Ethical Hacking Quiz 7
Which of the following statements is true for Masquerade attack?
A. In this attack, some portion of message is altered on its way.
B. In this attack, an attacker prevents access of resource to its legitimate users.
C. In this attack, the attacker pretends as a legitimate entity.
A. In this attack, some portion of message is altered on its way.
B. In this attack, an attacker prevents access of resource to its legitimate users.
C. In this attack, the attacker pretends as a legitimate entity.
The correct statement is: In a Masquerade attack, the attacker pretends as a legitimate entity.
Which of the following is an example of passive security attack?
A. Traffic analysis
B. Replay
C. Modification
D. Denial of Service
A. Traffic analysis
B. Replay
C. Modification
D. Denial of Service
The correct example of a passive security attack is Traffic analysis.
Which of the following statement(s) is/are true?
A. In symmetric key cryptography, separate keys are used by sender and receiver.
B. In symmetric key cryptography, a single key is used by sender and receiver.
C. In asymmetric key cryptography, separate keys are used by sender and receiver.
A. In symmetric key cryptography, separate keys are used by sender and receiver.
B. In symmetric key cryptography, a single key is used by sender and receiver.
C. In asymmetric key cryptography, separate keys are used by sender and receiver.
The correct statements are: In symmetric key cryptography, a single key is used by sender and receiver, and in asymmetric key cryptography, separate keys are used by sender and receiver.
Consider the following statement:
(i) In symmetric key cryptography, the security depends on secrecy of the key.
(ii) In symmetric key cryptography, the security depends on the secrecy of the encryption/decryption algorithm.
(i) In symmetric key cryptography, the security depends on secrecy of the key.
(ii) In symmetric key cryptography, the security depends on the secrecy of the encryption/decryption algorithm.
Only (i) is true.
25 parties want to exchange messages securely using a private key encryption algorithm. The number of distinct key values required will be ________.
The correct number of distinct key values required is 300.
Consider a cipher text “GVCTXSKVETLC” encrypted using a substitution cipher approach, where each letter is replaced by the k-th next letter.
Assumption:
(i) The alphabets are wrapped around, i.e. Z is followed by A.
(ii) Each alphabet (A to Z) is assigned a number (1 to 26).
(iii) The value of secret key k is 4. What will be the plain text?
Assumption:
(i) The alphabets are wrapped around, i.e. Z is followed by A.
(ii) Each alphabet (A to Z) is assigned a number (1 to 26).
(iii) The value of secret key k is 4. What will be the plain text?
The plain text for the given cipher text is CRYPTOGRAPHY.
Consider a mono-alphabetic cipher with the following key value: (ABWXEFSTIJOPMNKLQRGHUVCDYZ)
What will be the encrypted form of the message “ALPHABETIC”?
What will be the encrypted form of the message “ALPHABETIC”?
The encrypted form of the message “ALPHABETIC” is APLTABEHIW.
If a sender A wants to carry out encryption on a message and send it to receiver B using public-key cryptography, which of the following key will be used for decryption at receiver end B?
A. A’s public key
B. A’s private key
C. B’s public key
D. B’s private key
A. A’s public key
B. A’s private key
C. B’s public key
D. B’s private key
The key used for decryption at receiver end B is B’s private key.
The effective key length used in the AES encryption algorithm can be:
A. 64 bit
B. 128 bit
C. 192 bit
D. 256 bit
A. 64 bit
B. 128 bit
C. 192 bit
D. 256 bit
The effective key lengths used in AES are 128 bit, 192 bit, and 256 bit.
50 parties want to exchange messages securely using some public key encryption technique like RSA. The number of distinct key values required will be ________.
The number of distinct key values required will be 100.
Which of the following is/are examples of steganography?
A. Hiding some text information within an image file.
B. Hiding some text information within an audio clip.
C. Hiding some secret information within an executable file.
D. Encrypting an image file so that only the intended recipient can view it.
A. Hiding some text information within an image file.
B. Hiding some text information within an audio clip.
C. Hiding some secret information within an executable file.
D. Encrypting an image file so that only the intended recipient can view it.
Examples of steganography include hiding some text information within an image file, hiding some text information within an audio clip, and hiding some secret information within an executable file.
Consider a gray-level image of size 100 x 100, where each pixel is stored in 8-bits (representing a gray scale). The number of bytes of information can be hidden in the image by using the LSB steganography technique is _________.
The number of bytes of information that can be hidden in a 100 x 100 gray-level image using the LSB steganography technique is 1250.
Which of the following correspond to behavioral biometrics?
A. Biometrics that relate to human behavior.
B. Biometrics that relate to human body.
C. Biometrics that rely on the use of a powerful computer system.
A. Biometrics that relate to human behavior.
B. Biometrics that relate to human body.
C. Biometrics that rely on the use of a powerful computer system.
The correct option corresponding to behavioral biometrics is biometrics that relate to human behavior.
Which of the following is/are example(s) of physiological feature?
A. Retina
B. Fingerprint
C. Signature
D. Typing speed
A. Retina
B. Fingerprint
C. Signature
D. Typing speed
Examples of physiological features include retina and fingerprint.
Which of the following attacks refer to the situation where an attacker gains entry into the victim machine (or spoofs the IP address) and then sends a ping request to a broadcast address?
The attack described is known as a Smurf denial-of-service attack.
Which of the following is not an example of denial-of-service attacks?
A. SYN flooding attack.
B. Smurf attack.
C. Ping-of-death.
D. None of these.
A. SYN flooding attack.
B. Smurf attack.
C. Ping-of-death.
D. None of these.
The correct answer is none of these, as all the listed options are examples of denial-of-service attacks.
Which of the following is true for iterative name resolution?
A. A host may have to send multiple DNS requests to several DNS servers.
B. A host sends a single DNS request to its next higher-level DNS server.
C. Name resolution happens recursively within the host itself.
A. A host may have to send multiple DNS requests to several DNS servers.
B. A host sends a single DNS request to its next higher-level DNS server.
C. Name resolution happens recursively within the host itself.
The correct statement for iterative name resolution is that a host may have to send multiple DNS requests to several DNS servers.
Which of the following statement(s) is/are false for HTTP Flood attack?
A. It is exclusively a type of Distributed-Denial-of-Service (DDoS) attack.
B. It overwhelms a target server using oversized ping packets.
C. It overwhelms a target server with HTTP request.
A. It is exclusively a type of Distributed-Denial-of-Service (DDoS) attack.
B. It overwhelms a target server using oversized ping packets.
C. It overwhelms a target server with HTTP request.
The false statement for an HTTP Flood attack is it overwhelms a target server using oversized ping packets.
What is the full form of PGP?
A. Packet Group Protocol
B. Port Group Protocol
C. Pretty Good Privacy
A. Packet Group Protocol
B. Port Group Protocol
C. Pretty Good Privacy
The full form of PGP is Pretty Good Privacy.
Which of the following services are provided by PGP?
A. It provides authentication.
B. It provides confidentiality.
C. It ensures availability.
A. It provides authentication.
B. It provides confidentiality.
C. It ensures availability.
The services provided by PGP are authentication and confidentiality.
Also Available:
Leave a comment