Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
201. |
For RSA to work, the value of P must be less than the value of |
A. | p |
B. | q |
C. | n |
D. | r |
Answer» C. n |
202. |
In RSA, Ф(n) = _______ in terms of p and q. |
A. | (p)/(q) |
B. | (p)(q) |
C. | (p-1)(q-1) |
D. | (p+1)(q+1) |
Answer» C. (p-1)(q-1) |
203. |
In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n). |
A. | true |
B. | false |
Answer» B. false |
204. |
RSA is also a stream cipher like Merkel-Hellman. |
A. | true |
B. | false |
Answer» A. true |
205. |
USENET falls under which category of public key sharing? |
A. | public announcement |
B. | publicly available directory |
C. | public key authority |
D. | public key certificate |
Answer» A. public announcement |
206. |
PGP makes use of which cryptographic algorithm? |
A. | rsa |
B. | aes |
C. | des |
D. | robin |
Answer» A. rsa |
207. |
Public key cryptography also called as________ |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | both a and b |
D. | none of the above |
Answer» A. asymmetric key cryptography |
208. |
ECC stands for |
A. | elliptic curve cryptography |
B. | elliptic cryptography curve |
C. | error correcting code |
D. | none of the above |
Answer» A. elliptic curve cryptography |
209. |
Diffie-Hellman algorithm is widely known as_________ |
A. | key exchange algorithm |
B. | key agreement algorithm |
C. | only a |
D. | both a and b |
Answer» D. both a and b |
210. |
Hash function is used for________ |
A. | message authentication |
B. | digital signature |
C. | both a and b |
D. | only a |
Answer» C. both a and b |
211. |
RSA algorithm is best example of_______ |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | elliptic curve cryptography |
D. | all of the above |
Answer» A. asymmetric key cryptography |
212. |
In tunnel mode, IPSec protects the ______ |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» A. entire ip packet |
213. |
HTTPS is abbreviated as _________ |
A. | hypertexts transfer protocol secured |
B. | secured hyper text transfer protocol |
C. | hyperlinked text transfer protocol secured |
D. | hyper text transfer protocol secure |
Answer» D. hyper text transfer protocol secure |
214. |
An attempt to make a computer resource unavailable to its intended users is called ______ |
A. | denial-of-service attack |
B. | virus attack |
C. | worms attack |
D. | botnet process |
Answer» A. denial-of-service attack |
215. |
SSL primarily focuses on _______ |
A. | integrity and authenticity |
B. | integrity and non-repudiation |
C. | authenticity and privacy |
D. | confidentiality and integrity |
Answer» A. integrity and authenticity |
216. |
Pretty good privacy (PGP) is used in ______ |
A. | browser security |
B. | email security |
C. | wifi security |
D. | ftp security |
Answer» B. email security |
217. |
__________ is used for encrypting data at network level |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» A. ipsec |
218. |
WPA2 is used for security in _______ |
A. | ethernet |
B. | wi-fi |
C. | bluetooth |
D. | |
Answer» B. wi-fi |
219. |
Which of the following is not a strong security protocol |
A. | ssl |
B. | httpl |
C. | smtp |
D. | sftp |
Answer» C. smtp |
220. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection. |
A. | true |
B. | false |
Answer» A. true |
221. |
IPSec operates in..... different modes |
A. | 3 |
B. | 2 |
C. | 4 |
D. | 5 |
Answer» B. 2 |
222. |
length of the IPv4 address is .... |
A. | 32 bits |
B. | 64 bits |
C. | 16 bits |
D. | 128 bit |
Answer» A. 32 bits |
223. |
Internet Key Exchange has .... phases and modes of operations |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 5 |
Answer» C. 2 |
224. |
PGP is abbreviated as |
A. | pretty good privacy |
B. | pretty good policy |
C. | policy good privacy |
D. | pretty good protection |
Answer» A. pretty good privacy |
225. |
SET stands for |
A. | set electronic transaction |
B. | secure electronic transaction |
C. | simple electronic transaction |
D. | none of the above |
Answer» B. secure electronic transaction |
We want to make our service better for you. Please take a moment to fill out our survey.
Take Survey