Deck 9: Cryptography and Network Security

Full screen (f)
exit full mode
Question
For RSA to work, the value of P must be less than the value of

A)p
B)q
C)n
D)r
Use Space or
up arrow
down arrow
to flip the card.
Question
In RSA, ?(n) = _______ in terms of p and q.

A) (p)/(q)
B) (p)(q)
C)(p-1)(q-1)
D) (p+1)(q+1)
Question
In RSA, we select a value 'e' such that it lies between 0 and ?(n) and it is relatively prime to ?(n).
Question
RSA is also a stream cipher like Merkel-Hellman.
Question
USENET falls under which category of public key sharing?

A)public announcement
B)publicly available directory
C)public key authority
D)public key certificate
Question
PGP makes use of which cryptographic algorithm?

A)rsa
B)aes
C)des
D)robin
Question
ECC stands for

A)elliptic curve cryptography
B)elliptic cryptography curve
C)error correcting code
D)none of the above
Question
Diffie-Hellman algorithm is widely known as_________

A)key exchange algorithm
B)key agreement algorithm
C)only a
D)both a and b
Question
Hash function is used for________

A)message authentication
B)digital signature
C)both a and b
D)only a
Question
RSA algorithm is best example of_______

A)asymmetric key cryptography
B)symmetric key cryptography
C)elliptic curve cryptography
D)all of the above
Question
In tunnel mode, IPSec protects the ______

A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Question
An attempt to make a computer resource unavailable to its intended users is called ______

A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
Question
SSL primarily focuses on _______

A)integrity and authenticity
B)integrity and non-repudiation
C)authenticity and privacy
D)confidentiality and integrity
Question
Pretty good privacy (PGP) is used in ______

A)browser security
B)email security
C)wifi security
D)ftp security
Question
__________ is used for encrypting data at network level

A)ipsec
B)https
C)smtp
D)s/mime
Question
WPA2 is used for security in _______

A)ethernet
B)wi-fi
C)bluetooth
D)e-mail
Question
Which of the following is not a strong security protocol

A)ssl
B)httpl
C)smtp
D)sftp
Question
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
Question
IPSec operates in______________. different modes

A)3
B)2
C)4
D)5
Question
Internet Key Exchange has ______________ phases and modes of operations

A)4
B)3
C)2
D)5
Question
PGP is abbreviated as

A)pretty good privacy
B)pretty good policy
C)policy good privacy
D)pretty good protection
Question
SET stands for

A)set electronic transaction
B)secure electronic transaction
C)simple electronic transaction
D)none of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/22
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Cryptography and Network Security
1
For RSA to work, the value of P must be less than the value of

A)p
B)q
C)n
D)r
n
2
In RSA, ?(n) = _______ in terms of p and q.

A) (p)/(q)
B) (p)(q)
C)(p-1)(q-1)
D) (p+1)(q+1)
(p-1)(q-1)
3
In RSA, we select a value 'e' such that it lies between 0 and ?(n) and it is relatively prime to ?(n).
False
4
RSA is also a stream cipher like Merkel-Hellman.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
5
USENET falls under which category of public key sharing?

A)public announcement
B)publicly available directory
C)public key authority
D)public key certificate
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
6
PGP makes use of which cryptographic algorithm?

A)rsa
B)aes
C)des
D)robin
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
7
ECC stands for

A)elliptic curve cryptography
B)elliptic cryptography curve
C)error correcting code
D)none of the above
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
8
Diffie-Hellman algorithm is widely known as_________

A)key exchange algorithm
B)key agreement algorithm
C)only a
D)both a and b
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
9
Hash function is used for________

A)message authentication
B)digital signature
C)both a and b
D)only a
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
10
RSA algorithm is best example of_______

A)asymmetric key cryptography
B)symmetric key cryptography
C)elliptic curve cryptography
D)all of the above
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
11
In tunnel mode, IPSec protects the ______

A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
12
An attempt to make a computer resource unavailable to its intended users is called ______

A)denial-of-service attack
B)virus attack
C)worms attack
D)botnet process
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
13
SSL primarily focuses on _______

A)integrity and authenticity
B)integrity and non-repudiation
C)authenticity and privacy
D)confidentiality and integrity
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
14
Pretty good privacy (PGP) is used in ______

A)browser security
B)email security
C)wifi security
D)ftp security
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
15
__________ is used for encrypting data at network level

A)ipsec
B)https
C)smtp
D)s/mime
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
16
WPA2 is used for security in _______

A)ethernet
B)wi-fi
C)bluetooth
D)e-mail
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not a strong security protocol

A)ssl
B)httpl
C)smtp
D)sftp
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
18
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
19
IPSec operates in______________. different modes

A)3
B)2
C)4
D)5
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
20
Internet Key Exchange has ______________ phases and modes of operations

A)4
B)3
C)2
D)5
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
21
PGP is abbreviated as

A)pretty good privacy
B)pretty good policy
C)policy good privacy
D)pretty good protection
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
22
SET stands for

A)set electronic transaction
B)secure electronic transaction
C)simple electronic transaction
D)none of the above
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 22 flashcards in this deck.