Filters
Question type

Study Flashcards

SSL primarily focuses on _______


A) integrity and authenticity
B) integrity and non-repudiation
C) authenticity and privacy
D) confidentiality and integrity

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

A

__________ is used for encrypting data at network level


A) ipsec
B) https
C) smtp
D) s/mime

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

USENET falls under which category of public key sharing?


A) public announcement
B) publicly available directory
C) public key authority
D) public key certificate

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Pretty good privacy (PGP) is used in ______


A) browser security
B) email security
C) wifi security
D) ftp security

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following is not a strong security protocol


A) ssl
B) httpl
C) smtp
D) sftp

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

SET stands for


A) set electronic transaction
B) secure electronic transaction
C) simple electronic transaction
D) none of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

B

In RSA, we select a value 'e' such that it lies between 0 and ?(n) and it is relatively prime to ?(n).

A) True
B) False

Correct Answer

verifed

verified

PGP makes use of which cryptographic algorithm?


A) rsa
B) aes
C) des
D) robin

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

PGP is abbreviated as


A) pretty good privacy
B) pretty good policy
C) policy good privacy
D) pretty good protection

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

A

In tunnel mode, IPSec protects the ______


A) entire ip packet
B) ip header
C) ip payload
D) ip trailer

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

RSA is also a stream cipher like Merkel-Hellman.

A) True
B) False

Correct Answer

verifed

verified

An attempt to make a computer resource unavailable to its intended users is called ______


A) denial-of-service attack
B) virus attack
C) worms attack
D) botnet process

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Internet Key Exchange has ______________ phases and modes of operations


A) 4
B) 3
C) 2
D) 5

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

In RSA, ?(n) = _______ in terms of p and q.


A)  (p) /(q)
B)  (p) (q)
C) (p-1) (q-1)
D)  (p+1) (q+1)

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Hash function is used for________


A) message authentication
B) digital signature
C) both a and b
D) only a

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

ECC stands for


A) elliptic curve cryptography
B) elliptic cryptography curve
C) error correcting code
D) none of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

RSA algorithm is best example of_______


A) asymmetric key cryptography
B) symmetric key cryptography
C) elliptic curve cryptography
D) all of the above

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

IPSec operates in______________. different modes


A) 3
B) 2
C) 4
D) 5

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Diffie-Hellman algorithm is widely known as_________


A) key exchange algorithm
B) key agreement algorithm
C) only a
D) both a and b

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 22

Related Exams

Show Answer