This section contains more frequently asked Cryptography and Network Security MCQs in the various competitive exams.
1. Modern secure password storage should implement:
- Salted plain-text values of the password
- Hashed values of the password
- Plain-text passwords stored in an encrypted database
- Salted and hashed values of the password
2. What is network topology?
- It is the inner networkings of a single computer.
- It is the top layer of a computer network.
- It is the framework of the components of a computer network.
- It is the entirety of the data of a computer network.
3. Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
- Spware
- Virus
- Trojan Horse
- Botnets
4. What is another name for Internet Layer?
- TCP layer
- Interwebs
- IP layer
- SSL layer
5. Which of the following is the collective name for Trojan horses, spyware, and worms?
- Spware
- Botnets
- Virus
- Malware
- They emulate user's by downloading all the victims information onto a virtual machine.
- User's cookies are altered to a virus-like state.
- They emulate user's by stealing their personal identity.
- Attackers emulate users by stealing their cookies.
7. Which of the following is a valid flaw of SSL 2.0 ?
- It does not have any protection for the handshake
- Identical cryptographic keys are used for message authentication and encryption
- It has a weak MAC construction that uses the MD5 hash function with a secret prefix
- All of the given options are correct
8. Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
- X.507
- X.519
- X.508
- X.509
9. Trojan Horse programs operate with what intent?
- To slowly but surely infect and become your operating system until the system crashes.
- To openly exploit a systems weaknesses until the user discovers it.
- To masquerade as non-malicious software while exploiting a system's weaknesses.
- To do a series of brute force attacks within the system itself and a series of external attacks from other servers
10. Why is a virtual machine considered a sandboxing method?
- Virtual machines all have firewalls, virus scanners, and proxy connetions.
- Virtual machines all have sandbox features installed on them.
- Virtual machines take the brunt of the attack, so the user is always safe.
- All host resources are channeled through the emulator.