ISS Statistics Paper I (New 2016 MCQ Pattern): Questions 83 - 88 of 404

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 404 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 300.00 or

Question number: 83

» Computer Application and Data Processing » Network » Firewall

MCQ▾

Question

In Packet filtering, filtering rules is/are based on:

Choices

Choice (4) Response

a.

Source and destination transport-level address.

b.

Source and destination IP address.

c.

IP protocol field

d.

All a. , b. and c. are correct

Question number: 84

» Computer Application and Data Processing » Basics of Computer » Operating Systems

MCQ▾

Question

Windows applications can be used on Linux

Choices

Choice (4) Response

a.

By trying CrossOver

b.

By using Wine

c.

Not possible to implement windows application on Linux

d.

Both a. and b. are correct

Question number: 85

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

In a payment gateway system, when a customer receive a payment message what happen next?

Choices

Choice (4) Response

a.

An encrypted message is send to merchant bank.

b.

An encrypted message is send to Client bank.

c.

A decrypted message got split and added to database.

d.

All of the above

Question number: 86

» Computer Application and Data Processing » Network » Spyware & Malware

MCQ▾

Question

Software that covertly gathers user information without the user’s knowledge are called?

Choices

Choice (4) Response

a.

Trojan horse

b.

Spyware

c.

Adware

d.

Browser hijackers

Question number: 87

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Which of the following statement is/are correct regarding Message Digest?

Choices

Choice (4) Response

a.

A hash value is calculated by other end user.

b.

Actual data is sent in encrypted form.

c.

The encrypted data packets can easily be decrypted.

d.

All of the above

Question number: 88

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Which of the following statement is/are correct regarding Public Key Encryption?

Choices

Choice (4) Response

a.

Public key is used by receiver to encrypt the data.

b.

The secret key can be found on public domain.

c.

Every user has a Secret Key.

d.

None of the above

Sign In