Exit Exam Model
Exit Exam Model
Part I: multiple choice: choose the correct answer from the given alternatives. (15 pts)
1. Among the following which security criteria guarantees that no modification, addition, or
deletion is done to the message?
A. Authentication C. Confidentiality
B. Non-repudiation D. Integrity
Answer: D
2. From the following which is passive attack?
A. Modification C. Impersonating
B. Denial of service D. None of the above
Answer D
3. ________ is a program that can replicate itself and send copies from computer to computer
across network connections.
A. Virus C. Trojan horse
B. Worm D. Zombie
Answer: B
4. Among the following which malicious code is embedded in some legitimate program that is set
to explode when certain conditions are met?
A. Rootkit C. Zombie
B. Logic bomb D. None of the above
Answer: B
5. Which type of virus uses compression technique so that the infected program is exactly the
same length as an uninfected version?
A. Boot sector virus C. Parasitic virus
B. Stealth virus D. None of the above
Answer: B
6. _____is the sequence of data processing steps that go into transforming ciphertext back into
plaintext.
A. Enciphering C. Decryption algorithm
B. Encryption algorithm D. Deciphering
Answer: C
7. Which encryption technique use the same key for encryption and decryption?
A. Symmetric C. A and B
B. Asymmetric D. None
1
Answer: A
8. From the following which cryptographic technique uses different keys to encrypt and decrypt
the data?
A. Blowfish C. RC2
B. DES D. RSA
Answer: D
9. Among the following which cryptographic technique reorder binary word bits of plaintext to
form ciphertext?
A. Substitution ciphering C. A and B
B. Permutation ciphering D. None of the above
Answer:B
10. Among the following which produces a fixed length value called a hash or message digest?
A. RC4 C. MD4
B. RC5 D. RSA
Answer: C
11. Data encryption standard is a block cipher and encrypts data in blocks of size of _____
A. 16 bits C. 32 bits
B. 64 bits D. All of the mentioned above
Answer: B
12. Which of the following is not a type of symmetric-key cryptography technique?
Answer: B
13. ______ means concealing the message itself by covering it with something else
A. Cryptography C. A and B
B. Steganography D. None of the above
Answer: B
2
A. Traffic analysis
B. Denial of service
C. Masquerade
D. Replay previous message
Answer: A
16. Among the following which is true about record protocol of SSL?
A. It fragments the data into manageable blocks
B. It is used to report errors
C. A and B
D. None of the above
Answer: A
17. From the following which is false about IPsec?
A. It works with both TCP and UDP
B. It is designed to work with TCP only
C. There is no need to change software on a user or server system when IPSec is implemented in
the firewall or router
D. None
Answer: B
18. One of the following is true about IPsec in transport mode?
A. It secure information delivered from application layer to transport layer
B. It protect message delivered from transport layer to network layer
C. It protect message passed down from network layer to data link layer
D. None
Answer: B
19. Among the following which is the security service provided by IPSec?
A. Data origin authentication C. Encryption of user data for privacy
B. Rejecting replayed packets D. All of the abov
Answer: D
20. Which IPsec communication mode is used when we want host to host or end to end protection
of the data?
A. Tunnel mode C. A and B
B. Transport mode D. None
Answer: B
21. ____ is a computer program that acts as an intermediary between a web browser and a web
server?
A. Packet filtering firewall C. Circuit gateway firewall
B. Proxy D. None of the above
3
Answer: B
23. ____is one way relationship between a sender and a receiver that provides security services
(authentication and confidentiality)?
A. Authentication Header(AH) C. IPSEC-security association
B. Encapsulating Security Payload(ESP) D. None of the above
Answer: C
24. From the following which firewall work at application layer?
A. Packet filtering firewall C. A and B
B. Proxy server D. None of the above
Answer: B
25. Among the following which packet information is used by packet filtering firewall to filter a
packet?
A. Source IP Address C. Source and Destination port Address
B. Destination IP Address D. All of the above
Answer: D
26. From the following which is transport layer security protocol?
A. PGP C. SSH
B. A and B D. None
Answer :C
27. A situation in which one person or program successfully imitate another by falsifying data
and thereby gaining an illegitimate advantage is called___.
A. TCP SYN flood attack C. A and B
B. Spoofing attack D. None
Answer: B
28. One of the following is true about encapsulated security payload(ESP) tunnel mode
communication
A. Original IP header is used for routing decision
B. It only protect IP payload
C. It encrypt IP payload and IP header
D. All of the above
Answer: C
4
29. Among the following which technology establish one’s identity based on personal traits.
A. Access control system C. A and B
B. Biometric technology D. None
Answer: B
5
Page 6 of 6