R Rakesh Kumar π Hard Worker β 28.44K Points π Information Cyber Security Q. In asymmetric key cryptography, the private key is kept by (A) sender (B) receiver (C) sender and receiver (D) all the connected devices to the network ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) receiver
P Priyanka Tomar π Tutor III β 35.28K Points π Information Cyber Security Q. ATM pin while withdrawing money is an example of using: (A) authentication (B) authorization (C) access control (D) auditing ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) authentication
G Gopal Sharma π Tutor III β 38.32K Points π Information Cyber Security Q. Assurance that authentic user is taking part in communication is: (A) authentication (B) authorization (C) access control (D) auditing ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) authentication
R Ram Sharma π Coach β 193.88K Points π Information Cyber Security Q. A process of making the encrypted text readable again. (A) decryption (B) encryption (C) network security (D) information hiding ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) decryption
V Vikash Gupta π Tutor III β 33.56K Points π Information Cyber Security Q. Modification of Data is done in: (A) both active and passive attacks (B) neither active and passive attacks (C) active attacks (D) passive attacks ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) both active and passive attacks
R Rakesh Kumar π Hard Worker β 28.44K Points π Information Cyber Security Q. Which is the type of attack when Network is made unavailable for user (A) masquerade (B) replay (C) modification (D) denial of service ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) denial of service
P Priyanka Tomar π Tutor III β 35.28K Points π Information Cyber Security Q. When original data is changed to make it non-meaningful by attacker it is known as (A) masquerade (B) replay (C) modification of messages (D) traffic analysis ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) modification of messages
S Shiva Ram π Master β 30.44K Points π Information Cyber Security Q. attack is when original data is modified and malicious data is inserted (A) masquerade (B) replay(rewrite) (C) modification (D) traffic analysis ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) replay(rewrite)
V Vijay Sangwan π Mover β 28.62K Points π Information Cyber Security Q. means when an attacker pretends to be authentic user (A) masquerade (B) replay (C) modification (D) traffic analysis ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) masquerade
V Vijay Sangwan π Mover β 28.62K Points π Information Cyber Security Q. Release of Message Content and Traffic analysis are type of : (A) both active and passive attacks (B) neither active and passive attacks (C) active attacks (D) passive attacks ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) passive attacks