1. In Elgamal cryptosystem, given the prime p=31,What is the respective plaintext character for C = (27, 20)?
Correct : A. h
2. How many real and imaginary roots does the equation y2=x3-1 have
Correct : D. 2 imaginary, 1 real
3. “In ECC, the inverse of point P =(x1, y1) is Q = (-x1, y1). “
Correct : B. false
4. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0)?
Correct : A. (15, -56)
5. How many real and imaginary roots does the equation y2=x3-4x have
Correct : B. all real
6. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is 2P if P = (4, 3.464)
Correct : A. (12.022, -39.362)
7. In public key cryptosystem keys are used for encryption and decryption.
Correct : B. different
8. PGP system uses
Correct : C. private & public key system
9. Knapsack problem can be solved by
Correct : A. public key cryptosystem
10. Merkle hellman is a symmetric cryptosystem.
Correct : B. false
11. In public key cryptosystem which is kept as public?
Correct : A. encryption keys
12. A cryptographic hash function has variable output length.
Correct : B. false
13. In a trapdoor function, the functions are easy to go in
Correct : A. one direction
14. Which algorithm can be used to sign a message?
Correct : A. public key algorithm
15. In this Merkle Hellman method same key is used for encryption and decryption.
Correct : B. false
16. A set of numbers is called as super increasing if
Correct : B. each element greater than sum of all the previous elements
17. There are major ways of stealing email information.
Correct : B. 3
18. Which of them is not a major way of
stealing email information?
Correct : B. reverse engineering
19. is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.
Correct : A. email security
20. is a famous technological medium for the spread of malware,
facing problems of spam, & phishing attacks.
Correct : D. email
21. Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as details and passwords.
Correct : B. credit card, login id
22. Unsolicited Bulk E-mails (UBI) are
called
Correct : C. spam emails
23. Using email hacking illicit hackers can send & spread virus and
spam emails.
Correct : A. trojans, redirected malicious urls
24. is the technique used for tricking
users to disclose their username and passwords through fake pages.
Correct : B. phishing
25. Which of them is an example of
grabbing email information?
Correct : A. cookie stealing
26. Which of the following is a non-technical
type of intrusion or attack technique?
Correct : C. social engineering
27. If the data stored in the is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.
Correct : C. cookies
28. The stored cookie which contains all your personal data about that website can be stolen away by using
or trojans.
Correct : A. attackers, malware
29. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers
the cookie to that website.
Correct : A. true
30. Which of them is not a proper method
for email security?
Correct : D. click on unknown links to
explore
31. What are email security services?
Correct : D. all of the above
32. PGP security system uses
Correct : C. public & private key
cryptosystem
33. What is the key size allowed in PGP?
Correct : C. 1024-4096
34. Who created PGP?
Correct : A. phil zimmermann
35. What is the PGP stand for?
Correct : C. pretty good privacy
36. PGP makes use of which cryptographic
algorithm?
Correct : C. rsa
37. PGP offers block ciphers for
message encryption?
Correct : D. all of the above
38. S/MIME stands for .
Correct : B. secure multipurpose internet
mail extensions.
39. is used for hiding the payment
information from the merchant.
Correct : A. set.
40. The cryptography algorithms used in
S/MIME are .
Correct : C. rsa,des-3
41. In S/MIME,MLA stands for .
Correct : A. mailing list agent.
42. Which component is included in IP
security?
Correct : A. authentication header (ah)
43. WPA2 is used for security in
Correct : C. wi-fi
44. An attempt to make a computer resource unavailable to its intended
users is called
Correct : A. denial-of-service attack
45. PGP is used in
Correct : B. email security
46. In tunnel mode, IPSec protects the
Correct : A. entire ip packet
47. IPSec is designed to provide security at
the
Correct : B. network layer
48. Which of the following is not a strong
security protocol?
Correct : C. smtp
49. SSL primarily focuses on
Correct : A. integrity and authenticity
50. Why did SSL certificate require in
HTTP?
Correct : C. for encrypted data sent over
http protocol
51. SFTP is abbreviated as
Correct : A. secure file transfer protocol
52. mointors user activity on internet
and transmit that information in the background to someone else
Correct : B. spyware
53. Firewall is type of------
Correct : D. none of these
54. The full form of Malware is
Correct : C. malicious software
55. There are types of computer virus.
Correct : C. 10
56. A computer is a malicious code
which self-replicates by copying itself to other programs.
Correct : B. virus
57. Which of them is not an ideal way of
spreading the virus?
Correct : C. official antivirus cds
58. is the kind of firewall is
connected between the device and the network connecting to internet.
Correct : A. hardware firewall
59. Which of the following is not a software
firewall?
Correct : D. linksys firewall
60. Firewall examines each that are
entering or leaving the internal network
Correct : D. data packets
61. A firewall protects which of the following
attacks?