2. Which of the following is true ?
Block cipher technique is an encryption technique.
Steam cipher technique is an encryption technique.
Both a and b.
Neither of a and b.
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
3. Program generation activity aims at
Automatic generation of program
Organize execution of a program written in PL
Skips generation of program
Speedens generation of program
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
4. The main reason to encrypt a file is to ______________.
Reduce its size
Secure it for transmission
Prepare it for backup
Include it in the start-up sequence
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
5. A public key encryption system
Allows only the correct receiver to decode the data
Allows only one to decode the transmission
Allows only the correct sender to decode the data
Does not encode the data before transmitting it
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
6. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message.
(I) and (II) only
(I) only
(II) only
(II) and (III) only
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
7. In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________.
11
13
16
17
8. Which of the following are forms of malicious attack ?
Theft of information
Modification of data
Wiping of information
All of the mentioned
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
9. What are common security threats ?
File Shredding
File sharing and permission
File corrupting
File integrity
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
10. From the following, which is not a common file permission ?
Write
Execute
Stop
Read
11. Which of the following is a good practice ?
Give full permission for remote transferring
Grant read only permission
Grant limited permission to specified account
Give both read and write permission but not execute
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
12. What is not a good practice for user administration ?
Isolating a system after a compromise
Perform random auditing procedures
Granting privileges on a per host basis
Using telnet and FTP for remote access
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
13. Which of the following is least secure method of authentication ?
Key card
Fingerprint
Retina pattern
Password
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
14. Which of the following is a strong password ?
19thAugust88
Delhi88
P@assw0rd
!augustdelhi
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
15. Why is one time password safe ?
It is easy to generated
It cannot be shared
It is different for every access
It is a complex enctypted password
Answer & Solution
No Solution for this Answer..! Report or Discus this Question