ECC stands for
1. elliptic curve cryptography
2.enhanced curve cryptography
3.elliptic cone cryptography
4.eclipse curve cryptography
In asymmetric key cryptography, the two keys e and d, have special relationship to
1.others
2.data
3.keys
4.each other
In cryptography, the order of the letters in a message is rearranged by __________
1. transpositional ciphers
2.substitution ciphers
3.both transpositional ciphers and substitution ciphers
4.quadratic ciphers
In DES step both LPT and RPT undergoes in how much key Rounds?
1.8
2.16
3.32
4.64
In Symmetric schemes requires both parties to share how many secret key?
1.one
2.two
3.three
4. four
In the course of conducting forensic analysis, which of the following actions are carried out?
1. critical thinking
2.fusion
3.validation
4.All of the above
Security Measures Needed to protect ________ during their transmission
1.file
2.data
3.packet
4.All of the above
What is full form of DDoS?
1.derived denial of service
2.distributed denial ofservice
3.denial of service
4.None of these
What is lying of IP address called as?
1.. ip spoofing
2.ip scamming
3.ip lying
4.None of These
When reconstructing evidence surrounding a violent crime, it is generally helpful to:
1. lay out all the evidence so it can be viewed in its entirety
2. work with the crime scene technicians so that a better understanding of the crime is achieved
3.construct a timeline of events from digital evidence
4.begin the process of converting field notes to a final report
When you use the word ______it means you are protecting your data from getting disclosed.
1.confidentiality
2.integrity
3.authentication
4.availability
Which one of the following algorithm is not used in asymmetric-key cryptography?
1.rsa algorithm
2.diffie-hellman algorithm
3.electronic code book algorithm
4.dsa algorithm
. In AES in which Round Subkeys are Generated from Original key for each round?
1.key expansion
2.initial round
3.finale round
4.none of these
4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
1.secret key
2. external programs
3.add-ons
4.secondary key
A asymmetric-key (or public key ) cipher uses
1. 1 key
2.2 key
3.3 key
4. 4 key
A company requires its users to change passwords every month. This improves the ________ of the network.
1.performance
2.reliability
3.security
4.None of the above
A digital signature needs ____ system
1.symmetric-key
2.asymmetric-key
3. either (a) or (b)
4.neither (a) nor (b)
A hacker guessing suggested password to a program is call as?
1. password guessing
2.dictionary attack
3. default password attack
4.none of these
A way to ensure that the entity is indeed what it claims to be.-
1.authentication
2.accountability
3.identification
4.security
AES stands for ?
1.authorized encryption standard
2.advance encryption standard
3.advance encryption strategy
4.none of these
An act of protecting information from unauthorised disclouser to an entity.-
1.intergrity
2.avability
3.confidentiality
4.none of these
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
1.cyber-crime
2.cyber attack
3.system hijacking
4.digital crime
An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:
1.part of the blame can be assigned to the victim.
2. the offender is likely to be found in the same area as the victim C
3.investigators should pay particular attention to acquaintances of the victim
4. investigators should always check the immediate family
Blum Blum Shub Generator is based on which Algorithm?
1.private key
2.public key
3.both a & b
4.none of these
Computers and mobile devices are treated as _________ crime scenes in violent crime investigations.
1.temporary
2.immediate
3.remote
4.secondary
Conventional cryptography is also known as _____________ or symmetric-key encryption.
1.secret-key
2.public key
3.protected key
4.primary key
Conversion of Cypher text to plain text?
1.encryption
2.decryption
3.simple text
4.none of these
Conversion of plain text into Cipher text is called as________.
1.encryption
2.decryption
3.hidden text
4.None of the above
Data ___________ is used to ensure confidentiality.
1.encryption
2.locking
3.decryption
4.backup
ECC encryption system is __________
1.symmetric key encryption algorithm
2.asymmetric key encryption algorithm
3.not an encryption algorithm
4. block cipher method
Extensions to the X.509 certificates were added in version ____
1.1
2.2
3.3
4.4
How many rounds does the AES-192 perform?
