Uploaded by ernest6175

DCIT418

advertisement
DCIT418
Hacking refers to:
A. data deletion without permission
B. data updation without permission
C. data access without permission
D. all of these
Protocols refers to:
A. rules and methods
B. methods
C. rules
D. none of these
Cryptanalysis is used:
A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers
_____ is a form of virus explicitly designed to hide itself from detection by antivirus software.
A. Macro virus
B. Parasitic virus
C. Polymorphism virus
D. Stealth virus
The physical form of money is converted into:
A. binary form
B. decimal
C. hexadecimal
D. octal form
The main goal of a _________ is to obtain unauthorized access to the information.
A. Simple Attack
B. Active Attacks
C. Internet Attack
D. Passive Attack
TCP/IP model does not have a layer, but OSI model has this layer.
A. session layer
B. transport layer
C. application layer
D. network layer
The encryption process where the same keys are used for encrypting and decrypting the information
is known as:
A. Symmetric Key Encryption
B. Asymmetric Key Encryption
C. Both A and B
D. None of the above
In asymmetric key cryptography, the private key is kept by:
A. sender and receiver
B. sender
C. receiver
D. all the connected devices to the network
The keys used in cryptography are:
A. secret key
B. private key
C. public key
D. all of them
Mechanism to protect a private network from outside attack is:
A. formatting
B. digital signature
C. antivirus
D. firewall
For a given cryptosystem, a collection of all possible decryption keys is called a:
A. Encryption Key
B. Decryption Key
C. key space
D. key system
In symmetric-key cryptography, the key locks and unlocks the box is:
A. same
B. shared
C. private
D. public
Which of the following is not a transport layer vulnerability?
A. mishandling of undefined, poorly defined
B. the vulnerability that allows fingerprinting & other enumeration of host information
C. overloading of transporting layer mechanisms
D. unauthorized network access
Which of these is a part of network identification?
A. user id
B. password
C. otp
D. fingerprint
The process of transforming plain text into unreadable text is known as:
A. decryption
B. encryption
C. network security
D. information hiding
A(n) _____ can be used to preserve the integrity of a document or a message.
A. message confidentiality
B. message summary
C. message digest
D. none of these
In cryptography, the order of the letters in a message is rearranged by:
A. transpositional ciphers
B. substitution ciphers
C. both
D. quadratic ciphers
An algorithm used in encryption is referred to as a cipher.
A. true
B. false
Cryptology can be subdivided into ______ branches.
A. 1
B. 2
C. 3
D. 4
In cryptography, what is cipher?
A. algorithm for performing encryption and decryption
B. encrypted message
C. both algorithm for performing encryption and decryption and encrypted message
D. decrypted message
An algorithm used in encryption is referred to as a cipher.
A. true
B. false
An asymmetric-key (or public-key) cipher uses:
A. 1 key
B. 2 keys
C. 3 keys
D. 4 keys
Which is not an objective of network security?
A. identification
B. authentication
C. access control
D. lock
RECOMMMENDED
https://www.sanfoundry.com/computer-fundamentals-questions-answers-network-security/
Download