Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged network-security
0
votes
1
answer
61
Doubt!
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and M2?
You generate a perfectly random key K. You send two messages, M1 and M2, encrypted with K (C1 = K xor M1 and C2 = K xor M2). Does sending C2 leak information about M1 and...
vijay_jr
367
views
vijay_jr
asked
Dec 2, 2017
Computer Networks
cryptography
network-security
+
–
1
votes
0
answers
62
Virtual Gate Test Series: Computer Networks - Layers
Match the following layers with their functionality. i. Encryption a. Data-Link Layer ii. Maintaining Synchronization Points b. Network Layer iii. Feedback Messages c. Session Layer iv. Physical Addressing System d. Presentation Layer How Maintain synchronization points is ... session layer? Correct option: $(C) i - d, ii - c, iii - b, iv - a$
Match the following layers with their functionality.i. Encryptiona. Data-Link Layerii. Maintaining Synchronization Pointsb. Network Layeriii. Feedback Messagesc. Session ...
Na462
744
views
Na462
asked
Nov 11, 2017
Computer Networks
computer-networks
network-layering
network-security
virtual-gate-test-series
+
–
0
votes
0
answers
63
Cryptography
Can a single secret key can be used by the sender to sign documents for multiple receiver ? I think we can because purpose of digital signature is to make sure that on the way data is not corrupted and also it is coming from the source expected by us.
Can a single secret key can be used by the sender to sign documents for multiple receiver ?I think we can because purpose of digital signature is to make sure that on the...
akb1115
648
views
akb1115
asked
Oct 29, 2017
Computer Networks
network-security
computer-networks
+
–
0
votes
0
answers
64
REGARDING CRYPTOGRAPHY
WHAT ALL TOPICS SHOULD BE COVERED IN CRYPTOGRAPHY IN NETWORKS.?
WHAT ALL TOPICS SHOULD BE COVERED IN CRYPTOGRAPHY IN NETWORKS.?
ESHA_SHARMA
411
views
ESHA_SHARMA
asked
Oct 24, 2017
Computer Networks
network-security
+
–
3
votes
3
answers
65
In a public key, private key cryptography, scheme given below, identify ‘A’ and ‘B’.
In a public key, private key cryptography, scheme given below, identify A' and B'. (a) A= Pu y , B= Pr x (c) A= Pr y , B= Pu x (b) A= Pr x , B= Pu y (d) A= Pu x , B= Pr y ... message to B, it will use B's public key and B will use its private key to decrypt the message. so how answer is option d?
In a public key, private key cryptography, scheme given below, identify ‘A’ and ‘B’.(a) A= Pu y , B= Pr x(c) A= Pr y , B= Pu x(b) A= Pr x , B= Pu y(d) A= Pu x , B...
sunil sarode
979
views
sunil sarode
asked
Oct 5, 2017
Computer Networks
computer-networks
network-security
+
–
1
votes
1
answer
66
UGC NET CSE | June 2009 | Part 2 | Question: 48
After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as : Authenticity Non-Repudiability Auditability Repudiability
After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as :Authenticity Non-Repu...
rishu_darkshadow
922
views
rishu_darkshadow
asked
Sep 24, 2017
Computer Networks
ugcnetcse-june2009-paper2
network-security
+
–
1
votes
1
answer
67
Understanding Confusion and Diffusion - Network Security
Explain Confusion and Diffusion How it is implemented in DES AES
Explain Confusion and DiffusionHow it is implemented in DESAES
pC
1.5k
views
pC
asked
Sep 19, 2017
Interview Questions
computer-networks
network-security
conceptual-questions
+
–
4
votes
3
answers
68
ISRO2017-37
Pretty Good Privacy (PGP) is used in: Browser security FTP security Email security None of the above
Pretty Good Privacy (PGP) is used in:Browser securityFTP securityEmail securityNone of the above
sh!va
8.5k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
+
–
5
votes
1
answer
69
ISRO2017-36
Which protocol suite designed by IETF to provide security for a packet at the Internet layer? IPSec NetSec PacketSec SSL
Which protocol suite designed by IETF to provide security for a packet at the Internet layer?IPSecNetSecPacketSecSSL
sh!va
4.9k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
+
–
6
votes
3
answers
70
ISRO2017-35
$\text{MD5}$ is a widely used hash function for producing hash value of $64$ bits $128$ bits $512$ bits $1024$ bits
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
sh!va
4.4k
views
sh!va
asked
May 7, 2017
Computer Networks
isro2017
computer-networks
network-security
cryptography
+
–
0
votes
0
answers
71
Self doubt(Computer network security)
gabbar
433
views
gabbar
asked
Apr 2, 2017
Computer Networks
cns
network-security
+
–
39
votes
12
answers
72
GATE CSE 2017 Set 1 | Question: 44
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the private key of $A$ is __________ .