1.10
2.12
3.14
4.16
In asymmetric key cryptography, the private key is kept by __________
1. sender
2.receiver
3.sender and receiver
4.all the connected devices to the network
Prevention of the unauthorised used of Resources refers too?
1.data integrity
2. data confidentiality
3.acess control
4.None of These
Protection against Denial by one of these parties in a communication refers to?
1.non-repudiation
2.data integrity
3.authentication
4.none of these
Related to information security, confidentiality is the opposite of which of the following?
1.closure
2.disclosure
3.disaster
4.disposal
Release of message contents and Traffic analysis are two types of _________ attacks.
1.active attack
2.modification of attack
3.passive attack
4.dos attack
Symmetric key encryption is also called as?
1.public key encryption
2.private keyencryption
3.both of these
4.none of these
That part of cyberstalking where the offender is using the Internet to find a victim is known as:
1. profiling
2.trolling
3.surreptitious monitoring
4. none of the above.
The CIA triad is often represented by which of the following?
1.riangle
2.diagonal
3.ellipse
4.circle
The full form of OSI is OSI model__.
1.open systemsinterconnection
2.open softwareinterconnection
3. open connection
4.open system internet
The message which is not understandable is called as?
1.cipher text
2.plain text
3.hidden text
4.both a & c
The procedure to add bits to the last block is termed as _________________
1. decryption
2.hashing
3.tuning
4.padding
The technique in which when one character is replaced by another Character is called as?
1. transposition
2.substitution
3.combinational
4.None of these
The ________ is encrypted text.
1.cipher scricpt
2.cipher text
3.secret text
4.secret script
The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.
1.evidence inventory
2.evidence intake
3.evidence intake
4. preservation notes
The__model is 7 layer architecture where each layer is having some specific functionality to perform.
1. tcp
2.osi
3.ois
4.none of these
This helps in identifying the origin of information and authentic user. This referred to here as __________
1.confidentiality
2.integrity
3.authenticity
4.availability
What does OSI stand for in the OSI Security Architecure?
1.open system interface
2.open systems interconnections
3.open source initiative
4.open standard interconnections
What is data encryption standard (DES)?
1.block cipher
2.stream cipher
3.bit cipher
4.byte cipher
What is the 4th step in DES Algorithm?
1.key transformation
2.s-box substitution
3.p-box permutation
4.expansion permutation
What type of attack uses a fraudulent server with a relay address?
1.ntlm
2.mitm
3.netbios
4.smb
When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:
1. the victim might have been withholding information during the first interview.
2. the information that investigators have gathered might help the victim recall additional details.
3. the time between the first and second interviews has given the victim time to seek counseling.
4. none of the above
When a hash function is used to provide message authentication, the hash function value is referred to as
1.message field
2.message digest
3. message score
4.message leap
When you have developed a theory, what can you do to confirm that your hypothesis is correct?
1.predict, based on your hypothesis, where artifacts should be located
2.perform experiments to test results and rule out alternate explanations
3.conclude, based on your findings, whether the evidence supports the hypothesis
4.All of the above
Which is the largest disadvantage of the symmetric Encryption?
1.more complex and therefore more time-consuming calculations.
2.problem of the secure transmission of the secret key.
3.less secure encryption function
4.isn used any more.
Which of them is type of Cipher?
1.stream cipher
2. block cipher
3.both of them
4.None of these
Which One of them is Passive attack?
1.denial of service
2.modify message intransit
3. replay previous message
4.obtain message contain
__ platforms are used for safety and protection of information in the cloud.
1.cloud workload protection platforms
2.cloud security protocols
3.aws
4.one drive
__is used to create the organisation's overall security program.
1.program policy
2.purpose
3.security
4.none of these
___function creates a message digest out of a message.
1.encryption
2.decryption
3.hash
4.none of the above
_____ means the protection of data from modification by unknown users.
1.confidentiality
2.integrity
3.authentication
4.non-repudiation
______ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
1.malware analysis
2.cryptography
3.reverse engineering
4.exploit writing
________ means knowledge obtained from investigation, study , intelligence new ,facts .
1.security
2.data
3.information
4.None of the above
_____________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
1.malware analysis
2.exploit writing
3.reverse engineering
4.cryptography