Login
Register
@
Dark Mode
Profile
Edit my Profile
Messages
My favorites
Register
Activity
Q&A
Questions
Unanswered
Tags
Subjects
Users
Ask
Previous Years
Blogs
New Blog
Exams
Dark Mode
Recent questions tagged network-security
1
vote
0
answers
1
DRDO CSE 2022 Paper 2 | Question: 21
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it securely to edit and modify. What is the one critical security protocol/tool that enables you to connect to your server securely?
admin
asked
in
Computer Networks
Dec 15, 2022
by
admin
158
views
drdocse-2022-paper2
computer-networks
network-security
2-marks
descriptive
1
vote
1
answer
2
DRDO CSE 2022 Paper 2 | Question: 23 (a)
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that by default, all traffic will be accepted. You can refer to an entire network by ... use '*' to many 'any'. Action A: Block all traffic to any server on the local network. Write as Rule $1.$
admin
asked
in
Computer Networks
Dec 15, 2022
by
admin
127
views
drdocse-2022-paper2
computer-networks
network-security
2-and-half-marks
descriptive
0
votes
0
answers
3
UPSC Assistant Director (Systems) Exam
If a password hacker devised a system trying a password entry system by a program which ran once a second. How much time it would take to crack a password consisting of 4 out of the 24 alphabet letters? (a) 40 hrs approximately (b) 46 hrs approximately (c) 52 hrs approximately (d) 58 hrs approximately
Kumar RahulSingh
asked
in
Computer Networks
Nov 28, 2022
by
Kumar RahulSingh
171
views
network-security
combinatory
0
votes
0
answers
4
The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are: (A) n(n-1) and 2n (B) 2n and ((n(n – 1))/2) (C) ((n(n – 1))/2) and 2n (D) ((n(n – 1))/2) and n
Jeetmoni saikia
asked
in
Computer Networks
Nov 18, 2022
by
Jeetmoni saikia
133
views
computer-networks
network-security
normal
0
votes
0
answers
5
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2. a. If user A as public key YA=9 what is as private key XA? b. If user B has public key YB= 3 what is the shared secret key K?
JustPakYt
asked
in
Computer Networks
Nov 14, 2022
by
JustPakYt
771
views
computer-networks
network-security
deadlock-prevention-avoidance-detection
counting
0
votes
0
answers
6
Is Ipv6 & network security is in gate 2023?
Is Ipv6 & network security is in gate 2023?
Vijay_Ram
asked
in
Computer Networks
Oct 8, 2022
by
Vijay_Ram
67
views
computer-networks
network-security
0
votes
0
answers
7
NIELIT STA 2021
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is: Vulnerability attack Bandwidth flooding Connection flooding UDP flooding
rsansiya111
asked
in
Computer Networks
Dec 6, 2021
by
rsansiya111
123
views
network-security
0
votes
1
answer
8
UGC NET CSE | October 2020 | Part 2 | Question: 32
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$ $20, 19$ $33,11$ $3, 28$ $77, 28$
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
1.2k
views
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
0
votes
2
answers
9
UGC NET CSE | October 2020 | Part 2 | Question: 54
Which among the following statement(s) is(are) true? A hash function takes a message of arbitrary length and generates a fixed length code A hash function takes a message of fixed length and generates a code of variable length A hash function may give same hash value for ... below: $(a)$ only $(b)$ and $(c)$ only $(a)$ and $(c)$ only $(b)$ only
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
2.0k
views
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
1
vote
2
answers
10
UGC NET CSE | October 2020 | Part 2 | Question: 60
