This section contains more frequently asked System Security and Computer Crime Multiple Choice Questions Answers in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. What is the difference between a worm and virus?

  • A worm does not replicate itself like a virus does, but rather moves from computer to computer
  • A virus infects files, while a worm eats them
  • A worm is a virus created for a very specific purpose
  • Unlike a virus, a worm does not need to attach itself to a program to spread.

2. Which of the following represents a cryptographic key that is intended to be used for a long period of time?

  • Private key transport key
  • Public authentication key
  • Public signature verification key
  • Private static key agreement key

3. Which of the following is a VALID ephemeral key?

  • Asymmetric ephemeral random number generation keys
  • Public ephemeral verification key
  • Symmetric ephemeral random number generation keys
  • Public ephemeral key agreement key

4. Which of the following enables secure and private data exchange/transfer on an unsecure public network ?

  • Public Key Infrastructure
  • Virtual Key Infrastructure
  • Private Key Infrastructure
  • All of the given options are correct

5. Which of the following keys are used to encrypt other keys using symmetric key algorithms ?

  • Symmetric random number generation keys
  • Asymmetric random number generation keys
  • Symmetric key wrapping key
  • Public signature verification key

6. Which of the following keys are used to encrypt other keys using symmetric key algorithms ?

  • Symmetric random number generation keys
  • Asymmetric random number generation keys
  • Symmetric key wrapping key
  • Public signature verification key

7. Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?

  • Virus
  • Spyware
  • Fraudtool
  • Malware

8. In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections?

  • presentation layer
  • Both session and presentation layer
  • session layer
  • application layer

9. Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?

  • Public signature verification key
  • Private signature key
  • Public key transport key
  • Private key transport key

10. Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?

  • Private signature key
  • Private key transport key
  • Public signature verification key
  • Public authentication key
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook