On This Page

This set of Information Security Multiple Choice Questions & Answers (MCQs) focuses on Information Security Set 2

Q1 | This was commonly used in cryptography during World War II.
Q2 | Today, many Internet businesses and users take advantage of cryptography based onthis approach.
Q3 | This is the name for the issuer of a PKI certificate.
Q4 | Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuringprogram by individuals and is also used by many corporations.
Q5 | This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.
Q6 | This is the inclusion of a secret message in otherwise unencrypted text or images.
Q7 | In password protection, this is a random string of data used to modify a password hash.
Q8 | This is a mode of operation for a block cipher, with the characteristic that each possibleblock of plaintext has a defined corresponding cipher text value and vice versa.
Q9 | This is a trial and error method used to decode encrypted data through exhaustiveeffort rather than employing intellectual strategies.
Q10 | An intruder might install this on a networked computer to collect user ids andpasswords from other machines on the network.
Q11 | This type of intrusion relies on the intruder's ability to trick people into breakingnormal security procedures.
Q12 | The developers of an operating system or vendor application might issue this to preventintruders from taking advantage of a weakness in their programming.
Q13 | This is an attack on a computer system that takes advantage of a particularvulnerability that the system offers to intruders.
Q14 | This is a program in which harmful code is contained inside apparently harmlessprogramming or data.
Q15 | This is the modification of personal information on a Web user's computer to gainunauthorized information with which to obtain access to the user's existing accounts.
Q16 | This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.
Q17 | This is the forging of an e-mail header so that the message appears to have originatedfrom someone or somewhere other than the actual source.
Q18 | This is a type of network security attack in which the intruder takes control of acommunication between two entities and masquerades as one of them.
Q19 | This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.
Q20 | This electronic "credit card" establishes a user's credentials when doing business orother transactions on the Web and is issued by a certification authority.
Q21 | What "layer" of an e-mail message should you consider when evaluating e-mailsecurity?