Deck 9: Cryptography and Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/22
Play
Full screen (f)
Deck 9: Cryptography and Network Security
1
For RSA to work, the value of P must be less than the value of
A)p
B)q
C)n
D)r
A)p
B)q
C)n
D)r
n
2
In RSA, ?(n) = _______ in terms of p and q.
A) (p)/(q)
B) (p)(q)
C)(p-1)(q-1)
D) (p+1)(q+1)
A) (p)/(q)
B) (p)(q)
C)(p-1)(q-1)
D) (p+1)(q+1)
(p-1)(q-1)
3
In RSA, we select a value 'e' such that it lies between 0 and ?(n) and it is relatively prime to ?(n).
False
4
RSA is also a stream cipher like Merkel-Hellman.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
5
USENET falls under which category of public key sharing?
A)public announcement
B)publicly available directory
C)public key authority
D)public key certificate
A)public announcement
B)publicly available directory
C)public key authority
D)public key certificate
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
6
PGP makes use of which cryptographic algorithm?
A)rsa
B)aes
C)des
D)robin
A)rsa
B)aes
C)des
D)robin
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
7
ECC stands for
A)elliptic curve cryptography
B)elliptic cryptography curve
C)error correcting code
D)none of the above
A)elliptic curve cryptography
B)elliptic cryptography curve
C)error correcting code
D)none of the above
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
8
Diffie-Hellman algorithm is widely known as_________
A)key exchange algorithm
B)key agreement algorithm
C)only a
D)both a and b
A)key exchange algorithm
B)key agreement algorithm
C)only a
D)both a and b
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
9
Hash function is used for________
A)message authentication
B)digital signature
C)both a and b
D)only a
A)message authentication
B)digital signature
C)both a and b
D)only a
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
10
RSA algorithm is best example of_______
A)asymmetric key cryptography
B)symmetric key cryptography
C)elliptic curve cryptography
D)all of the above
A)asymmetric key cryptography
B)symmetric key cryptography
C)elliptic curve cryptography
D)all of the above
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
11
In tunnel mode, IPSec protects the ______
A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
12
An attempt to make a computer resource unavailable to its intended users is called ______
A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
13
SSL primarily focuses on _______
A)integrity and authenticity
B)integrity and non-repudiation
C)authenticity and privacy
D)confidentiality and integrity
A)integrity and authenticity
B)integrity and non-repudiation
C)authenticity and privacy
D)confidentiality and integrity
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
14
Pretty good privacy (PGP) is used in ______
A)browser security
B)email security
C)wifi security
D)ftp security
A)browser security
B)email security
C)wifi security
D)ftp security
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
15
__________ is used for encrypting data at network level
A)ipsec
B)https
C)smtp
D)s/mime
A)ipsec
B)https
C)smtp
D)s/mime
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
16
WPA2 is used for security in _______
A)ethernet
B)wi-fi
C)bluetooth
D)e-mail
A)ethernet
B)wi-fi
C)bluetooth
D)e-mail
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not a strong security protocol
A)ssl
B)httpl
C)smtp
D)sftp
A)ssl
B)httpl
C)smtp
D)sftp
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
18
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
19
IPSec operates in______________. different modes
A)3
B)2
C)4
D)5
A)3
B)2
C)4
D)5
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
20
Internet Key Exchange has ______________ phases and modes of operations
A)4
B)3
C)2
D)5
A)4
B)3
C)2
D)5
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
21
PGP is abbreviated as
A)pretty good privacy
B)pretty good policy
C)policy good privacy
D)pretty good protection
A)pretty good privacy
B)pretty good policy
C)policy good privacy
D)pretty good protection
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
22
SET stands for
A)set electronic transaction
B)secure electronic transaction
C)simple electronic transaction
D)none of the above
A)set electronic transaction
B)secure electronic transaction
C)simple electronic transaction
D)none of the above
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck