51. The ability to access the capabilities over the network through standard mechanisms that promote use by heterogeneous thin or thick client platform is:
(a) On demand service
(b) Rapid elasticity
(c) Ubiquitous Network Access
(d) Location Independent Resource Pooling
Answer: (c)
52. A grouping of services or service components that have specific delivery commitments and roles identified with the customer is:
(a) Service Level Agreements
(b) Service Level Management
(c) Service Level Management Objective
(d) Services Portfolio
Answer: (a)
53. The period of time within which systems, applications or functions must be recovered after an outage is:
(a) Mean Time to Recover
(b) Recovery Time Objective
(c) Recovery Point Objective
(d) Mean Time Return Failure
Answer: (b)
54. The chargeback scheme where the IT costs are defined in measurable events, transactions and functions that are relevant to the business and outside the IT organization is:
(a) Resource or usage based
(b) Allocation based
(c) Activity based costing
(d) Product or service based
Answer: (d)
55. The use of distributed computing facilities for application requiring large computing power over a long period of time is:
(a) High-Performance Computing
(b) High-Throughput Computing
(c) Many Tasks Computing
(d) Distributed Computing
Answer: (b)
56. A small change in either the plaintext or the key producing a significant change in the ciphertext is called:
(a) Feistel effect
(b) Claude Shannon effect
(c) Bit independence effect
(d) Avalanche effect
Answer: (d)
57. Finding an effective linear equation between plaintext, ciphertext and the key that holds with probability 𝑝 ≠0.5 is the objective of:
(a) Differential Cryptanalysis
(b) Linear Cryptanalysis
(c) Brute-Force Attack
(d) Feistel Analysis
Answer: (b)
58. During the design of 𝑆 -boxes used in various cryptographic algorithms, if for a 1-bit input change, at least 𝜋 output bits change, then it satisfies:
(a) Strict avalanche criterion
(b) Bit independence criterion
(c) Permutation criterion
(d) Guaranteed avalanche criterion
Answer: (d)
59. The block cipher mode of operation used for encryption of stream-oriented transmission over noisy channel is:
(a) Electronic Codebook
(b) Output Feedback
(c) Cipher Feedback
(d) Cipher Block Chaining
Answer: (b)
60. A popular approach to generating a secure pseudorandom number is known as:
(a) Pseudorandom Number Generator (PRNG)
(b) Linear Congruential Generator (LCG)
(c) True Random Number Generator (TRNG)
(d) Blum, Blum, Shub Generator (BBS)
Answer: (d)
0 Comments
Post a Comment