Cryptanalysis is used

Cryptanalysis is used




a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned


Answer: A

What is data encryption standard (DES)?

What is data encryption standard (DES)?




a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned


Answer: A

In cryptography, what is cipher?

In cryptography, what is cipher?




a) algorithm for performing encryption and decryption
b) encrypted message
c) both (a) and (b)
d) none of the above



Answer: A

What is Vulnerability?

What is Vulnerability? 



A) protecting the information from disclosure to unauthorized parties.
B) protecting information from being modified by unauthorized parties
C) ensuring that authorized parties are able to access the information when needed
D) flaw in a system that can leave it open to attack



Answer: D

What is Availability?

What is Availability? 



A) protecting the information from disclosure to unauthorized parties.
B) protecting information from being modified by unauthorized parties
C) ensuring that authorized parties are able to access the information when needed
D) flaw in a system that can leave it open to attack





Answer: C

What is Integrity?

What is Integrity?



A) protecting the information from disclosure to unauthorized parties.
B) protecting information from being modified by unauthorized parties
C) ensuring that authorized parties are able to access the information when needed
D) flaw in a system that can leave it open to attack




Answer: B

What is Confidentiality?

What is Confidentiality? 



A) protecting the information from disclosure to unauthorized parties.
B) refers to protecting information from being modified by unauthorized parties
C) ensuring that authorized parties are able to access the information when needed
D) flaw in a system that can leave it open to attack



Answer: A

Best effort end-to-end delivery

Best effort end-to-end delivery 




A) Data link layer
B) Network layer
C) Physical layer
D) Transport layer



Answer: D

Move bits

Move bits 




A) Data link layer
B) Network layer
C) Physical layer
D) Transport layer



Answer: C

Point-to-point delivery

Point-to-point delivery 



A) Data link layer
B) Network layer
C) Physical layer
D) Transport layer




Answer: A

What is Modification?

What is Modification? 


A) Changing without permission
B) Creating a new (illicit) version
C) Capturing without permission or making unauthorized copy
D) Blocking or breaking a pathway (link) of use




Answer: A

What is Fabrication?

What is Fabrication? 



A) Changing without permission
B) Creating a new (illicit) version
C) Capturing without permission or making unauthorized copy
D) Blocking or breaking a pathway (link) of use



Answer: B

What is interruption?

What is interruption? 



A) Changing without permission
B) Creating a new (illicit) version
C) Capturing without permission or making unauthorized copy
D) Blocking or breaking a pathway (link) of use



Answer: D

What is Interception?

What is Interception?



A) Changing without permission
B) Creating a new (illicit) version
C) Capturing without permission or making unauthorized copy
D) Blocking or breaking a pathway (link) of use



Answer: C