Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Search results for network-security
39
votes
12
answers
1
GATE CSE 2017 Set 1 | Question: 44
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the ...
Arjun
23.9k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
network-security
computer-networks
rsa-security-networks
out-of-gate-syllabus
numerical-answers
normal
+
–
1
votes
1
answer
2
ISRO 2024
CAPTCHA is used to provide protection from Zero day attack Buffer Overflow Automated scripted attack Man in the middle attack
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
Ramayya
300
views
Ramayya
asked
Jan 7
Others
isro-2024
non-gate
network-security
web-technologies
+
–
42
votes
3
answers
3
GATE CSE 2011 | Question: 2
A layer-$4$ firewall (a device that can look at all protocol headers up to the transport layer) CANNOT block entire $\text{HTTP}$ traffic during $9:00PM$ and $5:00AM$ block all $\text{ICMP}$ traffic stop incoming traffic from specific $\text{IP}$ ... same IP address block $\text{TCP}$ traffic from a specific user on a multi-user system during $9:00PM$ to $5:00AM$
A layer-$4$ firewall (a device that can look at all protocol headers up to the transport layer) CANNOTblock entire $\text{HTTP}$ traffic during $9:00PM$ and $5:00AM$block...
go_editor
17.0k
views
go_editor
asked
Sep 29, 2014
Computer Networks
gatecse-2011
computer-networks
network-security
firewall
normal
out-of-gate-syllabus
+
–
0
votes
0
answers
4
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2. a. If user A as public key YA=9 what is as private key XA? b. If user B has public key YB= 3 what is the shared secret key K?
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2. If user A as public key YA=9 what is as private key XA? If user B has public key YB= 3...
JustPakYt
1.3k
views
JustPakYt
asked
Nov 13, 2022
Computer Networks
computer-networks
network-security
deadlock-prevention-avoidance-detection
counting
+
–
1
votes
1
answer
5
DRDO CSE 2022 Paper 2 | Question: 23 (a)
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that by default, all traffic will be accepted. You can refer to an entire ... *' to many 'any'. Action A: Block all traffic to any server on the local network. Write as Rule $1.$
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that ...
admin
347
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-and-half-marks
descriptive
+
–
1
votes
0
answers
6
DRDO CSE 2022 Paper 2 | Question: 21
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it securely to edit and modify. What is the one critical security protocol/tool that enables you to connect to your server securely?
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it...
admin
438
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-marks
descriptive
+
–
0
votes
0
answers
7
UPSC Assistant Director (Systems) Exam
If a password hacker devised a system trying a password entry system by a program which ran once a second. How much time it would take to crack a password consisting of 4 out of the 24 alphabet letters? (a) 40 hrs approximately (b) 46 hrs approximately (c) 52 hrs approximately (d) 58 hrs approximately
If a password hacker devised a system trying a password entry system by a program which ran once a second. How much time it would take to crack a password consisting of 4...
Kumar RahulSingh
330
views
Kumar RahulSingh
asked
Nov 28, 2022
Computer Networks
network-security
combinatory
+
–
0
votes
0
answers
8
The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are: (A) n(n-1) and 2n (B) 2n and ((n(n – 1))/2) (C) ((n(n – 1))/2) and 2n (D) ((n(n – 1))/2) and n
Jeetmoni saikia
471
views
Jeetmoni saikia
asked
Nov 18, 2022
Computer Networks
computer-networks
network-security
normal
+
–
0
votes
0
answers
9
Is Ipv6 & network security is in gate 2023?
Is Ipv6 & network security is in gate 2023?
Is Ipv6 & network security is in gate 2023?
Vijay_Ram
186
views
Vijay_Ram
asked
Oct 8, 2022
Computer Networks
computer-networks
network-security
+
–
29
votes
5
answers
10
GATE IT 2004 | Question: 25
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE? Sender encrypts using receiver's public key Sender encrypts using his own public key Receiver decrypts using sender's public key Receiver decrypts using his own public key
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?Sender encrypts using receiver's publi...
Ishrat Jahan
13.4k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
47
votes
7
answers
11
GATE IT 2004 | Question: 84
Consider a parity check code with three data bits and four parity check bits. Three of the Code Words are $0101011, 1001101$ and $1110001.$ Which of the following are also code words? $0010111$ $0110110$ $1011010$ $0111010$ I and III I, II and III II and IV I, II, III and IV
Consider a parity check code with three data bits and four parity check bits. Three of the Code Words are $0101011, 1001101$ and $1110001.$ Which of the following are als...
