is the art & science of cracking the cipher-text without knowing the key.
1.cracking
2.cryptanalysis
3.cryptography
4.crypto-hacking
Posted Date:-2022-07-23 08:50:25
of information means, only authorised users are capable of accessing the information.
1.confidentiality
2.integrity
3.non-repudiation
4. availability
Posted Date:-2022-07-23 07:50:18
is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
1.network security
2.database security
3.information security
4.physical security
Posted Date:-2022-07-23 08:37:34
In asymmetric key cryptography, the private key is kept by ____
1.sender
2.receiver
3.sender and receiver
4.all the connected devices to the network
Posted Date:-2022-07-23 08:51:55
ElGamal encryption system is __________
1.symmetric key encryption algorithm
2.asymmetric key encryption algorithm
3.not an encryption algorithm
4.block cipher method
Posted Date:-2022-07-23 09:36:36
HTTPS is abbreviated as _________
1.hypertexts transfer protocol secured
2.secured hyper text transfer protocol
3.hyperlinked text transfer protocol secured
4.hyper text transfer protocol secure
Posted Date:-2022-07-21 12:44:56
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
1. release of message content-passive attack
2. traffic analysis -passive attacks
3. release of message content- active attacks
4. traffic analysis -active attacks
Posted Date:-2022-07-23 08:42:51
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
1.release of message content-passive attack
2. traffic analysis -passive attacks
3.release of message content- active attacks
4. traffic analysis -active attacks
Posted Date:-2022-07-23 08:41:50
In the above figure from left to right, the correct order of the shaded levels are
1.network level, application level, transport level
2.application level, network level, transport level
3.transport level, application level, network level
4. network level, transport level, application level
Posted Date:-2022-07-23 09:39:23
In the above figure, which of the above shaded block is transparent to end users and applications?
1. ip/ipsec
2.ssl
3.kerberos
4.s/mime
Posted Date:-2022-07-23 09:40:22
Which one of the following is a cryptographic protocol used to secure HTTP connection?
1.stream control transmission protocol (sctp)
2.transport layer security (tls)
3.explicit congestion notification (ecn)
4.resource reservation protocol
Posted Date:-2022-07-23 08:56:00
Which protocol is used for the purpose of copying the pending state into the current state?
1. alert protocol
2. handshake protocol
3.upper-layer protocol
4.change cipher spec protocol
Posted Date:-2022-07-23 09:46:38
_______ is used for encrypting data at network level D. s/mime
1.ipsec
2.https
3.smtp
4.s/mime
Posted Date:-2022-07-21 12:47:34
. In cryptography, the order of the letters in a message is rearranged by __________
1. A. transpositional ciphers
2.substitution ciphers
3.both transpositional ciphers and substitution ciphers
4.quadratic ciphers
Posted Date:-2022-07-23 08:53:00
A unique piece of information that is used in encryption.
1.cipher
2.plain text
3.key
4. cipher
Posted Date:-2022-07-23 08:44:01
An attack in which the user receives unwanted amount of e- mails.
1.smurfing
2.denial of service
3.e-mail bombing
4. ping storm
Posted Date:-2022-07-23 08:45:35
CIA triad is also known as
1.nic (non-repudiation, integrity, confidentiality)
2.aic (availability, integrity, confidentiality)
3. ain (availability, integrity, non-repudiation)
4.aic (authenticity, integrity, confidentiality)
Posted Date:-2022-07-23 07:49:38
Conventional cryptography is also known as or symmetric-key encryption.
1.secret-key
2.public key
3.protected key
4.primary key
Posted Date:-2022-07-23 08:49:31
Cryptanalysis is used
1. to find some insecurity in a cryptographic scheme
2.to increase the speed
3.to encrypt the data
4. to make new ciphers
Posted Date:-2022-07-23 08:48:41
Cryptanalysis is used __________
1.to find some insecurity in a cryptographic scheme
2.to increase the speed
3.to encrypt the data
4. to make new ciphers
Posted Date:-2022-07-23 08:54:32
Cryptographic hash function takes an arbitrary block of data and returns _________
1. fixed size bit string
2.variable size bit string
3.both fixed size bit string and variable size bit string
4. variable sized byte string
Posted Date:-2022-07-23 09:38:07
Data integrity gets compromised when and are taken control off.
1.access control, file deletion
2.network, file permission
3.access control, file permission
4.network, system
Posted Date:-2022-07-23 08:36:45
Data is used to ensure confidentiality.
