Secured E-commerce (Bscit-5)
Question no. 1-40 carry 1 mark , 41- 60 carry 2 , 61 – 75 carry 4 marks
¼ negative marking for each wrong question.
1.__________Can reformat and transform your data making it safer on its trip between computer.
A. encryption B. cryptography C. security D. none
2. The scrambled message is called the_________
A. ciphertext B. cipher-text C. encryption D. none
3.In a traditional crypto system the key is a ________chosen number .
A .rotationally B.randomly C. sequentially d.none
4.The modern internet first appeared in the _________.
A. early 1920s B. late 1960s C.early 1970s D. early 1980s
5._________Was a program written by a Cornell graduate student with some experience in computer security
A. encryption B. cryptography C. the worm D. virus
6.Secret key cryptography is also referred as ____ cryptography.
A. asymmetric B. symmmeric C. traversal D.public
7. full form of DES is:
A. data encryption system B. data encryption standard
C.Daily encryption series D.all of above
8.In practice how many modes are bused of cipher.
A. 2 B. 4 C. 6 D. 8
9. Brute force cracking works trying all possible values for the key until the right one is found this statement is:-
A. true B. false C. partially true D. partially false
10.RC4 and rivest cipher #2 are ___ crypto.
A. High weight B. light weight C.medium strength D. none
11. ________ are application for which a security failure could cause serious losses ,other monetary losses or embarrassing headlines.
A. low risk application B. medium risk application
C. high risk application D. critical application
12. privacy policies articulate the manner in which a company collect ,uses, protects data . and the choice they offer consumers to receive rights when their personal information is used this statements is :-
A. true B.false C. partially true D. partialy false
13.” the web is changing consumers shopping habits both at home and in the work place “ this was said by:-
A. Francoise gredet B. webster C. Loel mephee D. By a company
14. ______ authentication enable an administrator to grant access privileges to a specific user at a specific IP address.
A. Client B. user C. DBA D. none
15. ___ protects an organization from security threats by specifying and inforcing what can go into and out of an organization network.
A. read /write B. user edit C.read only D. access control
16. acronym for denial of service attack is :
A. DOSA B. DOS C. DSA D. none
17._______ is a place where product selection are collected :-
A.product catalog B. A shoping cart C. oders D. internet
18. _______and ______ include transparent user authentication providing access privileges on a per user basis for FTP , internet ,HTTP connection .
A. network ,security B. internet ,client authentication C.firewall, gateways D. IP,TCP
19.________ is the place where the online customers select what they want to order .
A. product catalog B. A shopping cart C. internet D. transaction security.
20.triple DES technique applies the DES algo rithm to the plaintext three times , potentially using a different ___ DS key each time.
A. 112-bit B 56_ bit C. 1024 –bit D. 24-bit
21. The crypto techniques ensure –
1. confidentiality 2. Authenticity 3. integrity
A. Only 1 B. 1,2 C. Only 3 D. 1,2,3
22.Code “MANIPAL “ if the arbitrary no chosen is 12.
A. AOBWDOZ B. PQVWSTA C. IMNOBCE D. MNAILPA
23. Match the following :-
SET A SET B
(a) ECB 1,. It user the block cipher all by itself to generate the . vernam keys.
(b)CBC 2. it is similar to CBC in that it feeds the cipher text block . back through the block cipher.
(c) CFB 3. In this mode the cipher is simply applied to the plain text . block by block
(d) OFB 4. the two block s are combined bit by bit using the exclusive or operation.
24. A good crypto algorithm m generally have which of the following properties –
1. Explicity designed fore encryption . 2. Available for analysis 3. subject to analysis 4. No practical weaknesses
A. Only 1 B. 1,2,4 C. 2,3,4 D. 1,2,3,4
Q25. match he following :-
SET A SET B
a) IDEA 1.it is block encryption algorithm developed by the NSA
b) SKIP JACK 2. this provides justification for its use Which other cryto algorithms clock
(c) RC4 3. it is a stream cipher marketed by RSA data security.
