: a 14. 20. Answer: b v) Fortezza. b) 32 Bits a) error control Enhance your subject knowledge through The Tale of Custard the Dragon MCQ Online Test and lay a stronger foundation of your basics. 12. a) True b) Denial of service d) RSA Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. Everyday jobs like conducting transactions and communications among business and government agencies etc. a) Cloud sessions a) HTTP a) Wireless Transport Security Layer Social Ways of Overcoming Threats. b) DNS cracking 24. Which of the following is an example of session layer vulnerability? c) 66 Answer: a c) App controller If the compression function is collision resistant, then so is the resultant iterated hash function. Explanation: We can use either of the following for the CipherSuite key exchange- 15. Ciphertext = C ≡ P2 (mod n) Answer: a WAP stands for Wireless Application Protocol.It is a protocol designed for micro-browsers and it enables the access of internet in the mobile devices. An attack in which the site is not capable of answering valid request. Follow For Latest Updates, Study Tips & More Content! Answer: d Answer: a Answer: c A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures. 3. 25. d) Worms 26. iii) Ephemeral Diffie-Hellman c) App controller The process of verifying the identity of a user. 29. Answer: a 13. c) 23 The only issue with it is that it returns the same hash value every time for a message making it vulnerable to attackers to evaluate and break the cipher. Explanation: DoS attacks are of two types. 16. 72. Answer: b 50. All Rights Reserved. Explanation: XOR and addition operations take place on bytes of size 32 bits. 30. Secondly, it warns the source that there is congestion in the network. b) 16, 32, 64 Finally, you can also take the Online Quiz from the Take Satellite Communication Quiz Button. A firewall needs to be __________ so that it can grow proportionally with the network that it protects. d) OIS Explanation: WEP stands for Wired Equivalent Privacy. d) byte cipher 1. b) Cipher-based MAC It has been used since the year 1996. a) Malfunctioned Software c) 4 Make Your Self Placement Ready with Python Zero to Hero Mentorship Program  Click Here. b) False b) False It is a vulnerability of data link layer. b) transport layer security (TLS) 40. View Answer, 2. a) MAC Address Spoofing a) key code P = “L” = 11; C1 = 37 mod 31 = 17; C2 = 11 x 25 mod 31 = 27; C = (17,27). d) 36 words Custom B. K2 is derived by left shifting L by 2 bits. Explanation: None. a) 44 words b) Round-trip time a) (-1)*10 + 1*11 It’s used to increase the confidentiality of the messages. Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various systems & their connections for flooding the targeted website. d) block cipher method A small program that changes the way a computer operates. 57. -using 12 rounds Introduced in 1999, WAP achieved some popularity in the early 2000s, but by the 2010s it had been largely superseded by more modern standards. A person who enjoys learning details about computers and how to enhance their capabilities. b) Routers Explanation: For stream cipher, if there are n ciphertexts then there are n*(n−1)/2 combination of keys to be made. Answer: b c) Circuit Hardware authentication protocol 21. An attack in which the site is not capable of answering valid request. c) poor handling of unexpected input WML is the markup language defined in the WAP specification. -Permutation a) True b) Data-link Layer b) Virus What is the preferred way of encryption? d) Weak or non-existent authentication Explanation: Weak or non-existent mechanisms for authentication is an example of session layer vulnerability. d) 5 Answer: b a) Eavesdropping 7. 42. b) Challenge Hardware authentication protocol Explanation: A hash function providing message authentication is referred to as massage digest. 78. b) substitution ciphers d) Signature Prepare For Your Placements: https://lastmomenttuitions.com/courses/placement-preparation/, / Youtube Channel: https://www.youtube.com/channel/UCGFNZxMqKLsqWERX_N2f08Q. The criticality indicator indicates whether an extension can be safely ignored. iv) Anonymous Diffie-Hellman i) Substitute Bytes d) IMAP a) -1 d) Wireless Transport System Layer c) 10110110 An algorithm used in encryption is referred to as cipher. A) A mobile Unit B) A cell Site C) A mobile Telephone Switching Office D) All of the above 2. b) 76 Explanation: WTLS is Wireless Transport Security Layer. The number of rounds in RC5 can range from 0 to _____________ d) application d) Whirlpool Explanation: AES rounds involve substitute bytes, shift rows, mix columns and addition of round key. d) Weak or non-existent authentication Answer: a c) X1 X2 X2 B b) Trojan d) Weak or non-existent authentication It’s used to increase the confidentiality of the messages. Explanation: The Feistel structure system TEA operates on two 32-bit unsigned integer numbers. d) 2119 a) Physical Theft of Data d) All of the mentioned constitute the Extension master_key should not be used, the pre_master key should be used c) 1*10 + (-1)*11 54. Answer: a c) SAN Answer: d It is used to make sure that the scheme is least vulnerable to attacks. Explanation: The key size is 2168 and meet in the middle attack takes 2112 tests to break. 19. C Programs. Which of these systems use timestamps as an expiration date? a) SSL certificates 66. a) True b) Identification 76. 40. This category includes HTTP flooding, slow-flooding attack and DNS query flooding. b) 7345 c) Network Security a) NNTP It is a technique used for monitoring & capturing all data packets passing through any target network. b) Domain Name Server 2. 23. d) 10(mod 9) Answer: b b) Wireless Transfer System Layer 41. How many combinations of keys can be constructed from a 72 ciphertext stream cipher? It is able to control applications or services specifically, unlike a stateful network firewall, which is – without additional software – unable to control network traffic regarding a specific application. 17. c) Password cracker 29. During debugging, we can use the ____________ program to find if a host is alive and responding. Explanation: The program is called virus. Explanation: Very complex application security controls can be an example of application layer vulnerability. Explanation: VLAN circumvention is an example of data-link layer vulnerability. Explanation: With the help of DoS attack attackers try to busy its users by flooding the URL of the victim with limitless requests. Explanation: PGP recommends the use of RSA. The process of transforming plain text into unreadable text. b) Encryption A person who enjoys learning details about computers and how to enhance their capabilities. Explanation: The person is called hacker. It provides security between the mobile device and the WAP gateway to internet. 73. Likewise KDC or symmetric key can have breach which are undesirable. Which of the following do not comes under network layer DoS flooding? Explanation: pad_2 = is the byte 0x5C repeated 48 times for MD5. a) Remote Unauthorised access Network layer firewall has two sub-categories as _________ Answer: b