Networks, Virtualization, & Cloud Computing-Network Security [NTA-NET (Based on NTA-UGC) Computer Science (Paper-II)]: Questions 1 - 5 of 40

Access detailed explanations (illustrated with images and videos) to 2202 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Unlimited Access for Unlimited Time!

View Sample Explanation or View Features.

Rs. 550.00 or

How to register?

Question number: 1

» Networks, Virtualization, & Cloud Computing » Network Security » Cryptography-Public Key, Secret Key

Edit

Appeared in Year: 2015

MCQ▾

Question

Using p = 3, q = 13, d = 7 and e = 3 in the RSA algorithm, what is the value of ciphertext for a plain text 5? (December)

Choices

Choice (4)Response

a.

21

b.

13

c.

None of the above

d.

33

Question number: 2

» Networks, Virtualization, & Cloud Computing » Network Security » Cryptography-Public Key, Secret Key

Edit

Appeared in Year: 2016

MCQ▾

Question

An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as …………. .

Choices

Choice (4)Response

a.

Replay Attack

b.

Passive Attack

c.

Masquerade Attack

d.

Denial of Service Attack

Question number: 3

» Networks, Virtualization, & Cloud Computing » Network Security » Cryptography-Public Key, Secret Key

Edit

Appeared in Year: 2016

MCQ▾

Question

If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:

Choices

Choice (4)Response

a.

(N-1)

b.

c.

d.

Question number: 4

» Networks, Virtualization, & Cloud Computing » Network Security » Cryptography-Public Key, Secret Key

Edit

Appeared in Year: 2010

MCQ▾

Question

The basic concepts of ethics in information society is/are (December Paper II)

Choices

Choice (4)Response

a.

Liability

b.

Accountability

c.

Responsibility

d.

All a. , b. and c. are correct

Question number: 5

» Networks, Virtualization, & Cloud Computing » Network Security » Domain Name System, E-Mail and Worldwide Web

Edit

Appeared in Year: 2011

MCQ▾

Question

All of the following are examples of real security and privacy risks except (December Paper II)

Choices

Choice (4)Response

a.

Viruses

b.

Hackers

c.

Spam

d.

Identify theft

Developed by: