Self Studies

Computer Networ...

TIME LEFT -
  • Question 1
    1 / -0

    Let P be the plaintext, k be the key, Ek be the function to encrypt the plaintext and Dk be the function to decrypt the ciphertext. What is valid function to get the plain text?

  • Question 2
    1 / -0

    Which of the following are used to generate a message digest by the network security

    protocols?

    P) SHA-256

    Q) AES

    R) DES

    S) MD5

  • Question 3
    1 / -0

    Match the terms with the definition.

    a) masquerading                    i) session is intercepted

    b) Phishing                             ii) one pretends to be someone else

    c) Hijacking                            iii) a email misleads a user into entering confidential information

  • Question 4
    1 / -0

    If the total relative prime number for integer n from 1 to n is y and n is 23552 then the value of y is _____? 

  • Question 5
    1 / -0

    Consider the following statement.

    I. Packet Filter Firewall analyze network traffic at transport layer.

    II. Circuit Level Firewall operate at transport and session layer of OSI Model.

    From the above statement which statement/s is/are True

  • Question 6
    1 / -0

    Consider an RSA cryptosystem, a participant A uses two prime numbers p and q where p × q = 1247 to generate his public and private keys. The public key of A is e and the private key is d. The value of the public key is 11. The value of the private key d is _____.

  • Question 7
    1 / -0

    Which of the following statements are true?

    I. An asymmetric key cryptosystem uses the private and public keys of the receiver

    II. A digital signature uses the private and public keys of the sender.

    III. Symmetric-key cryptosystems are very inefficient when dealing with long messages.

  • Question 8
    1 / -0

    The value of the expression (353 mod 7) in the range 0 to 7 is _____.

  • Question 9
    1 / -0

    Consider a cyber cafe in which 51 systems are present. All 51 systems want to communicate with each other using symmetric key cryptographic system and the communication should not be decoded by others apart from two systems who are communicating. What is the number of keys required for the systems as a whole to satisfy confidentiality?

Submit Test
Self Studies
User
Question Analysis
  • Answered - 0

  • Unanswered - 9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
Submit Test
Selfstudy
Selfstudy
Self Studies Get latest Exam Updates
& Study Material Alerts!
No, Thanks
Self Studies
Click on Allow to receive notifications
Allow Notification
Self Studies
Self Studies Self Studies
To enable notifications follow this 2 steps:
  • First Click on Secure Icon Self Studies
  • Second click on the toggle icon
Allow Notification
Get latest Exam Updates & FREE Study Material Alerts!
Self Studies ×
Open Now