Appendix: Multiple Choice Questions and Answers

A.1 Questions

A.1.1Basic Definitions of Security and Cryptography

1. Any item of value in information security is known as
  • a) Program    b) Data     c) Asset     d) Secret file

2. Which of the following best describes cryptography?

  • a) It is a set of methods for defeating attacks

    b) It is the art and science of disclosing secrets

    c) It enables to securely exchange messages

    d) It is art and science of secret writing

3. Verifying that data received was sent by the specified sender is a test of
  • a) Integrity    b) Authentication     c) Authenticity     d) Identity
4. Which of the following is the best source to pick a random text?
  • a) Birthdays    b) City names     c) Books     d) People first names
5. The weakness in a risk mitigating action is referred to as:
a) Exposure    b) Vulnerability     c) Attack     d) Risk
6. Sending unsolicited contents is an act of
  • a) Spoofing    b) Spamming     c) Cracking     d) Sniffing
7. Which of the following is the property of information being disclosed only to authorized people?
  • a) Integrity    b) Privacy     c) Confidentiality     d) Availability
8. What term is used in security to refer to potential danger regarding a system if an adversary exploits a vulnerability of the system?
  • a) Risk    b) Threat     c) Danger     d) Security problem
9. In the internet, the main security issue is
  • a) Which service provider to subscribe to    b) Which server to connect to c) Who ...

Get Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.