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the ...
Arjun
23.9k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
network-security
computer-networks
rsa-security-networks
out-of-gate-syllabus
numerical-answers
normal
+
–
39
votes
3
answers
73
GATE CSE 2017 Set 1 | Question: 15
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violations can take place. $S$ ... with a fraudulent message Which of the following are possible security violations? I and II only I only II only II and III only
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violation...
Arjun
12.6k
views
Arjun
asked
Feb 14, 2017
Computer Networks
gatecse-2017-set1
computer-networks
cryptography
normal
network-security
out-of-gate-syllabus
+
–
0
votes
1
answer
74
NPTEL-Internetwork Security-Week2-Quiz-2-Q6
Q6. ___________Data Encryption Standard (DES) was designed to increase the size of the Data Encryption Standard (DES) key. (A) Double (B) Triple (C) Quadruple (D) none of these
Q6. ___________Data Encryption Standard (DES) was designed to increase the size of the Data Encryption Standard (DES) key.(A) Double(B) Triple(C) Quadruple(D) none of the...
Dulqar
5.8k
views
Dulqar
asked
Feb 3, 2017
Computer Networks
computer-networks
network-security
nptel-quiz
+
–
0
votes
2
answers
75
NPTEL-Internetwork Security-Week2-Quiz-2-Q3
Q3: What kind of ciphers Electronic Codebook (ECB) mode and Cipher Block Chaining (CBC) mode are (A) Block cipher (B) Stream cipher (C) Field cipher (D) both (A) and (B)
Q3: What kind of ciphers Electronic Codebook (ECB) mode and Cipher Block Chaining (CBC) mode are(A) Block cipher(B) Stream cipher(C) Field cipher(D) both (A) and (B)
Dulqar
758
views
Dulqar
asked
Feb 3, 2017
Computer Networks
nptel-quiz
network-security
+
–
0
votes
0
answers
76
testbook
harshit agarwal
312
views
harshit agarwal
asked
Jan 2, 2017
Computer Networks
computer-networks
network-security
+
–
2
votes
2
answers
77
gatebook
Suppose that in RSA encryption, the public encryption key is the pair (e n)= (3, 55) and the private decryption key is the pair (d,n)=55, where d (A) 13 (B) 27 (C) 37 (D) 39
Suppose that in RSA encryption, the public encryption key is the pair (e n)= (3, 55) and the private decryption key is the pair (d,n)=55, where d(A) 13(B) 27(C) 37(D) 39
Shubham Pandey 2
969
views
Shubham Pandey 2
asked
Nov 5, 2016
Computer Networks
network-security
+
–
0
votes
2
answers
78
MadeEasy Test Series: Computer Networks - Network Security
KISHALAY DAS
964
views
KISHALAY DAS
asked
Oct 18, 2016
Computer Networks
made-easy-test-series
computer-networks
network-security
+
–
0
votes
1
answer
79
UGC NET CSE | August 2016 | Part 2 | Question: 46
An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as _____. Denial of service attack Masquarade attack Simple attack Complex attack
An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attac...
makhdoom ghaya
2.0k
views
makhdoom ghaya
asked
Sep 28, 2016
Computer Networks
ugcnetcse-aug2016-paper2
computer-networks
network-security
+
–
1
votes
1
answer
80
UGC NET CSE | June 2010 | Part 2 | Question: 5
For your ATM debit card, you have a $4$-decimal-digit personal secret code. In the absence of any clue, a brute-force attack takes time-$'t'$ to crack the code on an ATM terminal. Therefore $'t'$ is ... Reduce the processing speed of the ATM terminals to the half of their current speed. None of the above provides any improvement.
For your ATM debit card, you have a $4$-decimal-digit personal secret code. In the absence of any clue, a brute-force attack takes time-$'t'$ to crack the code on an ATM ...
makhdoom ghaya
1.1k
views
makhdoom ghaya
asked
Sep 14, 2016
Computer Networks
ugcnetcse-june2010-paper2
computer-networks
network-security
+
–
0
votes
1
answer
81
UGC NET CSE | December 2010 | Part 2 | Question: 20
Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges? Authorization Authentication Access Control All of these
Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges?AuthorizationAuthenticationAccess...
makhdoom ghaya
692
views
makhdoom ghaya
asked
Sep 7, 2016
Computer Networks
ugcnetcse-dec2010-paper2
computer-networks
network-security
+
–
0
votes
1
answer
82
Network Security
Consider the scenarios. 1. A wifi connection without encryption. 2. Presence of malicious virus 3. Authentication with weak password. In network security paradigm given scenarios can be classified as: (A). 1. Threat 2. Threat 3. Vulnearability (B). 1. ... Threat 3. Threat (C). 1. Threat 2. Vulnearability 3. Vulnearability (D). 1. Vulnearability 2. Threat 3. Vulnearability
Consider the scenarios.1. A wifi connection without encryption.2. Presence of malicious virus3. Authentication with weak password.In network security paradigm given scen...
sh!va
1.5k
views
sh!va
asked
Sep 7, 2016
Computer Networks
computer-networks
network-security
+
–
1
votes
0
answers
83
Crytography
From where shall I study cryptography and network security for GATE?
From where shall I study cryptography and network security for GATE?
chaser
219
views
chaser
asked
Aug 28, 2016
Unknown Category
computer-networks
network-security
+
–
2
votes
1
answer
84
UGC NET CSE | June 2016 | Part 3 | Question: 30
Encrypt the plain text message $``\text{EXTRANET}"$ ... Using $`\text{Z'}$ as bogus character. $\text{TAXERTZENZ}$ $\text{EXTRANETZZ}$ $\text{EZXZTRZANZET}$ $\text{EXTZRANZETZ}$
Encrypt the plain text message $ \text{EXTRANET}"$ using Transposition cipher technique with the following key : $\begin{array} {|l|l|l|l|l|} \hline \text{3} & \text{5} ...
go_editor
5.3k
views
go_editor
asked
Aug 20, 2016
Computer Networks
ugcnetcse-june2016-paper3
computer-networks
network-security
+
–
3
votes
2
answers
85
UGC NET CSE | June 2016 | Part 2 | Question: 29
If there are $N$ people in the world and are using secret key encryption and decryption for privacy purpose, then the number of secret keys required will be $N$ $(N-1)$ $\frac{N(N-1)}{2}$ $\frac{N(N+1)}{2}$
If there are $N$ people in the world and are using secret key encryption and decryption for privacy purpose, then the number of secret keys required will be$N$$(N-1)$$\fr...
go_editor
4.0k
views
go_editor
asked
Aug 16, 2016
Computer Networks
ugcnetcse-june2016-paper2
computer-networks
network-security
+
–
2
votes
2
answers
86
UGC NET CSE | December 2015 | Part 2 | Question: 25
Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5? 13 21 26 33
Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5?13212633
go_editor
2.8k
views
go_editor
asked
Aug 8, 2016
Computer Networks
ugcnetcse-dec2015-paper2
computer-networks
network-security
+
–
3
votes
1
answer
87
UGC NET CSE | Junet 2015 | Part 3 | Question: 28
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is CTTOEWMROPNRUEK MROUEKCTTPNROEW OEWPNRCTTUEKMRO UEKPNRMROOEQCTT
A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message isCTTOEWMROPNRUEKMROUEKCTTPNROEWOEWPNR...
go_editor
5.4k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
network-security
+
–
2
votes
2
answers
88
UGC NET CSE | Junet 2015 | Part 3 | Question: 27
Which are two modes of IP security? Transport and certificate Transport and tunnel Certificate and tunnel Preshared and transport
Which are two modes of IP security?Transport and certificateTransport and tunnelCertificate and tunnelPreshared and transport
go_editor
2.4k
views
go_editor
asked
Jul 31, 2016
Computer Networks
ugcnetcse-june2015-paper3
computer-networks
network-security
+
–
2
votes
1
answer
89
UGC NET CSE | December 2013 | Part 2 | Question: 5
Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is 101 103 105 107
Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is101103105107
go_editor
6.9k
views
go_editor
asked
Jul 24, 2016
Computer Networks
ugcnetcse-dec2013-paper2
computer-networks
network-security
rsa-public-key
+
–
2
votes
0
answers
90
Compare the performance of various cryptographic algorithms
Compare the performance of various cryptographic algorithms A) p- AES q-3 DES r- DES s- RSA x-S box y- P box B) p- AES q-3 DES r- DES s- RSA x-P box y- S box C) p- RSA q-AES r-3 DES s- DES x-S box y- P box D) p- RSA q-AES r-3 DES s- DES x-P box y- S box
Compare the performance of various cryptographic algorithmsA) p- AES q-3 DES r- DES s- RSA x-S box y- P boxB) p- AES q-3 DES r- DES s- RSA x-P box y- S boxC) p- RSA q-AES...
sh!va
532
views
sh!va
asked
Jul 22, 2016
Computer Networks
computer-networks
network-security
+
–
Page:
« prev
1
2
3
4
5
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register