Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged network-security
1
votes
1
answer
1
ISRO 2024
CAPTCHA is used to provide protection from Zero day attack Buffer Overflow Automated scripted attack Man in the middle attack
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
Ramayya
278
views
Ramayya
asked
Jan 7
Others
isro-2024
non-gate
network-security
web-technologies
+
–
1
votes
0
answers
2
DRDO CSE 2022 Paper 2 | Question: 21
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it securely to edit and modify. What is the one critical security protocol/tool that enables you to connect to your server securely?
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it...
admin
426
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-marks
descriptive
+
–
1
votes
1
answer
3
DRDO CSE 2022 Paper 2 | Question: 23 (a)
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that by default, all traffic will be accepted. You can refer to an entire ... *' to many 'any'. Action A: Block all traffic to any server on the local network. Write as Rule $1.$
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that ...
admin
336
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-and-half-marks
descriptive
+
–
0
votes
0
answers
4
UPSC Assistant Director (Systems) Exam
If a password hacker devised a system trying a password entry system by a program which ran once a second. How much time it would take to crack a password consisting of 4 out of the 24 alphabet letters? (a) 40 hrs approximately (b) 46 hrs approximately (c) 52 hrs approximately (d) 58 hrs approximately
If a password hacker devised a system trying a password entry system by a program which ran once a second. How much time it would take to crack a password consisting of 4...
Kumar RahulSingh
319
views
Kumar RahulSingh
asked
Nov 28, 2022
Computer Networks
network-security
combinatory
+
–
0
votes
0
answers
5
The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are: (A) n(n-1) and 2n (B) 2n and ((n(n – 1))/2) (C) ((n(n – 1))/2) and 2n (D) ((n(n – 1))/2) and n
Jeetmoni saikia
428
views
Jeetmoni saikia
asked
Nov 18, 2022
Computer Networks
computer-networks
network-security
normal
+
–
0
votes
0
answers
6
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2. a. If user A as public key YA=9 what is as private key XA? b. If user B has public key YB= 3 what is the shared secret key K?
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2. If user A as public key YA=9 what is as private key XA? If user B has public key YB= 3...
JustPakYt
1.2k
views
JustPakYt
asked
Nov 13, 2022
Computer Networks
computer-networks
network-security
deadlock-prevention-avoidance-detection
counting
+
–
0
votes
0
answers
7
Is Ipv6 & network security is in gate 2023?
Is Ipv6 & network security is in gate 2023?
Is Ipv6 & network security is in gate 2023?
Vijay_Ram
165
views
Vijay_Ram
asked
Oct 8, 2022
Computer Networks
computer-networks
network-security
+
–
0
votes
0
answers
8
NIELIT STA 2021
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is: Vulnerability attack Bandwidth flooding Connection flooding UDP flooding
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is: Vulnerability attackBandwidth flooding...
rsansiya111
352
views
rsansiya111
asked
Dec 6, 2021
Computer Networks
network-security
+
–
0
votes
1
answer
9
UGC NET CSE | October 2020 | Part 2 | Question: 32
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$$20, 19$$33,11$$3, 28$$77, 28$
go_editor
1.9k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
+
–
0
votes
2
answers
10
UGC NET CSE | October 2020 | Part 2 | Question: 54
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value ... below: $(i)$ only $(ii)$ and $(iii)$ only $(i)$ and $(iii)$ only $(ii)$ only
Which among the following statement(s) is(are) true?A hash function takes a message of arbitrary length and generates a fixed length codeA hash function takes a message o...
go_editor
2.3k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
+
–
1
votes
2
answers
11
UGC NET CSE | October 2020 | Part 2 | Question: 60
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis of Source IP address Destination IP address TCP Source Port UDP Source Port TCP Destination Port Choose the correct answer from the options given ... only $(c)$ and $(d)$ only $(a), (b), (c), (d)$ and $(e)$ only
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis ofSource IP addressDestination I...
go_editor
1.1k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-neworks
network-security
+
–
0
votes
1
answer
12
UGC NET CSE | October 2020 | Part 2 | Question: 89
Given below are two statements: Statement $I$: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryption Statement $II$: Diffie-Hellman algorithm is used for exchange of secret key In the light of the above ... Statement $I$ is correct but Statement $II$ is false Statement $I$ is incorrect but Statement $II$ is true
Given below are two statements:Statement $I$: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryptionStatement $II$: Diffie-Hellman algori...
go_editor
1.1k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-networks
network-security
+
–
1
votes
2
answers
13
NIELIT 2016 MAR Scientist C - Section C: 38
How many bits are required to encode all twenty six letters, ten symbols, and ten numerals? $5$ $6$ $7$ $46$
How many bits are required to encode all twenty six letters, ten symbols, and ten numerals?$5$$6$$7$$46$
admin
741
views
admin
asked
Apr 2, 2020
Computer Networks
nielit2016mar-scientistc
computer-networks
network-security
+
–
0
votes
2
answers
14
NIELIT 2017 DEC Scientific Assistant A - Section B: 14
$PGP$ encrypts data by using a block cipher called : international data encryption algorithm private data encryption algorithm internet data encryption algorithm none of the options
$PGP$ encrypts data by using a block cipher called :international data encryption algorithmprivate data encryption algorithminternet data encryption algorithmnone of the ...
