IKE creates SAs for _____.
1. ssl
2.pgp
3.ipsec
4.vp
1. VPN is abbreviated as __________
1.visual private network
2.virtual protocol network
3. virtual private network
4.virtual protocol networking
AES stands for?
1.authorized encryption standard
2.advance encryption standard
3.advance encryption strategy
4.none of these
An asymmetric-key (or public-key) cipher uses
1. 1 key
2.2 key
3.3 key
4.4 key
In DES step both LPT and RPT undergoes in how much key Rounds?
1.8
2.16
3.32
4.64
In Symmetric schemes requires both parties to share how many secret key?
1.one
2.two
3.three
4.four
In the handshake protocol which is the message type first sent between client and server ?
1.server_hello
2.client_hello
3.hello_request
4.certificate_request
In _____, there can be multiple paths from fully or partially trusted authorities.
1.x509 .
2.pgp
3.kdc
4.none of the above
In ______, there is a single path from the fully trusted authority to any certificate.
1. x509
2.pgp
3.kdc
4.None of the above
The full form of OSI is OSI model__.
1.open systems interconnection
2.open software interconnection
3.open connection
4.open system internet
What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
1.42 bytes
2.32 bytes
3.36 bytes
4.48 bytes
Which One of them is Passive attack?
1.denial of service
2.replay previous message
3.modify message in transit
4.obtain message contain
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
1.remote access vpns
2. site-to-site vpns
3.peer-to-peer vpns
4.country-to-country vpns
A hacker guessing suggested password to a program is call as?
1. password guessing
2.dictionary attack
3.default password attack
4.none of these
A way to ensure that the entity is indeed what it claims to be.-
1.authentication
2.accountability
3.identification
4.security
Blum Blum Shub Generator is based on which Algorithm?
1. private key
2.public key
3.both a & b
4.none of these
Conversion of Cypher text to plain text?
1.encryption
2.decryption
3.simple text
4. none of these
Conversion of plain text into Cipher text is called as________.
1.encryption
2.decryption
3.hidden text
4.none of above
Conversion of plain text into Cipher text is called as________.
1.encryption
2.decryption
3.hidden text
4.none of above
For RSA to work, the value of P must be less than the value of
1.p
2.q
3.n
4.r
he ________ method provides a one-time session key for two parties.
1. diffie-hellman
2.rsa
3.des
4.aes
IKE uses _______
1.oakley
2.skeme
3.isakmp
4.All of the above
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
1.short
2.flat
3.long
4.thin
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
1.other
2.data
3.keys
4. each other
In SSL, what is used for authenticating a message?
1.mac (message access code)
2.mac (message authentication code)
3.mac (machine authentication code)
4.mac (machine access code)
In tunnel mode, IPSec protects the ______
1.entire ip packet
2. ip header
3. ip payload
4. ip trailer
In _______, the cryptographic algorithms and secrets are sent with the message.
1. ipsec
2.ssl
3.tls
4.pgp
ISAKMP stands for ______
1.internet system association and key management packet
2.internet security association and key management protocol
3. interchange system and key modeling protocol
4. internet security association and key modeling protocol
Message authentication code is also known as
1.key code
2.hash code
3.keyed hash function
4.message key hash function
One commonly used public-key cryptography method is the ______ algorithm.
1. rss
2.ras
3.rsa
4.raa
PGP makes use of which cryptographic algorithm?
1.des
2.aes
3.rsa
4.rabin
PGP makes use of which cryptographic algorithm?
1. rsa
2.aes
3.des
4.robin
Protection against Denial by one of these parties in a communication refers to?
1.non-repudiation
2.data integrity
3.authentication
4.none of these
Public key cryptography also called as________
1.asymmetric key cryptography
2.symmetric key cryptography
3.both a and b
4.none of the above
S/MIME is abbreviated as __________________
1.secure/multimedia internet mailing extensions
2.secure/multipurpose internet mailing extensions
3.secure/multimedia internet mail extensions
4.secure/multipurpose internet mail extensions
Security Measures Needed to protect ________ during their transmission
1.file
2.data
3.packet
4. all of above
Site-to-Site VPN architecture is also known as _________
1.remote connection based vpns
2.peer-to-peer vpns
3. extranet based vpn
4. country-to-country vpns
SSL provides _________.
1.message integrity
2.confidentiality
3.compression
4.all of the above
The DSS signature uses which hash algorithm?
1.md5
2.sha-2
3.sha-1
4.does not use hash algorithm
The message which is not understandable is called as?
1.cipher text
2.plain text
3.hidden text
4.both a & c
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
1.man-in-the-middle
2.ciphertext attack
3.plaintext attack
4.none of the above
There are ________ types of VPN protocols.
1.3
2.4
3.5
4.6
There are _________ types of VPNs.
1.3
2.4
3.5
4.4
The__is a polygraphic substitution cipher based on linear algebra.
1.hill cipher
2.playfair cipher
3.affine cipher
4.none of these
USENET falls under which category of public key sharing?
1.public announcement
2.publicly available directory
3.public key authority
4. public key certificate
What is full form of DDoS?
1.derived denial of service
2.distributed denial of service
3.denial of service
4.none of these
What is the 4th step in DES Algorithm?
1.key transformation
2.s-box substitution
3.p-box permutation
4.expansion permutation
What is the key size allowed in PGP?
1.1024-1056
2.1024-4056
3.1024-4096
4.1024-2048
What types of protocols are used in VPNs? A. application level protocols B. tunnelling protocols C. network protocols D.
1. application level protocols
2.tunnelling protocols
3.network protocols
4.mailing protocols
Which of the statements are not true to classify VPN systems?
1.protocols used for tunnelling the traffic
2.whether vpns are providing site-to-site or remote access connection C.
3.securing the network from bots and malwares D
4.levels of security provided for sending and receiving data privately
Which of the statements are not true to classify VPN systems?
1.protocols used for tunnelling the traffic
2.whether vpns are providing site-to-site or remote access connection
3.securing the network from bots and malwares
4.levels of security provided for sending and receiving data privately
__is the practice of concealing a message within another message,image or file.
1. steganography
2.cryptography
3.cipher
4.receiver
__is used to create the organisation's overall security program.
1.program policy
2.purpose
3.security
4.none of these
___ provides privacy, integrity, and authentication in e-mail.
1.ipsec
2.ssl
3.pgp
4. none of the above
____ provides authentication at the IP level.
1. ah
2.esp
3.pgp
4.ssl
____ was invented by Phil Zimmerman.
1.ipsec
2.ssl
3.pgp
4.none of the above
_____ type of VPNs are used for home private and secure connectivity.
1.remote access vpns
2. site-to-site vpns
3. peer-to-peer vpns
4.router-to-router vpns
_____ uses the idea of certificate trust levels.
1.x509
2.pgp
3.kdc
4.None of the above
______ means knowledge obtained from investigation, study , intelligence new ,facts .
1.security
2.data
3.information
4.none of these
_________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.
1. visual private network
2.virtual protocol network
3.virtual protocol networking
4.virtual private network