G Gopal Sharma π Tutor III β 38.32K Points π Information Cyber Security Q. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes. (A) 216 (B) 232 (C) 214 (D) 212 ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) 214
P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. Which one of the following is not a higher –layer SSL protocol? (A) alert protocol (B) handshake protocol (C) alarm protocol (D) change cipher spec protocol ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) alarm protocol
R Rakesh Kumar π Hard Worker β 28.44K Points π Information Cyber Security Q. In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack. (A) true (B) false (C) --- (D) --- ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) false
S Shiva Ram π Master β 30.44K Points π Information Cyber Security Q. In the above figure, which of the above shaded block is transparent to end users and applications? (A) ip/ipsec (B) ssl (C) kerberos (D) s/mime ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) ip/ipsec
V Vinay π Mover β 28.75K Points π Information Cyber Security Q. In the above figure from left to right, the correct order of the shaded levels are (A) network level, application level, transport level (B) application level, network level, transport level (C) transport level, application level, network level (D) network level, transport level, application level ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) network level, transport level, application level
R Rakesh Kumar π Hard Worker β 28.44K Points π Information Cyber Security Q. Cryptographic hash function takes an arbitrary block of data and returns _________ (A) fixed size bit string (B) variable size bit string (C) both fixed size bit string and variable size bit string (D) variable sized byte string ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) fixed size bit string
R Ram Sharma π Coach β 193.88K Points π Information Cyber Security Q. ElGamal encryption system is __________ (A) symmetric key encryption algorithm (B) asymmetric key encryption algorithm (C) not an encryption algorithm (D) block cipher method ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) asymmetric key encryption algorithm
G Gopal Sharma π Tutor III β 38.32K Points π Information Cyber Security Q. Voice privacy in GSM cellular telephone protocol is provided by _______ (A) a5/2 cipher (B) b5/4 cipher (C) b5/6 cipher (D) b5/8 cipher ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) a5/2 cipher
V Vijay Sangwan π Mover β 28.62K Points π Information Cyber Security Q. Which one of the following is a cryptographic protocol used to secure HTTP connection? (A) stream control transmission protocol (sctp) (B) transport layer security (tls) (C) explicit congestion notification (ecn) (D) resource reservation protocol ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) transport layer security (tls)
P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. Cryptanalysis is used __________ (A) to find some insecurity in a cryptographic scheme (B) to increase the speed (C) to encrypt the data (D) to make new ciphers ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) to find some insecurity in a cryptographic scheme