admin
2.8k
views
admin
asked
Mar 31, 2020
Computer Networks
nielit2017dec-assistanta
computer-networks
network-security
+
–
1
votes
2
answers
15
NIELIT 2017 DEC Scientific Assistant A - Section B: 49
Why is one - time password safe ? It is easy to generate It cannot b shared It is different for every access It can be easily decrypted
Why is one - time password safe ?It is easy to generateIt cannot b sharedIt is different for every accessIt can be easily decrypted
admin
835
views
admin
asked
Mar 31, 2020
Computer Networks
nielit2017dec-assistanta
computer-networks
network-security
+
–
2
votes
2
answers
16
UGC NET CSE | June 2019 | Part 2 | Question: 89
The ability to inject packets into the Internet with a false source address is known as Man-in-the-middle attack IP phishing IP sniffing IP spoofing
The ability to inject packets into the Internet with a false source address is known asMan-in-the-middle attackIP phishingIP sniffingIP spoofing
Arjun
2.0k
views
Arjun
asked
Jul 2, 2019
Computer Networks
ugcnetcse-june2019-paper2
network-security
+
–
1
votes
1
answer
17
UGC NET CSE | June 2019 | Part 2 | Question: 90
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in instruction detection systems digital signatures data compression certification
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used ini...
Arjun
2.3k
views
Arjun
asked
Jul 2, 2019
Computer Networks
ugcnetcse-june2019-paper2
network-security
rsa-security-networks
computer-networks
+
–
0
votes
1
answer
18
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
A math class has 25 students. Assuming that all of the students were born in the firsthalf of the year—between January 1st and June 30th— what is the probability that...
ajaysoni1924
653
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
+
–
0
votes
0
answers
19
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a man-in-the-middle attack. (b) How would this susceptibility change if n or g were secret?
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, evenif they have never met, share no secrets, and have no certificates(a) Explain how ...
ajaysoni1924
479
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
descriptive
+
–
0
votes
1
answer
20
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
The Diffie-Hellman key exchange is being used to establish a secret key betweenAlice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’ssecret numbe...
ajaysoni1924
1.7k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
+
–
0
votes
0
answers
21
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
Alice wants to communicate with Bob, using public-key cryptography. She establishesa connection to someone she hopes is Bob. She asks him for his public key andhe sends i...
ajaysoni1924
465
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
network-security
tanenbaum
cryptography
+
–
0
votes
1
answer
22
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 18 (Page No. 873)
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number n of their public key pairs. In other words, Trudy found out that na = pa × q and nb = pb × q. How can Trudy use this information to break Alice’s code?
Alice and Bob use RSA public key encryption in order to communicate between them.Trudy finds out that Alice and Bob shared one of the primes used to determine thenumber n...
ajaysoni1924
1.0k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
network-security
rsa-security-networks
tanenbaum
+
–
1
votes
2
answers
23
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 17 (Page No. 873)
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26.(a) If p = 5 and q = 13, list five legal values for d.(b) If p = 5, q = 31, and d = 37, find...
ajaysoni1924
2.2k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
rsa-security-networks
+
–
0
votes
0
answers
24
DIGITAL CERTIFICATE ( Self Doubts)
I'm not able to distinguish the difference between digital certificate and digital signature Correct me if there is flaw in my understanding : A Digital Certificate is certificate of authenticity and it is given to any host by a trusted third ... hand is dished out by the client/server whenever it attempts to make any data transfer and it ensure data integrity
I’m not able to distinguish the difference between digital certificate and digital signature… Correct me if there is flaw in my understanding : A Digital Certificate ...
s_dr_13
288
views
s_dr_13
asked
Mar 11, 2019
Computer Networks
network-security
+
–
13
votes
6
answers
25
GATE CSE 2019 | Question: 54
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Function, then the prime factor of $n$ which is greater than $50$ is _________
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Funct...
Arjun
8.8k
views
Arjun
asked
Feb 7, 2019
Computer Networks
gatecse-2019
numerical-answers
computer-networks
network-security
out-of-gate-syllabus
2-marks
+
–
0
votes
1
answer
26
Ace Test Series: Computer Networks - IP Inverse
Shubhanshu
641
views
Shubhanshu
asked
Jan 19, 2019
Computer Networks
ace-test-series
computer-networks
network-security
+
–
0
votes
2
answers
27
UGC NET CSE | December 2018 | Part 2 | Question: 66
Which of the following statement/s is/are true? Firewalls can screen traffic going into or out of an organization. Virtual private networks can stimulate an old leased network to provide certain desirable properties. Choose the correct answer from the code given below: (i) only (ii) only Both (i) and (ii) Neither (i) nor (ii)
Which of the following statement/s is/are true?Firewalls can screen traffic going into or out of an organization.Virtual private networks can stimulate an old leased netw...
Arjun
1.7k
views
Arjun
asked
Jan 2, 2019
Computer Networks
ugcnetcse-dec2018-paper2
network-security
+
–
0
votes
2
answers
28
UGC NET CSE | December 2018 | Part 2 | Question: 90
Suppose that everyone in a group of $N$ people wants to communicate secretly with $(N-1)$ other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys ... whole to satisfy the confidentiality requirement is $N(N-1)$ $N(N-1)/2$ $2N$ $(N-1)^2$
Suppose that everyone in a group of $N$ people wants to communicate secretly with $(N-1)$ other people using symmetric key cryptographic system. The communication between...
Arjun
1.0k
views
Arjun
asked
Jan 2, 2019
Computer Networks
ugcnetcse-dec2018-paper2
computer-networks
network-security
+
–
Page:
1
2
3
4
5
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register