Self assessment questions Flashcards

1
Q

An attack where you have a message or part thereof which is encrypted is called a

A

Known ciphertext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attack where the attacker selects ciphertext and uses Alice’s machine to decrypt the message is called a

A

Chosen ciphertext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In RSA key generation the following holds: d*e mod φ(n) = 1 The public key is [? ] The private key is [?]

A

The public key is [(e, n)]

The private key is [(d,n)]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In RSA encryption of a block B is completed by calculating:

A

B^e mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In an ROC curve for a biometric what is the best possible scenario:

A

Curve close to the top left

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the traditional access control model by Lampon, where can the reference monitor specify authorisation control?

A

Both subject level and object level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is it about digital images which makes them good cover objects for steganography?

A

Redundancy in the data in an image,

A small change in the least significant bits of colour channels is undetectable by the human eye

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

represent the BPCS algorithm:

A

[While there is more to hide]

[Get the next bit plane]

[While there is more space in the current bit plane]

[Get the next complex segment]

[Get the next block of payload]

[If the payload information is complex, then hide it in the current segment]

[Else conjugate by performing an exclusive or operation then hide it in the current segment]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is BPCS Steganography?

A

BPCS-Steganography (Bit-Plane Complexity Segmentation Steganography)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Packet sniffing works if the attacker is [] , the network is [], and the network uses a [] or a [] in []

A

Packet sniffing works if the attacker is [on the same network] , the network is [insecure], and the network uses a [hub] or a [switch or router] in [promiscuous mode]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

At which layers does IPSec provide security?

A

Network, Transport , Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At what layers does TSL/SSL provide security?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly