DCIT418 Hacking refers to: A. data deletion without permission B. data updation without permission C. data access without permission D. all of these Protocols refers to: A. rules and methods B. methods C. rules D. none of these Cryptanalysis is used: A. to find some insecurity in a cryptographic scheme B. to increase the speed C. to encrypt the data D. to make new ciphers _____ is a form of virus explicitly designed to hide itself from detection by antivirus software. A. Macro virus B. Parasitic virus C. Polymorphism virus D. Stealth virus The physical form of money is converted into: A. binary form B. decimal C. hexadecimal D. octal form The main goal of a _________ is to obtain unauthorized access to the information. A. Simple Attack B. Active Attacks C. Internet Attack D. Passive Attack TCP/IP model does not have a layer, but OSI model has this layer. A. session layer B. transport layer C. application layer D. network layer The encryption process where the same keys are used for encrypting and decrypting the information is known as: A. Symmetric Key Encryption B. Asymmetric Key Encryption C. Both A and B D. None of the above In asymmetric key cryptography, the private key is kept by: A. sender and receiver B. sender C. receiver D. all the connected devices to the network The keys used in cryptography are: A. secret key B. private key C. public key D. all of them Mechanism to protect a private network from outside attack is: A. formatting B. digital signature C. antivirus D. firewall For a given cryptosystem, a collection of all possible decryption keys is called a: A. Encryption Key B. Decryption Key C. key space D. key system In symmetric-key cryptography, the key locks and unlocks the box is: A. same B. shared C. private D. public Which of the following is not a transport layer vulnerability? A. mishandling of undefined, poorly defined B. the vulnerability that allows fingerprinting & other enumeration of host information C. overloading of transporting layer mechanisms D. unauthorized network access Which of these is a part of network identification? A. user id B. password C. otp D. fingerprint The process of transforming plain text into unreadable text is known as: A. decryption B. encryption C. network security D. information hiding A(n) _____ can be used to preserve the integrity of a document or a message. A. message confidentiality B. message summary C. message digest D. none of these In cryptography, the order of the letters in a message is rearranged by: A. transpositional ciphers B. substitution ciphers C. both D. quadratic ciphers An algorithm used in encryption is referred to as a cipher. A. true B. false Cryptology can be subdivided into ______ branches. A. 1 B. 2 C. 3 D. 4 In cryptography, what is cipher? A. algorithm for performing encryption and decryption B. encrypted message C. both algorithm for performing encryption and decryption and encrypted message D. decrypted message An algorithm used in encryption is referred to as a cipher. A. true B. false An asymmetric-key (or public-key) cipher uses: A. 1 key B. 2 keys C. 3 keys D. 4 keys Which is not an objective of network security? A. identification B. authentication C. access control D. lock RECOMMMENDED https://www.sanfoundry.com/computer-fundamentals-questions-answers-network-security/