V Vijay Sangwan π Mover β 28.62K Points π Information Cyber Security Q. __________ is used for encrypting data at network level. (A) ipsec (B) https (C) smtp (D) s/mime ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) ipsec
G Gopal Sharma π Tutor III β 38.32K Points π Information Cyber Security Q. Which of the following is not a secured mail transferring methodology? (A) pop3 (B) ssmtp (C) mail using pgp (D) s/mime ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) pop3
R Rakesh Kumar π Hard Worker β 28.44K Points π Information Cyber Security Q. PGP offers _____ block ciphers for message encryption. (A) triple-des (B) cast (C) idea (D) all of the mentioned ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) all of the mentioned
R Ranjeet π Tutor III β 34.60K Points π Information Cyber Security Q. Data compression includes (A) removal of redundant character (B) uniform distribution of characters (C) removal of redundant character & uniform distribution of characters (D) none of the mentioned ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) removal of redundant character & uniform distribution of characters
P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. Pretty good privacy (PGP) security system uses (A) public key cryptosystem (B) private key cryptosystem (C) public & private key cryptosystem (D) none of the mentioned ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) public & private key cryptosystem
G Gopal Sharma π Tutor III β 38.32K Points π Information Cyber Security Q. In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively. (A) select, alarm (B) alert, alarm (C) warning, alarm (D) warning, fatal ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) warning, fatal
A Admin π Coach β 38.23K Points π Information Cyber Security Q. Which protocol is used for the purpose of copying the pending state into the current state? (A) alert protocol (B) handshake protocol (C) upper-layer protocol (D) change cipher spec protocol ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) change cipher spec protocol
P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. Which protocol consists of only 1 bit? (A) alert protocol (B) handshake protocol (C) upper-layer protocol (D) change cipher spec protocol ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) change cipher spec protocol
V Vinay π Mover β 28.75K Points π Information Cyber Security Q. Which protocol is used to convey SSL related alerts to the peer entity? (A) alert protocol (B) handshake protocol (C) upper-layer protocol (D) change cipher spec protocol ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) alert protocol
P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. The full form of SSL is (A) serial session layer (B) secure socket layer (C) session secure layer (D) series socket layer ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) secure socket layer