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis of Source IP address Destination IP address TCP Source Port UDP Source Port TCP Destination Port Choose the correct answer from the options given ... only $(c)$ and $(d)$ only $(a), (b), (c), (d)$ and $(e)$ only
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
796
views
ugcnetcse-oct2020-paper2
computer-neworks
network-security
0
votes
1
answer
11
UGC NET CSE | October 2020 | Part 2 | Question: 89
Given below are two statements: Statement $I$: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryption Statement $II$: Diffie-Hellman algorithm is used for exchange of secret key In the light of the above ... Statement $I$ is correct but Statement $II$ is false Statement $I$ is incorrect but Statement $II$ is true
go_editor
asked
in
Computer Networks
Nov 20, 2020
by
go_editor
815
views
ugcnetcse-oct2020-paper2
computer-networks
network-security
1
vote
2
answers
12
NIELIT 2016 MAR Scientist C - Section C: 38
How many bits are required to encode all twenty six letters, ten symbols, and ten numerals? $5$ $6$ $7$ $46$
Lakshman Bhaiya
asked
in
Computer Networks
Apr 2, 2020
by
Lakshman Bhaiya
415
views
nielit2016mar-scientistc
computer-networks
network-security
0
votes
2
answers
13
NIELIT 2017 DEC Scientific Assistant A - Section B: 14
$PGP$ encrypts data by using a block cipher called : international data encryption algorithm private data encryption algorithm internet data encryption algorithm none of the options
Lakshman Bhaiya
asked
in
Computer Networks
Mar 31, 2020
by
Lakshman Bhaiya
2.1k
views
nielit2017dec-assistanta
computer-networks
network-security
1
vote
2
answers
14
NIELIT 2017 DEC Scientific Assistant A - Section B: 49
Why is one - time password safe ? It is easy to generate It cannot b shared It is different for every access It can be easily decrypted
Lakshman Bhaiya
asked
in
Computer Networks
Mar 31, 2020
by
Lakshman Bhaiya
569
views
nielit2017dec-assistanta
computer-networks
network-security
2
votes
2
answers
15
UGC NET CSE | June 2019 | Part 2 | Question: 89
The ability to inject packets into the Internet with a false source address is known as Man-in-the-middle attack IP phishing IP sniffing IP spoofing
Arjun
asked
in
Computer Networks
Jul 2, 2019
by
Arjun
1.6k
views
ugcnetcse-june2019-paper2
network-security
1
vote
1
answer
16
UGC NET CSE | June 2019 | Part 2 | Question: 90
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in instruction detection systems digital signatures data compression certification
Arjun
asked
in
Computer Networks
Jul 2, 2019
by
Arjun
2.1k
views
ugcnetcse-june2019-paper2
network-security
rsa-security-networks
computer-networks
0
votes
1
answer
17
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
520
views
computer-networks
tanenbaum
network-security
cryptography
0
votes
0
answers
18
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a man-in-the-middle attack. (b) How would this susceptibility change if n or g were secret?
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
347
views
computer-networks
tanenbaum
network-security
cryptography
descriptive
0
votes
1
answer
19
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
1.3k
views
computer-networks
tanenbaum
network-security
cryptography
0
votes
0
answers
20
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
386
views
computer-networks
network-security
tanenbaum
cryptography
0
votes
1
answer
21
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 18 (Page No. 873)
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number n of their public key pairs. In other words, Trudy found out that na = pa × q and nb = pb × q. How can Trudy use this information to break Alice’s code?
