Recent questions tagged network-security

1 votes
1 answer
93
A cryptarithmetic problem of the typeCan be solved efficiently usingdepth first techniquebreadth first techniqueconstraint satisfaction techniquebidirectional technique
1 votes
2 answers
94
1 votes
1 answer
95
Match the following cryptographic algorithms with their design issues : $ \begin{array} {cIcI} & \textbf{List-I} & & \textbf{List-II} \\ \text{a.} & \text{DES} & \te...
1 votes
2 answers
97
why hash function is used in digital signature and why it is many - to - one??please explain.
5 votes
4 answers
99
An example of poly-alphabetic substitution isP-boxS-boxCaesar cipherVigenere cipher
3 votes
3 answers
100
A public key encryption systemallows anyone to decode the transmissionsallows only the correct sender to decode the dataallows only the correct receiver to decode the dat...
8 votes
2 answers
101
Hashed message is signed by a sender usinghis public keyhis private keyreceiver’s public keyreceiver’s private key
5 votes
1 answer
102
The standard for certificates used on internet is$\textsf{X.25}$$\textsf{X.301}$$\textsf{X.409}$$\textsf{X.509}$
5 votes
2 answers
103
SSL is not responsible forMutual authentication of client & serverSecret communicationData Integrity protectionError detection and correction
5 votes
2 answers
104
Advanced Encryption Standard (AES) is based onAsymmetric key algorithmSymmetric key algorithmPublic key algorithmKey exchange
7 votes
2 answers
105
$\textsf{SHA-1}$ is aencryption algorithmdecryption algorithmkey exchange algorithmmessage digest function
2 votes
2 answers
107
A packet filtering firewall canDeny certain users from accessing a serviceBlock worms and viruses from entering the networkDisallow some files from being accessed through...
27 votes
5 answers
110
0 votes
1 answer
111
R32. Why must an application gateway work in conjunction with a router filter to be effective?
2 votes
2 answers
113
Modular Arithmatic - Network Security chapterRevise Question 7 Suppose n = 10,000, a = 10,023, and b = 10,004. Use an identity of modulararithmetic to calculate in your h...
2 votes
0 answers
114
SHA 1 hash algo. create N-bit message digest out of a message of 512bit blocks. So is has a message digest of_?A.4 words of 32bitsB.5 words of 32bitsC.16 words of 32bitsD...
9 votes
6 answers
117
In which layer of network architecture, the secured socket layer (SSL) is used?physical layersession layerapplication layerpresentation layer
3 votes
3 answers
118
In a system an RSA algorithm with $p=5$ and $q=11$, is implemented for data security. What is the value of the decryption key if the value of the encryption key is $27?$$...
3 votes
1 answer
119
1 votes
1 answer
120
Q- what will the cipher text produced by the following cipher function for the plain test ISRO with key =7.[consider 'A'=0,'B'=1...'Z'=25]CK(M)=(kM+13)mod26a)RJCHb)QIBGc)...