1.encryption
2.locking
3.deleting
4.backup
Posted Date:-2022-07-23 08:35:23
Diffie-Hellman algorithm is widely known as_________
1.key exchange algorithm
2.key agreement algorithm
3.only
4. both a and b
Posted Date:-2022-07-21 12:42:08
ECC stands for
1. A. elliptic curve cryptography
2.elliptic cryptography curve
3.error correcting code
4.none of the above
Posted Date:-2022-07-21 12:41:20
Firewalls can be of _______ kinds.
1.1
2.2
3.3
4.4
Posted Date:-2022-07-23 10:50:13
From the options below, which of them is not a threat to information security?
1.disaster
2.eavesdropping
3.information leakage
4.unchanged default password
Posted Date:-2022-07-23 08:38:28
Hash function is used for________
1.message authentication
2.digital signature
3.both a and b
4.only a
Posted Date:-2022-07-21 12:42:55
In layer, vulnerabilities are directly associated with physical access to networks and hardware.
1. physical
2.data-link
3.network
4.application
Posted Date:-2022-07-23 08:40:25
In same keys are implemented for encrypting as well as decrypting the information.
1.symmetric key encryption
2.asymmetric key encryption
3.asymmetric key decryption
4.hash-based key encryption
Posted Date:-2022-07-23 08:46:29
In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
1.select, alarm
2. alert, alarm
3.warning, alarm
4.warning, fatal
Posted Date:-2022-07-23 10:41:25
In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
1. 216
2.232
3.214
4.212
Posted Date:-2022-07-23 09:41:42
IPSec provides ....protocols for network layer
1.7
2.1
3.3
4.4
Posted Date:-2022-07-23 07:39:23
length of the IPv6 acddress is ....
1.32 bits
2.64 bits
3.16 bits
4.128 bit
Posted Date:-2022-07-23 07:38:52
length of the IPv6 header is....
1. 64 bits
2.16 bits
3.32 bits
4.8 bits
Posted Date:-2022-07-23 07:48:46
RSA algorithm is best example of_______
1.asymmetric key cryptography
2.symmetric key cryptography
3.elliptic curve cryptography
4.All of the above
Posted Date:-2022-07-21 12:43:47
SSL primarily focuses on _______
1. integrity and authenticity
2. integrity and non-repudiation
3.authenticity and privacy
4.confidentiality and integrity
Posted Date:-2022-07-21 12:46:01
Study of creating a d using encryption and decryption techniques.
1.cipher
2.cryptography
3.encryption
4.decryption
Posted Date:-2022-07-23 08:44:45
The full form of OSI is OSI model is
1.open systems interconnection
2.open software interconnection
3.open systems internet
4. open software internet
Posted Date:-2022-07-23 08:39:41
The full form of SSL is
1.serial session layer
2.secure socket layer
3.session secure layer
4.series socket layer
Posted Date:-2022-07-23 09:42:41
Transport layer Protocol consists of ... main components
1.2
2.1
3.3
4.4
Posted Date:-2022-07-23 07:37:52
When integrity is lacking in a security system, occurs.
1.database hacking
2.data deletion
3.data tampering
4.data leakage
Posted Date:-2022-07-23 07:53:48
When you use the word it means you are protecting your data from getting disclosed.
1.confidentiality
2.integrity
3.authentication
4.non-repudiation
Posted Date:-2022-07-23 07:51:45
Which of the following is not a secured mail transferring methodology?
1.pop3 .
2.ssmtp
3. mail using pgp
4.s/mime
Posted Date:-2022-07-23 10:44:42
Which one of the following is not a higher –layer SSL protocol?
1.alert protocol
2.handshake protocol
3.alarm protocol
4.change cipher spec protocol
Posted Date:-2022-07-23 09:41:02
Which protocol consists of only 1 bit?
1. alert protocol
2.handshake protocol
3.upper-layer protocol
4. change cipher spec protocol
Posted Date:-2022-07-23 09:44:46
Which protocol is used to convey SSL related alerts to the peer entity?
1.alert protocol
2. handshake protocol
3.upper-layer protocol
4.change cipher spec protocol
Posted Date:-2022-07-23 09:43:52
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
1. they help understanding hacking better
2. they are key elements to a security breach
3. they help understands security and its components better
4. they help to understand the cyber-crime better
Posted Date:-2022-07-23 08:32:33
_____ is used for encrypting data at network level.
1. ipsec
2.https
3.smtp
4.s/mime
Posted Date:-2022-07-23 10:46:44
__________ is the kind of firewall is connected between the device and the network connecting to internet.
1. hardware firewall
2.software firewall
3.stateful inspection firewall
4.microsoft firewall
Posted Date:-2022-07-23 10:51:19