1.Accuracy of information
2. Change control
4.Prevention of fraud
1.Encryption of data
In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware.
1. URL Redirection
In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.
The intent of a __________ is to overkill the targeted serverâ€™s bandwidth and otherresources of the target website.
2. DoS attack
2. Caesar cipher
3.Either (a) or (b)
4.Neither (a) nor (b)
A computer ________ is a malicious code which self-replicates by copying itself to otherprograms.
A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase.
AES stands for ________________.
1.Active Encryption Standard
2.Advanced Encrypted Standard
3.Advanced Encryption Standar
4.D Advanced Encryption Security
Data which is easily readable & understandable without any special algorithm ormethod is called _____________
DES stands for ________________.
1.Device Encryption Standard
2. Data Encrypted Standard
3.Data Encryption Security
4.Data Encryption Standard
During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted.
3.Data Driven Attacks
4. Unauthorized Attacks
1. Without deleting data, disposal of storage media
2. Latest patches and updates not done
4.D Unchanged default password
In brute force attack, on average half of all possible keys must be tried to achievesuccess.
In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.
4.D Block Cipher
3. Data analysis
Masquerading is _______.
1.Attempting to hack a system through backdoors to an operating system or application.
2.Pretending to be an authorized user
3.Always done through IP spoofing
4.Applying a subnet mask to an internal IP range
n Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
2. Shift Cipher
4. Block Cipher
Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system.
2.Malware, Penetration Testers
3. Trojans, Cyber-Criminals
4.Virus, Penetration Testers
The first computer virus is__________.
1. Plain text
The word ________________is a combination of the Greek words â€˜steganosâ€™ which means â€œcovered or concealedâ€, and â€˜grapheinâ€™ which means â€œwritingâ€.
4.None of the above
The ________________ has piece of the keyword that has the same length as that of theplaintext.
4. Block Cipher
1.Credit card information
4.Securing systems with such programs
1. Deleting Data
When one participant in a communication pretends to be someone else, it is called_________?
2. Data Driven Attacks
3. Data Driven Attacks
4. Burp Suite
__ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
___ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.
1. Network Security
3. Information Security
____ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.
_____ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.
2. Caesar Cipher
_____ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEOâ€™s and important celebrities.
1.Message Authentication Code
______ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.
2.Boot Sector Virus
3. Polymorphic Virus
_______ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets â€˜shiftedâ€™ by some fixed quantity.
__________ infects the master boot record and it is challenging and a complex task toremove this virus.
1.Boot Sector Virus
___________ employs a text string as a key that is implemented to do a series ofshifts on the plain-text.
___________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.
____________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa.