Employment of Cryptography QAN 603/0892/8

Similar documents
Security Technology Building Blocks QAN 603/0884/9

BCS Level 3 Award in Mobile and Operating Systems QAN 603/0134/X

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

BCS Level 4 Certificate in Cyber Security Introduction QAN 603/0830/8

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

BCS Level 4 Certificate in Network Principles QAN 603/0548/4

Security+ SY0-501 Study Guide Table of Contents

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

BCS Level 4 Award in Risk Assessment QAN 603/0830/8

BCS Level 4 Certificate in Network Systems and Architecture QAN 603/0547/2

Cryptography and Network Security

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

APNIC elearning: Cryptography Basics

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Cryptographic Concepts

L13. Reviews. Rocky K. C. Chang, April 10, 2015

HP Instant Support Enterprise Edition (ISEE) Security overview

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

BCS Level 4 Certificate in Network Security QAN 603/0546/0

Transport Layer Security

Network Security and Cryptography. December Sample Exam Marking Scheme

David Wetherall, with some slides from Radia Perlman s security lectures.

BCS Level 3 Certificate in Programming QAN 603/1192/7

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

(2½ hours) Total Marks: 75

UNIT V APPLICATION LAYER

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Network Security Chapter 8

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Introduction and Overview. Why CSCI 454/554?

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

SRI VENKATESWARA COLLEGE OF ENGINEERING

IBM i Version 7.2. Security Cryptography IBM

Network Security. Chapter 8. MYcsvtu Notes.

Cryptography MIS

Chapter 8 Information Technology

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Network Encryption 3 4/20/17

Transport Level Security

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Cryptography and Network Security

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Cryptography (Overview)

MLR Institute of Technology

Most Common Security Threats (cont.)

10EC832: NETWORK SECURITY

CompTIA Security+ (Exam SY0-401)

Implementing Cisco Network Security (IINS) 3.0

IBM. Security Cryptography. System i. Version 6 Release 1

Jaringan Komputer (IF8505) Pengamanan jaringan komputer. Cryptography

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Network Security and Cryptography. 2 September Marking Scheme

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Information Security: Principles and Practice Second Edition. Mark Stamp

Information Security CS 526

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Introduction. Ahmet Burak Can Hacettepe University. Information Security

Chapter 8 Network Security

Understanding Cisco Cybersecurity Fundamentals

Software Development & Education Center Security+ Certification

14. Internet Security (J. Kurose)

BCS Level 3 Award in Networking and Architecture QAN 603/0686/5

BCS Level 3 Award in Cloud Services QAN 603/0218/5

SE420 Software Quality Assurance

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Security Fundamentals

Pretty Good Privacy (PGP

An Overview of Secure and Authenticated Remote Access to Central Sites

Authentication, Encryption, Transport, and VPN Routing

CS 356 Internet Security Protocols. Fall 2013

Chapter 19 Security. Chapter 19 Security

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

BCS Level 4 Certificate in Data Analysis Tools QAN 603/0824/2

Internet and Intranet Protocols and Applications

AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy

SSH. Partly a tool, partly an application Features:

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

AIT 682: Network and Systems Security

Syllabus: The syllabus is broadly structured as follows:

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CompTIA Security+ Certification

Computers and Security

Network Security - ISA 656 Review

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

IS-2150/TEL-2810 Introduction to Computer Security Quiz 2 Thursday, Dec 14, 2006

Cryptography Introduction

Symmetric, Asymmetric, and One Way Technologies

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection

Transcription:

S Level 4 ertificate in Employment of ryptography QN 603/0892/8 Specimen Paper Record your surname/ last/ family name and initials on the nswer Sheet. Specimen paper only. 20 multiple-choice questions 1 mark awarded to each question. Mark only one answer for each question. There are no trick questions. number of possible answers are given for each question, indicated by either... or. Your answers should be clearly indicated on the nswer Sheet. The pass mark is 13/20. This is a specimen examination paper only. The full paper will contain 40 questions with a pass mark for the full paper of 26/40. opying of this paper is expressly forbidden without the direct approval of S, The hartered Institute for IT. opyright S 2016 S Level 4 ertificate in yber Security Introduction Specimen Paper Page 1 of 6