Ishrat Jahan
18.9k
views
Ishrat Jahan
asked
Nov 2, 2014
Computer Networks
gateit-2004
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
13
votes
6
answers
12
GATE CSE 2019 | Question: 54
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Function, then the prime factor of $n$ which is greater than $50$ is _________
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Funct...
Arjun
9.0k
views
Arjun
asked
Feb 7, 2019
Computer Networks
gatecse-2019
numerical-answers
computer-networks
network-security
out-of-gate-syllabus
2-marks
+
–
0
votes
0
answers
13
NIELIT STA 2021
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is: Vulnerability attack Bandwidth flooding Connection flooding UDP flooding
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is: Vulnerability attackBandwidth flooding...
rsansiya111
370
views
rsansiya111
asked
Dec 6, 2021
Computer Networks
network-security
+
–
1
votes
2
answers
14
NIELIT 2017 DEC Scientific Assistant A - Section B: 49
Why is one - time password safe ? It is easy to generate It cannot b shared It is different for every access It can be easily decrypted
Why is one - time password safe ?It is easy to generateIt cannot b sharedIt is different for every accessIt can be easily decrypted
admin
860
views
admin
asked
Mar 31, 2020
Computer Networks
nielit2017dec-assistanta
computer-networks
network-security
+
–
2
votes
4
answers
15
ISRO2018-78
Which one of the following algorithm is not used in asymmetric key cryptography? RSA Algorithm Gillie-Hellman Algorithm Electronic Code Book Algorithm None of the above
Which one of the following algorithm is not used in asymmetric key cryptography?RSA AlgorithmGillie-Hellman AlgorithmElectronic Code Book AlgorithmNone of the above
Arjun
14.3k
views
Arjun
asked
Apr 22, 2018
Computer Networks
isro2018
computer-networks
network-security
cryptography
+
–
0
votes
2
answers
16
UGC NET CSE | October 2020 | Part 2 | Question: 54
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value ... below: $(i)$ only $(ii)$ and $(iii)$ only $(i)$ and $(iii)$ only $(ii)$ only
Which among the following statement(s) is(are) true?A hash function takes a message of arbitrary length and generates a fixed length codeA hash function takes a message o...
go_editor
2.3k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
+
–
1
votes
2
answers
17
UGC NET CSE | October 2020 | Part 2 | Question: 60
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis of Source IP address Destination IP address TCP Source Port UDP Source Port TCP Destination Port Choose the correct answer from the options given ... only $(c)$ and $(d)$ only $(a), (b), (c), (d)$ and $(e)$ only
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis ofSource IP addressDestination I...
go_editor
1.1k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-neworks
network-security
+
–
23
votes
3
answers
18
GATE CSE 2013 | Question: 13
Using public key cryptography, $X$ adds a digital signature σ to message $M$, encrypts $\langle M, \sigma \rangle$, and sends it to $Y$, where it is decrypted. Which one of the following sequences of keys is used for the operations? Encryption: $X's$ ... : $X's$ private key followed by $Y's$ public key; Decryption: $Y's$ private key followed by $X's$ public key
Using public key cryptography, $X$ adds a digital signature σ to message $M$, encrypts $\langle M, \sigma \rangle$, and sends it to $Y$, where it is decrypted. Which one...
Arjun
9.1k
views
Arjun
asked
Sep 23, 2014
Computer Networks
gatecse-2013
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
36
votes
3
answers
19
GATE IT 2007 | Question: 18
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow external hosts to send packets on existing open TCP connections or connections ... be that of A combinational circuit A finite automaton A pushdown automaton with one stack A pushdown automaton with two stacks
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow extern...
Ishrat Jahan
6.4k
views
Ishrat Jahan
asked
Oct 29, 2014
Computer Networks
gateit-2007
computer-networks
theory-of-computation
normal
network-security
out-of-gate-syllabus
+
–
21
votes
4
answers
20
GATE IT 2008 | Question: 70
The total number of keys required for a set of $n$ individuals to be able to communicate with each other using secret key and public key cryptosystems, respectively are: $n(n-1)$ and $2n$ $2n$ and $\dfrac{n(n - 1)}{2}$ $\dfrac{n(n - 1)}{2}$ and $2n$ $\dfrac{n(n - 1)}{2}$ and $n$
The total number of keys required for a set of $n$ individuals to be able to communicate with each other using secret key and public key cryptosystems, respectively are:$...
Ishrat Jahan
11.3k
views
Ishrat Jahan
asked
Oct 29, 2014
Computer Networks
gateit-2008
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
Page:
1
2
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register