mcq 队列
1) Which of the following is not a type of symmetric-key cryptography technique?
1)以下哪一项不是对称密钥密码技术?
Data Encryption Standard (DES)
数据加密标准(DES)
Answer: c) Diffie Hellman cipher
答案: c)Diffie Hellman密码
Explanation:
说明:
The Diffie Hellman uses a pair of asymmetric keys for encryption and decryption processes. All the rest mentioned cipher techniques use the same key for encryption as well as decryption.
Diffie Hellman使用一对非对称密钥进行加密和解密过程。 其余所有提到的密码技术都使用相同的密钥进行加密和解密。
2) Which of the following is not a principle of data security?
2)以下哪一项不是数据安全性原则?
Data Confidentiality
资料保密
Data Integrity
数据的完整性
Authentication
认证方式
None of the above
以上都不是
Answer: d) None of the above
答案: d)以上都不是
Explanation:
说明:
All the first three options are the principles of data security. None of the mentioned characteristics fall apart form these principles. Therefore, the correct answer is none of the above.
前三个选项都是数据安全性的原则。 这些原则都没有脱离这些原则。 因此,正确的答案不是以上所有。
3) Which of the following security attacks is not an active attack?
OR
Which of the following attacks is a passive attack?
3)以下哪些安全攻击不是主动攻击?
要么
以下哪些攻击是被动攻击?
Masquerade
假面舞会
Modification of message
消息修改
Denial of service
拒绝服务
Traffic analysis
流量分析
Answer: d) Traffic analysis
答案: d)流量分析
Explanation:
说明:
In a passive attack, the attacker does not modify any part of the data. His attempt is only to obtain the information and not to modify it. From the mentioned options, this happens only in Traffic analysis in which the attacker monitors the pattern of transmission. The rest other options are examples of active attacks.
在被动攻击中,攻击者不会修改数据的任何部分。 他的尝试仅是获取信息,而不是对其进行修改。 从上述选项中,这仅在流量分析中发生,攻击者在其中监视传输模式。 其余的其他选项是主动攻击的示例。
4) Which of the following options correctly defines the Brute force attack?
4)以下哪个选项正确定义了蛮力攻击?
Brutally forcing the user to share the useful information like pins and passwords.
残酷地迫使用户共享有用的信息,例如密码和密码。
Trying every possible key to decrypt the message.
尝试使用所有可能的密钥来解密消息。
One entity pretends to be some other entity
一个实体假装为另一个实体
The message or information is modified before sending it to the receiver.
消息或信息在发送到接收者之前被修改。
Answer: b) Trying every possible key to decrypt the message.
答案: b)尝试所有可能的密钥来解密消息。
Explanation:
说明:
Only option b) is the correct definition for brute force attack.
只有选项b)是蛮力攻击的正确定义。
5) "A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?
5)“密钥是一串由密码算法用来将纯文本转换为密文的位。” 以下哪项能够成为密码算法的密钥?
An integer values
整数值
A square matrix
方阵
An array of characters (i.e. a string)
字符数组(即字符串)
All of the above
上述所有的
Answer: d) All of the above
答案: d)以上全部
Explanation:
说明:
As the key can be any string of bits, all the mentioned options are capable of becoming a key in a cryptographic algorithm.
由于密钥可以是任何比特串,因此所有提及的选项都可以成为密码算法中的密钥。
翻译自: https://www.includehelp.com/cryptography/mcq-cryptography-basics.aspx
mcq 队列