1 Select the protocol suite that employs the following three protocols: 1) uthentication Headers (H) 2) Encapsulating Security Payload (ESP) 3) Security ssociations (Ss). HTTPS. TLS/SSL. SSH. IPsec. 2 Which two of the following are certificates used for? a) lient authentication. b) WEP encryption. c) ccess control lists. d) ode signing. e) Password hashing. b and c only. c and e only. d and e only. a and d only. 3 Which of the following is a symmetric encryption algorithm? RS. 3ES. iffie-hellman. S. 4 Non-repudiation is a feature of cryptography that can be implemented using which one of the following? VPN. n IPSE Tunnel. igital ertificate. Password Verification. opyright S 2016 S Level 4 ertificate in yber Security Introduction Specimen Paper Page 2 of 6

5 collision attack on M5 attempts to find which of the following? Two messages that will produce two different hashes. One message that will produce two identical hashes. One message that will produce two different hashes. Two messages that will produce identical hashes. 6 Entropy in a computer system may be used for which one of the following purposes? To detect intrusion attempts by their signature. To verify passwords at login. To create session keys. To scan attachments for threats. 7 International ata Encryption lgorithm (IE) was developed by Xuejia Lai and whom? James Massey. ruce Schneier. arlisle dams. Stafford Tavares. 8 simple substitution cipher changes each plaintext symbol in what manner? It uses a different substitution alphabet for each symbol. It employs a 1 to 1 correspondence table. Plaintext is transformed into a group of random symbols. The cipher is changed into a single random symbol. 9 Which of the following is NOT a secure VPN protocol? Internet Protocol Security (IPsec). Microsoft Windows Network asic Input/Output System. (NetIOS). Transport Layer Security (SSL/TLS). Microsoft Secure Socket Tunnelling Protocol (SSTP). opyright S 2016 S Level 4 ertificate in yber Security Introduction Specimen Paper Page 3 of 6

10 Which two of the following can be used on a smartphone to EST protect against sensitive data loss if the device is stolen? a) Tethering. b) Remote wipe. c) Email password. d) GPS tracking. e) evice encryption. a and b only. c and d only. b and e only. d and e only. 11 security administrator has been tasked with explaining authentication services to the company s management team. The company runs an active directory infrastructure. Which of the following solutions EST relates to the host authentication protocol within the company s environment? Kerberos. Least Privilege. TS+. LP. 12 Which of the following describes a situation when a cryptographic key component is held by a third party? Key list. Key escrow. Key loader. Key exchange. 13 way of verifying both the sender of information and the integrity of a message is through the use of which of the following? igital signatures. igital certificates. Public key encryption. Private key encryption. opyright S 2016 S Level 4 ertificate in yber Security Introduction Specimen Paper Page 4 of 6

14 Which of these tools are MOST LIKELY to be used during the discovery phase of a penetration test? Nessus. Wireshark. Network Mapper. urp. 15 Which of the following is the EST description of ciphers? Stream ciphers encrypt continuous streams of data. lock ciphers encrypt blocks of data of variable size. Polyalphabetic substitution ciphers keep the substitution alphabet constant for every symbol. Transposition ciphers take groups of characters and shift them according to a random system. 16 Which of the following cts were signed into law in 2000? yber Security Enhancement ct. Online Privacy Protection ct. No-Electron Theft ct. Electronic Signatures in Global and National ommerce ct. 17 Voice privacy in GSM cellular telephone protocol is provided by which cipher? 5/2. 5/4. 6/2. 5/8. 18 What UK evaluation scheme helps private sector companies develop cryptographic products? Federal Information Processing Standards Publication (FIPS). ommercial Product ssurance (P). ESG ssisted Products Service (PS). Information Technology Security Evaluation and ertification Scheme (ITSE). opyright S 2016 S Level 4 ertificate in yber Security Introduction Specimen Paper Page 5 of 6

19 Which of the following is an organisation that sends out information about known security vulnerabilities in software? PGP. PKI. ERT. RS. 20 When a connection is made to a secure HTTPS web page, which of the following actions is performed first? The username and password are sent for authentication. The client establishes its identity to the web server. The web page is displayed and then authentication is performed. digital certificate establishes the web site identity to the browser. -End of Paper- opyright S 2016 S Level 4 ertificate in yber Security Introduction Specimen Paper Page 6 of 6