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
802
views
computer-networks
network-security
rsa-security-networks
tanenbaum
1
vote
2
answers
22
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 17 (Page No. 873)
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
ajaysoni1924
asked
in
Computer Networks
Mar 19, 2019
by
ajaysoni1924
1.7k
views
computer-networks
tanenbaum
network-security
rsa-security-networks
0
votes
0
answers
23
DIGITAL CERTIFICATE ( Self Doubts)
I'm not able to distinguish the difference between digital certificate and digital signature Correct me if there is flaw in my understanding : A Digital Certificate is certificate of authenticity and it is given to any host by a trusted third ... hand is dished out by the client/server whenever it attempts to make any data transfer and it ensure data integrity
s_dr_13
asked
in
Computer Networks
Mar 11, 2019
by
s_dr_13
187
views
network-security
13
votes
6
answers
24
GATE CSE 2019 | Question: 54
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Function, then the prime factor of $n$ which is greater than $50$ is _________
Arjun
asked
in
Computer Networks
Feb 7, 2019
by
Arjun
7.5k
views
gatecse-2019
numerical-answers
computer-networks
network-security
out-of-gate-syllabus
2-marks
0
votes
1
answer
25
Ace Test Series: Computer Networks - IP Inverse
Shubhanshu
asked
in
Computer Networks
Jan 19, 2019
by
Shubhanshu
482
views
ace-test-series
computer-networks
network-security
0
votes
2
answers
26
UGC NET CSE | December 2018 | Part 2 | Question: 66
Which of the following statement/s is/are true? Firewalls can screen traffic going into or out of an organization. Virtual private networks can stimulate an old leased network to provide certain desirable properties. Choose the correct answer from the code given below: (i) only (ii) only Both (i) and (ii) Neither (i) nor (ii)
Arjun
asked
in
Computer Networks
Jan 2, 2019
by
Arjun
1.4k
views
ugcnetcse-dec2018-paper2
network-security
0
votes
2
answers
27
UGC NET CSE | December 2018 | Part 2 | Question: 90
Suppose that everyone in a group of $N$ people wants to communicate secretly with $(N-1)$ other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys ... whole to satisfy the confidentiality requirement is $N(N-1)$ $N(N-1)/2$ $2N$ $(N-1)^2$
Arjun
asked
in
Computer Networks
Jan 2, 2019
by
Arjun
722
views
ugcnetcse-dec2018-paper2
computer-networks
network-security
0
votes
0
answers
28
Security
It is impossible to produce a document that differs from the original document with single bit change and valid signature I am unable to understand, why is it impossible? bit changing is one way of intruder to steal information.right? plz give some valid reason
srestha
asked
in
Computer Networks
Dec 31, 2018
by
srestha
175
views
network-security
computer-networks
3
votes
1
answer
29
GATE Overflow | Mock GATE | Test 1 | Question: 22
Which of the following is TRUE with respect to Diffie-Hellman Key exchange algorithm? It can be used for encryption or decryption purpose It doesn't suffer from man in the middle attack It suffers from bucket brigade attack It is an example of private key cryptography algorithm
Ruturaj Mohanty
asked
in
Computer Networks
Dec 27, 2018
by
Ruturaj Mohanty
1.9k
views
go-mockgate-1
computer-networks
network-security
0
votes
0
answers
30
gfg quiz
From a large set of prime numbers Jimmy choose 23 and 17 as P and Q respectively and a random integer to be 13. Jimmy wants to sends a plain text to M = 127. What will be the value of cipher text using RSA? since i am getting ciphertext =(127^13) mod 391 now how should i calculate
vijju532
asked
in
Computer Networks
Dec 17, 2018
by
vijju532
355
views
computer-networks
network-security
rsa-security-networks
Page:
1
2
3
4
5
next »
Subscribe to GATE CSE 2024 Test Series
Subscribe to GO Classes for GATE CSE 2024
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
GO Classes NIELIT Test Series For 2023
Interview Experience : MTech Research(Machine Learning) at IIT Mandi
DRDO Scientist -B
ISRO Scientist-B 2023
BARC RECRUITMENT 2023
Subjects
All categories
General Aptitude
(2.8k)
Engineering Mathematics
(9.7k)
Digital Logic
(3.4k)
Programming and DS
(5.9k)
Algorithms
(4.6k)
Theory of Computation
(6.7k)
Compiler Design
(2.3k)
Operating System
(5.0k)
Databases
(4.6k)
CO and Architecture
(3.8k)
Computer Networks
(4.7k)
Non GATE
(1.4k)
Others
(2.4k)
Admissions
(667)
Exam Queries
(1.0k)
Tier 1 Placement Questions
(17)
Job Queries
(77)
Projects
(9)
Unknown Category
(867)
Recent questions tagged network-security
Recent Blog Comments
Left with 10days, nothing heard back from them,...
I have updated the blog. Thanks for mentioning it.
Mtech(RA) CSE IIT Bombay Project 14 ?
Thanks man @ijnuhb because of u i cleared...
Yes : 720 General