Sie sind auf Seite 1von 9

Contact www.solvedcare.

com for best and lowest cost solution or email solvedcare


@gmail.com

Information Security V1
Assignment A
Q1.) Explain the Network Role-Based Security for E-mails, Proxy Servers, DNS Ser
vers, Web Servers and Credit Card Security.
Q2.) Describe the criteria required for Security Policy Development to improve t
he security architecture.
Q3.) Give the answer for following questions:
a) Explain the Network Security Model with neat and clean diagram.
b) Describe the impacts of Active Attack and Passive Attack over wireless
network.
Q4.) Discuss the impacts of Viruses & Worms to generate malicious code as an att
ack for Information Security.
Q5.) Give the answer for following questions:
a)
Describe the role of Virtual Private Network Security in wireles
s data communication.
b)
ty.

Explain the Authentication and Authorization Controls for physical securi

Assignment B
Q.l Numerical Problem
Discuss Hill Cipher Encryption Technique in Cryptography. Using H
ill Cipher Technique, encrypt the plaintext "AFRICA", if encryption key is giv
en as

Q2). Give the answer for following questions:


a) Describe the physical intrusion detection techniques for access control.
b) Explain the role of Kerberos as an authorization technique to enhance
Information Security.
Q3). Discuss the current security threats for Information Security. How can you
protect your network from such threats?
Q4). Give the answer for following questions:
a)

Explain the IT laws which are affecting information security professional.

b)

Describe the role of Firewall in Network Security Architecture.

Assignment C
1. Protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, perusal, inspection, recording or destruct
ion is called
a) Network Security
b) Information Security
c) System Security
d) None of these
2. The nature of eavesdropping on, or monitoring of, transmissions comes under t
he
category of
a) Active Attack
b) Passive Attack
c) Simple Attack
d) None of these
3. If an unauthorized party gains access to the system and inserts false objects
into it, this is
called as
a) Interruption
b) Modification
c) Fabrication
d) Interception
4. Which service is concerned with assuring that a communication is authentic?
a) Data Integrity
b) Non Repudiation
c) Confidentiality
d) Authentication
5. The science of devising methods that allow information to be sent in a secure
form in
such a way that the only person able to retrieve this information is the intende
d recipient is
called
a) Cryptography
b) Steganography

c) Bibliography

d) None of these
6. Which type of cryptography refers to a cryptographic system requiring two sep
arate
keys, one of which is secret and one of which is public.
a) Public Key Cryptography
b) Simple Cryptography
c) Symmetric Key Cryptography
d) None of these
7. In which principle, the message is broken into blocks, each of which is then
encrypted i.e.
like a substitution on very big characters - 64-bits or more?
a) Block Cipher Principle
b) Stream Cipher Principle
c) Confusion & Diffusion Principle
d) None of these
8. The Claude Shannon theoretically introduced the following principles that sho
uld be
followed to design se-cure cryptographic systems.
a) Block Cipher Principle
b) Stream Cipher Principle
c) Confusion & Diffusion Principle
d) None of these
9. Which algorithm was developed in the early 1970s at IBM and based on an earli
er design
by Horst Feistel, the algorithm was submitted to the National Bureau of Standard
s (NBS) for
the protection of sensitive, unclassified electronic government data?
a)DES
b) Triple DES
c)AES
d)RSA
10. Which algorithm uses a 64 bit key as input? Out of the 64 bits every 8th bit
is ignored
and only 56 bits are used.

a) DES
b) Triple DES c)AES

d)RSA
11. Which algorithm describes the use of three keys in the following encryption
and
decryption process?
^ = C.K3 [DK2 [Eki (P))]
P = DK3 [EK2 (Dki(C))]
a)DES
b) Triple DES
c)AES
d)RSA
12. Which mode of operation describes the process of encrypting each of these bl
ocks, and
generally uses randomization based on an additional input value, called as initi
alization
vector?
a) Symmetric Cipher Mode
b) String Cipher Mode
c) Block Cipher Mode
d) None of these
13. Two integers a and b are said to be congruent modulo n, if
a)

a = bmod/?

b) a = n mod b
c)

b = amodn

d) None of these
14. Two numbers are said to be relatively prime to each other if there is no fac
tor common
between them other than
a)l b)2 c)3 d)0
15. Which theorem states that if 'p' is a prime number and 'a' is a positive int
eger not
divisible by p, then jaP1 = 1 mod p

a) Fermat's Principle
b) Chinese Remainder Theorem
c) Euclidian Theorem
d) Euler's Theorem
16.
Which algorithm describes that for every a and n that are relatively pr
ime as
n
=1 nwo n ^
a) Fermat's Principle
b) Chinese Remainder Theorem
c) Euclidian Theorem
d) Euler's Theorem
17. In which encryption each communicating party generates a pair of keys?
a) Public Key Encryption
b) Symmetric Key Encryption
c) Private Key Encryption
d) None of these
18. Authentication refers to the genuineness of the communicating entities. For
example if A
and B are communicating, both A and B should be aware of each other's
a) Identity
b) Network
c) Application
d) None of these
19. The process of verifying the integrity and authenticity of transmitted messa
ges is called
a) Message Authentication
b) Message Integrity
c) Message Inspection
d) None of these
20. The message authentication function includes
aJ Message Encryption
b)MAC

