This section contains more frequently asked Cryptography and Network Security MCQs in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Modern secure password storage should implement:

  • Salted plain-text values of the password
  • Hashed values of the password
  • Plain-text passwords stored in an encrypted database
  • Salted and hashed values of the password

2. What is network topology?

  • It is the inner networkings of a single computer.
  • It is the top layer of a computer network.
  • It is the framework of the components of a computer network.
  • It is the entirety of the data of a computer network.

3. Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?

  • Spware
  • Virus
  • Trojan Horse
  • Botnets

4. What is another name for Internet Layer?

  • TCP layer
  • Interwebs
  • IP layer
  • SSL layer

5. Which of the following is the collective name for Trojan horses, spyware, and worms?

  • Spware
  • Botnets
  • Virus
  • Malware

6. When cookies are used as session identifiers, how are they then used as a potential security hazard?

  • They emulate user's by downloading all the victims information onto a virtual machine.
  • User's cookies are altered to a virus-like state.
  • They emulate user's by stealing their personal identity.
  • Attackers emulate users by stealing their cookies.

7. Which of the following is a valid flaw of SSL 2.0 ?

  • It does not have any protection for the handshake
  • Identical cryptographic keys are used for message authentication and encryption
  • It has a weak MAC construction that uses the MD5 hash function with a secret prefix
  • All of the given options are correct

8. Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?

  • X.507
  • X.519
  • X.508
  • X.509

9. Trojan Horse programs operate with what intent?

  • To slowly but surely infect and become your operating system until the system crashes.
  • To openly exploit a systems weaknesses until the user discovers it.
  • To masquerade as non-malicious software while exploiting a system's weaknesses.
  • To do a series of brute force attacks within the system itself and a series of external attacks from other servers

10. Why is a virtual machine considered a sandboxing method?

  • Virtual machines all have firewalls, virus scanners, and proxy connetions.
  • Virtual machines all have sandbox features installed on them.
  • Virtual machines take the brunt of the attack, so the user is always safe.
  • All host resources are channeled through the emulator.
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook