Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged network-security
1
votes
2
answers
91
UGC NET CSE | September 2013 | Part 2 | Question: 42
A method to provide secure transmission of email is called TLS SA IPSec PGP
A method to provide secure transmission of email is calledTLSSAIPSecPGP
go_editor
2.8k
views
go_editor
asked
Jul 21, 2016
Computer Networks
ugcnetsep2013ii
computer-networks
network-security
network-protocols
+
–
7
votes
2
answers
92
UGC NET CSE | June 2016 | Part 2 | Question: 46
An attacker sits between customer and banker and captures the information from the customer and retransmits to the banker by altering the information . This attack is called as Masquerade attack Replay attack Passive attack Denial of service attack
An attacker sits between customer and banker and captures the information from the customer and retransmits to the banker by altering the information . This attack is c...
Sanjay Sharma
3.6k
views
Sanjay Sharma
asked
Jul 15, 2016
Computer Networks
ugcnetcse-june2016-paper2
computer-networks
network-security
+
–
1
votes
1
answer
93
UGC NET CSE | December 2012 | Part 3 | Question: 72
A cryptarithmetic problem of the type Can be solved efficiently using depth first technique breadth first technique constraint satisfaction technique bidirectional technique
A cryptarithmetic problem of the typeCan be solved efficiently usingdepth first techniquebreadth first techniqueconstraint satisfaction techniquebidirectional technique
go_editor
2.6k
views
go_editor
asked
Jul 13, 2016
Computer Networks
ugcnetcse-dec2012-paper3
computer-networks
network-security
+
–
1
votes
2
answers
94
UGC NET CSE | December 2012 | Part 3 | Question: 8
Using RSA algorithm, what is the value of cipher text C, if the plain text M=5 and p=3, q=11 and d=7? 33 5 25 26
Using RSA algorithm, what is the value of cipher text C, if the plain text M=5 and p=3, q=11 and d=7?3352526
go_editor
11.9k
views
go_editor
asked
Jul 12, 2016
Computer Networks
ugcnetcse-dec2012-paper3
computer-networks
network-security
+
–
1
votes
1
answer
95
UGC NET CSE | June 2014 | Part 3 | Question: 56
Match the following cryptographic algorithms with their design issues : ... $\text{a-iii, b-iv, c-ii, d-i}$ $\text{a-iv, b-i, c-ii, d-iii}$
Match the following cryptographic algorithms with their design issues : $ \begin{array} {cIcI} & \textbf{List-I} & & \textbf{List-II} \\ \text{a.} & \text{DES} & \te...
makhdoom ghaya
2.3k
views
makhdoom ghaya
asked
Jul 11, 2016
Computer Networks
ugcnetjune2014iii
computer-networks
network-security
cryptography
+
–
0
votes
2
answers
96
UGC NET CSE | June 2014 | Part 2 | Question: 30
SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for Secure Electronic Transaction Secular Enterprise for Transaction Security Electronic Transmission Secured Electronic Termination
SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands forSecure Electronic Transaction...
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Jun 27, 2016
Computer Networks
ugcnetcse-june2014-paper2
computer-networks
network-security
+
–
1
votes
2
answers
97
digital signature
why hash function is used in digital signature and why it is many - to - one?? please explain.
why hash function is used in digital signature and why it is many - to - one??please explain.
indrajeet
1.5k
views
indrajeet
asked
Jun 24, 2016
Computer Networks
computer-networks
network-security
digital-signature
+
–
0
votes
0
answers
98
crypotography
Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications required to compute b^n mod m,0<=b,n<=m? a)O(log n) b)O(sqrt(n)) c)O(n/log n) d)O(n) please explain.. bnmodm,0≤b,n≤mbnmodm,0≤b,n≤m ?
Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications require...
indrajeet
692
views
indrajeet
asked
Jun 24, 2016
Computer Networks
computer-networks
network-security
cryptography
+
–
5
votes
4
answers
99
ISRO2011-18
An example of poly-alphabetic substitution is P-box S-box Caesar cipher Vigenere cipher
An example of poly-alphabetic substitution isP-boxS-boxCaesar cipherVigenere cipher
go_editor
3.6k
views
go_editor
asked
Jun 22, 2016
Computer Networks
isro2011
computer-networks
network-security
+
–
3
votes
3
answers
100
ISRO2008-59
A public key encryption system allows anyone to decode the transmissions allows only the correct sender to decode the data allows only the correct receiver to decode the data does not encode the data before transmitting it
A public key encryption systemallows anyone to decode the transmissionsallows only the correct sender to decode the dataallows only the correct receiver to decode the dat...
go_editor
3.0k
views
go_editor
asked
Jun 12, 2016
Computer Networks
isro2008
computer-networks
network-security
+
–
8
votes
2
answers
101
ISRO2007-71
Hashed message is signed by a sender using his public key his private key receiver’s public key receiver’s private key
Hashed message is signed by a sender usinghis public keyhis private keyreceiver’s public keyreceiver’s private key
go_editor
5.4k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
network-security
+
–
5
votes
1
answer
102
ISRO2007-70
The standard for certificates used on internet is $\textsf{X.25}$ $\textsf{X.301}$ $\textsf{X.409}$ $\textsf{X.509}$
The standard for certificates used on internet is$\textsf{X.25}$$\textsf{X.301}$$\textsf{X.409}$$\textsf{X.509}$
go_editor
3.4k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
network-security
+
–
5
votes
2
answers
103
ISRO2007-68
SSL is not responsible for Mutual authentication of client & server Secret communication Data Integrity protection Error detection and correction
SSL is not responsible forMutual authentication of client & serverSecret communicationData Integrity protectionError detection and correction
go_editor
4.3k
views
go_editor
asked
Jun 10, 2016
Computer Networks
isro2007
computer-networks
network-security
+
–
5
votes
2
answers
104
ISRO2009-7
Advanced Encryption Standard (AES) is based on Asymmetric key algorithm Symmetric key algorithm Public key algorithm Key exchange
Advanced Encryption Standard (AES) is based onAsymmetric key algorithmSymmetric key algorithmPublic key algorithmKey exchange
jaiganeshcse94
3.8k
views
jaiganeshcse94
asked
Jun 2, 2016
Computer Networks
isro2009
computer-networks
cryptography
network-security
+
–
7
votes
2
answers
105
ISRO2009-6
$\textsf{SHA-1}$ is a encryption algorithm decryption algorithm key exchange algorithm message digest function
$\textsf{SHA-1}$ is aencryption algorithmdecryption algorithmkey exchange algorithmmessage digest function
suryaji
2.3k
views
suryaji
asked
May 13, 2016
Computer Networks
isro2009
computer-networks
network-security
+
–
1
votes
1
answer
106
UGC NET CSE | December 2012 | Part 2 | Question: 37
AES is a round cipher based on the Rijndal Algorithm that uses a 128 – bit block of data. AES has three different configurations. ______ rounds with a key size of 128-bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 –bits 5, 7, 15 10, 12, 14 5, 6, 7 20, 12, 14
AES is a round cipher based on the Rijndal Algorithm that uses a 128 – bit block of data. AES has three different configurations. ______ rounds with a key size of 128-b...
Sanjay Sharma
2.6k
views
Sanjay Sharma
asked
May 9, 2016
Computer Networks
ugcnetcse-dec2012-paper2
computer-networks
network-security
+
–
2
votes
2
answers
107
ISRO-2013-45
A packet filtering firewall can Deny certain users from accessing a service Block worms and viruses from entering the network Disallow some files from being accessed through FTP Block some hosts from accessing the network
A packet filtering firewall canDeny certain users from accessing a serviceBlock worms and viruses from entering the networkDisallow some files from being accessed through...
makhdoom ghaya
8.4k
views
makhdoom ghaya
asked
Apr 27, 2016
Computer Networks
isro2013
computer-networks
network-security
+
–
0
votes
1
answer
108
UGC NET CSE | December 2012 | Part 3 | Question: 68
An example of a dictionary-based coding technique is Run-length coding Huffman coding Predictive coding LZW coding
An example of a dictionary-based coding technique isRun-length codingHuffman codingPredictive codingLZW coding
Sanjay Sharma
3.1k
views
Sanjay Sharma
asked
Apr 13, 2016
Computer Networks
ugcnetcse-dec2012-paper3
computer-networks
network-security
encoding
+
–
27
votes
4
answers
109
GATE CSE 2016 Set 1 | Question: 52
Consider that $B$ wants to send a message $m$ that is digitally signed to $A$. Let the pair of private and public keys for $A$ and $B$ be denoted by ${K_{x}}^-$ and ${K_{x}}^+$ for $x=A, B$, respectively. Let $K_{x}(m)$ represent the operation of encrypting $m$ with a ... $\left\{m, {K_{A}}^-(H(m))\right\}$ $\left\{m, {K_{A}}^+(m)\right\}$
Consider that $B$ wants to send a message $m$ that is digitally signed to $A$. Let the pair of private and public keys for $A$ and $B$ be denoted by ${K_{x}}^-$ and ${K_{...
Sandeep Singh
8.6k
views
Sandeep Singh
asked
Feb 12, 2016
Computer Networks
gatecse-2016-set1
computer-networks
network-security
easy
out-of-gate-syllabus
+
–
27
votes
5
answers
110
GATE CSE 2016 Set 2 | Question: 23
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires. Anarkali's public key. Salim's public key. Salim's private key. Anarkali's private key.
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires.Anarkali's public key.Salim's public key.Salim's private key.Ana...
Akash Kanase
9.5k
views
Akash Kanase
asked
Feb 12, 2016
Computer Networks
gatecse-2016-set2
computer-networks
network-security
cryptography
easy
out-of-gate-syllabus
+
–
0
votes
1
answer
111
Kurose Ross 6th Edition PN 746 R32
R32. Why must an application gateway work in conjunction with a router filter to be effective?
R32. Why must an application gateway work in conjunction with a router filter to be effective?
Akash Kanase
544
views
Akash Kanase
asked
Dec 12, 2015
Computer Networks
network-security
computer-networks
+
–
0
votes
0
answers
112
Kurose Ross 6th Edition PN 745 R17
Please explain answer of following question. R17. What does it mean to say that a nonce is a once-in-a-lifetime value? In whose lifetime? Ans given -> Once in a lifetimes means that the entity sending the nonce will never again use that value to check whether another entity is “live”. Please explain the answer.
Please explain answer of following question.R17. What does it mean to say that a nonce is a once-in-a-lifetime value? In whoselifetime?Ans given - Once in a lifetimes me...
Akash Kanase
412
views
Akash Kanase
asked
Dec 12, 2015
Computer Networks
network-security
computer-networks
+
–
2
votes
2
answers
113
Kurose Ross, 6th Edition PN0 744
Modular Arithmatic - Network Security chapter Revise Question 7 Suppose n = 10,000, a = 10,023, and b = 10,004. Use an identity of modular arithmetic to calculate in your head (a • b) mod n
Modular Arithmatic - Network Security chapterRevise Question 7 Suppose n = 10,000, a = 10,023, and b = 10,004. Use an identity of modulararithmetic to calculate in your h...
Akash Kanase
710
views
Akash Kanase
asked
Dec 12, 2015
Computer Networks
network-security
+
–
2
votes
0
answers
114
SHA 1 hash algo. create N-bit message digest out of a message of 512bit blocks. So is has a message digest of_?
SHA 1 hash algo. create N-bit message digest out of a message of 512bit blocks. So is has a message digest of_?A.4 words of 32bitsB.5 words of 32bitsC.16 words of 32bitsD...
Shashank Chavan
1.1k
views
Shashank Chavan
asked
Nov 30, 2015
Computer Networks
network-security
computer-networks
+
–
2
votes
1
answer
115
How to calculate "value" in GCD(value,constant value) = 1 in RSA?
How to calculate resulting values of "someValues" in GCD(someValues,60)=1 in RSA ?
How to calculate resulting values of "someValues" in GCD(someValues,60)=1 in RSA ?
Shashank Chavan
539
views
Shashank Chavan
asked
Nov 29, 2015
Computer Networks
network-security
computer-networks
+
–
13
votes
2
answers
116
TIFR CSE 2011 | Part B | Question: 36
Consider malware programs. Which of the following is true? A worm is a parasite. A virus cannot affect a linux operating system. A trojan can be in the payload of only a worm. A worm and virus are self replicating programs. There is no difference between a virus and a worm.
Consider malware programs. Which of the following is true?A worm is a parasite.A virus cannot affect a linux operating system.A trojan can be in the payload of only a wor...
makhdoom ghaya
1.9k
views
makhdoom ghaya
asked
Oct 25, 2015
Computer Networks
tifr2011
computer-networks
network-security
+
–
9
votes
6
answers
117
ISRO2011-32
In which layer of network architecture, the secured socket layer (SSL) is used? physical layer session layer application layer presentation layer
In which layer of network architecture, the secured socket layer (SSL) is used?physical layersession layerapplication layerpresentation layer
ajit
6.5k
views
ajit
asked
Oct 1, 2015
Computer Networks
isro2011
computer-networks
network-security
network-layering
+
–
3
votes
3
answers
118
ISRO2014-24
In a system an RSA algorithm with $p=5$ and $q=11$, is implemented for data security. What is the value of the decryption key if the value of the encryption key is $27?$ $3$ $7$ $27$ $40$
In a system an RSA algorithm with $p=5$ and $q=11$, is implemented for data security. What is the value of the decryption key if the value of the encryption key is $27?$$...
ajit
6.2k
views
ajit
asked
Sep 23, 2015
Computer Networks
isro2014
computer-networks
network-security
+
–
3
votes
1
answer
119
UGC NET CSE | June 2013 | Part 2 | Question: 33
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE BUTAEEZ SUZANNE XYZABCD ABCDXYZ
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNEBUTAEEZSUZANNEXYZABCDABCDXYZ
Shimpy Goyal
11.0k
views
Shimpy Goyal
asked
Jun 25, 2015
Computer Networks
computer-networks
network-security
rsa
ugcnetcse-june2013-paper2
+
–
1
votes
1
answer
120
kindly reply soon
Q-> what will the cipher text produced by the following cipher function for the plain test ISRO with key =7.[consider 'A'=0,'B'=1...'Z'=25] CK(M)=(kM+13)mod26 a)RJCH b)QIBG c)GQPM d) XPIN
Q- what will the cipher text produced by the following cipher function for the plain test ISRO with key =7.[consider 'A'=0,'B'=1...'Z'=25]CK(M)=(kM+13)mod26a)RJCHb)QIBGc)...
Shimpy Goyal
764
views
Shimpy Goyal
asked
Jun 24, 2015
Computer Networks
network-security
+
–
Page:
« prev
1
2
3
4
5
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register