CJ Hash Function d) All of the above


21. Which version of hash function chosen in a public review process from non-go
vernment
designers?
a) SHA-0
b) SHA-1
c) SHA-2
d) SHA-3
22. Which version of message-digest algorithm takes as input a message of arbitr
ary length
and produces as output a 128-bit "fingerprint" or "message digest" of the input?
a)MD2 b)MD4 c)MD5 d) None of these
23. Which attack is a type of cryptographic attack that exploits the mathematics
behind the
birthday problem in probability theory?
a) Brute Force Attack
b) Birthday Attack
c) Cryptanalysis
d) None of these
24. Which scheme typically consists of three algorithms as key generation, signi
ng
algorithm and signature verification?
a) Digital Signature
b)MD5
c)RSA
d)SHA
25. Which management has two main aspects of distribution of public keys and use
of
public key encryption to distribute secret keys?
a) Key Management

b) Protocol Management
c) Distribution Management
d) None of these
26. Which certificates allow key exchange without real time access to public key

authority?
a) Public Key Certificates
b) Private Key Certificates
c) Digital Certificates
d) All of the above
27. The 1st published public-key algorithm was invented by Whitfield Diffie and
Martin
Hellman in 1976. Which name was referred to this algorithm?
a) Whitfield-Martin key exchange
b) Diffie-Hellman key sharing
c) Whitfield-Martin key generation
d) Diffie-Hellman key exchange.
28. Which key is associated with the identity contained in the X.509 certificate
?
a) Private Key
b) Public Key
c) Symmetric Key
d) None of these
29. Which is a security architecture that has been introduced to provide an incr
eased level
of confidence for exchanging information over an increasingly insecure Internet?
a)PKI
b) Digital Signature
c) X.509
d) None of these

30. Which protocol uses strong cryptography so that a client can prove its ident
ity to a
server (and vice versa) across an insecure network connection?
a) Kerberos b)PGP
c) MIME
d) None of these
31. Which authentication protocol was developed by Phil Zimmerman, who developed
this
encryption system for humanitarian reasons?

a) Kerberos b)PGP
c) MIME
d) S/MIME
32. Which protocol provides the cryptographic security services for electronic m
essaging
applications?
a) Kerberos b)PGP
c) MIME
d) S/MIME
33. Which member of IPSec protocol suite provides connectionless integrity and d
ata origin
authentication for IP datagram and provides protection against replay attacks?
a) Authentication Headers (AH)
b) Encapsulating Security Payloads (ESP)
c) Security Associations (SA)
d) None of these
34. Which protocol was originally developed by Netscape, to ensure security of
data
transported and routed through HTTP, LDAP or P0P3 application layers?
a) Authentication Headers (AH)
b) Encapsulating Security Payloads (ESP)
c) Security Associations (SA)
d) Secure Socket Layer (SSL)

35. Which protocol is used to initiate a session between the server and the clie
nt?
a)

SSL

b) Handshake Protocol c)ESP


d) None of these
36. Which protocol has the potential to emerge as a dominant force in the securi
ng of
electronic transactions?
a) Digital Signature
b)SSL

c)ESP
d) Secure Electronic Transactions (SET)
37. Which security mechanisms of a system are designed to prevent unauthorized a
ccess to
system resources and data?
a) IDS
b) Firewall
c) Antivirus Software
d) None of these
38. Which software is a code or software that is specifically designed to damage
, disrupt,
steal, or in general inflict some other "bad" or illegitimate action on data, ho
sts, or
networks?
a) Malicious Software
b) Freeware
c) Antivirus
d) Firewall
39. Which security mechanism protects networked computers from intentional host
ile
intrusion that could compromise confidentiality or result in data corruption or
denial of
service?
a) Firewall

b) Antivirus
c) Honeypot d]IDS
40. Which law touches almost all aspects of transactions and activities on and c
oncerning the Internet, the World Wide Web and Cyberspace?
a) IT Law
b) IT Act
c) Cyber Law
d) None of these
Contact www.solvedcare.com for best and lowest cost solution or email solvedcare
@gmail.com

Das könnte Ihnen auch gefallen