1. |
Security Measures Needed to protect during their transmission |
A. | file |
B. | data |
C. | packet |
D. | all of above |
Answer» B. data |
2. |
means knowledge obtained from investigation, study , intelligence new ,facts . |
A. | security |
B. | data |
C. | information |
D. | none of these |
Answer» C. information |
3. |
Prevention of the unauthorised used of Resources refers too? |
A. | data integrity |
B. | data confidentiality |
C. | acess control |
D. | none of these |
Answer» C. acess control |
4. |
Protection against Denial by one of these parties in a communication refers to? |
A. | non-repudiation |
B. | data integrity |
C. | authentication |
D. | none of these |
Answer» A. non-repudiation |
5. |
Which One of them is Passive attack? |
A. | denial of service |
B. | modify message in transit |
C. | replay previous message |
D. | obtain message contain |
Answer» D. obtain message contain |
6. |
What is lying of IP address called as? |
A. | ip spoofing |
B. | ip scamming |
C. | ip lying |
D. | none of theses |
Answer» A. ip spoofing |
7. |
What is full form of DDoS? |
A. | derived denial of service |
B. | distributed denial of service |
C. | denial of service |
D. | none of these |
Answer» B. distributed denial of service |
8. |
A hacker guessing suggested password to a program is call as? |
A. | password guessing |
B. | dictionary attack |
C. | default password attack |
D. | none of these |
Answer» C. default password attack |
9. |
Symmetric key encryption is also called as? |
A. | public key encryption |
B. | private key encryption |
C. | both of these |
D. | none of these |
Answer» B. private key encryption |
10. |
Conversion of Cypher text to plain text? |
A. | encryption |
B. | decryption |
C. | simple text |
D. | none of these |
Answer» B. decryption |
11. |
is used to create the organisation's overall security program. |
A. | program policy |
B. | purpose |
C. | security |
D. | none of these |
Answer» A. program policy |
12. |
An act of protecting information from unauthorised disclouser to an entity.- |
A. | intergrity |
B. | avability |
C. | confidentiality |
D. | none of these |
Answer» C. confidentiality |
13. |
A way to ensure that the entity is indeed what it claims to be.- |
A. | authentication |
B. | accountability |
C. | identification |
D. | security |
Answer» A. authentication |
14. |
The model is 7 layer architecture where each layer is having some specific functionality to perform. |
A. | tcp |
B. | osi |
C. | ois |
D. | none of these |
Answer» B. osi |
15. |
The full form of OSI is OSI model . |
A. | open systems interconnection |
B. | open software interconnection |
C. | open connection |
D. | open system internet |
Answer» A. open systems interconnection |
16. |
The technique in which when one character is replaced by another Character is called as? |
A. | transposition |
B. | substitution |
C. | combinational |
D. | none of these |
Answer» B. substitution |
17. |
Conversion of plain text into Cipher text is called as . |
A. | encryption |
B. | decryption |
C. | hidden text |
D. | none of above |
Answer» A. encryption |
18. |
In Symmetric schemes requires both parties to share how many secret key? |
A. | one |
B. | two |
C. | three |
D. | four |
Answer» A. one |
19. |
Blum Blum Shub Generator is based on which Algorithm? |
A. | private key |
B. | public key |
C. | both a & b |
D. | none of these |
Answer» B. public key |
20. |
In DES step both LPT and RPT undergoes in how much key Rounds? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» B. 16 |
21. |
What is the 4th step in DES Algorithm? |
A. | key transformation |
B. | s-box substitution |
C. | p-box permutation |
D. | expansion permutation |
Answer» C. p-box permutation |
22. |
In AES in which Round Subkeys are Generated from Original key for each round? |
A. | key expansion |
B. | initial round |
C. | finale round |
D. | none of these |
Answer» A. key expansion |
23. |
AES stands for? |
A. | authorized encryption standard |
B. | advance encryption standard |
C. | advance encryption strategy |
D. | none of these |
Answer» B. advance encryption standard |
24. |
Which of them is type of Cipher? |
A. | stream cipher |
B. | block cipher |
C. | both of them |
D. | none of these |
Answer» C. both of them |
25. |
The message which is not understandable is called as? |
A. | cipher text |
B. | plain text |
C. | hidden text |
D. | both a & c |
Answer» A. cipher text |
We want to make our service better for you. Please take a moment to fill out our survey.
Take Survey