(d) DES 4. it is a block cipher that appeared in 1990
¼ negative marking for each wrong question.
1.__________Can reformat and transform your data making it safer on its trip between computer.
A. encryption B. cryptography C. security D. none
2. The scrambled message is called the_________
A. ciphertext B. cipher-text C. encryption D. none
3.In a traditional crypto system the key is a ________chosen number .
A .rotationally B.randomly C. sequentially d.none
4.The modern internet first appeared in the _________.
A. early 1920s B. late 1960s C.early 1970s D. early 1980s
5._________Was a program written by a Cornell graduate student with some experience in computer security
A. encryption B. cryptography C. the worm D. virus
6.Secret key cryptography is also referred as ____ cryptography.
A. asymmetric B. symmmeric C. traversal D.public
7. full form of DES is:
A. data encryption system B. data encryption standard
C.Daily encryption series D.all of above
8.In practice how many modes are bused of cipher.
A. 2 B. 4 C. 6 D. 8
9. Brute force cracking works trying all possible values for the key until the right one is found this statement is:-
A. true B. false C. partially true D. partially false
10.RC4 and rivest cipher #2 are ___ crypto.
A. High weight B. light weight C.medium strength D. none
11. ________ are application for which a security failure could cause serious losses ,other monetary losses or embarrassing headlines.
A. low risk application B. medium risk application
C. high risk application D. critical application
12. privacy policies articulate the manner in which a company collect ,uses, protects data . and the choice they offer consumers to receive rights when their personal information is used this statements is :-
A. true B.false C. partially true D. partialy false
13.” the web is changing consumers shopping habits both at home and in the work place “ this was said by:-
A. Francoise gredet B. webster C. Loel mephee D. By a company
14. ______ authentication enable an administrator to grant access privileges to a specific user at a specific IP address.
A. Client B. user C. DBA D. none
15. ___ protects an organization from security threats by specifying and inforcing what can go into and out of an organization network.
A. read /write B. user edit C.read only D. access control
16. acronym for denial of service attack is :
A. DOSA B. DOS C. DSA D. none
17._______ is a place where product selection are collected :-
A.product catalog B. A shoping cart C. oders D. internet
18. _______and ______ include transparent user authentication providing access privileges on a per user basis for FTP , internet ,HTTP connection .
A. network ,security B. internet ,client authentication C.firewall, gateways D. IP,TCP
19.________ is the place where the online customers select what they want to order .
A. product catalog B. A shopping cart C. internet D. transaction security.
20.triple DES technique applies the DES algo rithm to the plaintext three times , potentially using a different ___ DS key each time.
A. 112-bit B 56_ bit C. 1024 –bit D. 24-bit
21. The crypto techniques ensure –
1. confidentiality 2. Authenticity 3. integrity
A. Only 1 B. 1,2 C. Only 3 D. 1,2,3
22.Code “MANIPAL “ if the arbitrary no chosen is 12.
A. AOBWDOZ B. PQVWSTA C. IMNOBCE D. MNAILPA
23. Match the following :-
SET A SET B
(a) ECB 1,. It user the block cipher all by itself to generate the . vernam keys.
(b)CBC 2. it is similar to CBC in that it feeds the cipher text block . back through the block cipher.
(c) CFB 3. In this mode the cipher is simply applied to the plain text . block by block
(d) OFB 4. the two block s are combined bit by bit using the exclusive or operation.
24. A good crypto algorithm m generally have which of the following properties –
1. Explicity designed fore encryption . 2. Available for analysis 3. subject to analysis 4. No practical weaknesses
A. Only 1 B. 1,2,4 C. 2,3,4 D. 1,2,3,4
Q25. match he following :-
SET A SET B
a) IDEA 1.it is block encryption algorithm developed by the NSA
b) SKIP JACK 2. this provides justification for its use Which other cryto algorithms clock
(c) RC4 3. it is a stream cipher marketed by RSA data security.
(d) DES 4. it is a block cipher that appeared in 1990
Comments
Post a Comment