JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
Introduction to Cyber Security IV
MBA-IV SEM-IV 2021-22 Online Exam
S. P. Mandali's
Prin. N.G.Naralkar Institute of Career Development & Research
536 Shaniwar Peth, Appa Balwant Chowk (ABC Chowk) Pune-411030
* Indicates required question
Email
*
Your email
Student Name
*
Your answer
Roll No
*
Your answer
Class / Division
*
Choose
MBA-II Division A
MBA Specialization
*
Choose
Marketing Management (MKT)
Financial Management (FIN)
Human Resources Management (HRM)
Operations and Supply chain Management (OSCM)
Business Analytics (BA)
Rural & Agri -Business Management (RABM)
Subject
*
Choose
Introduction to Cyber Security IV
Online Exam - Introduction to Cyber Security IV
MBA-IV SEM-IV 2021-22 online Exam
Q. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.
A : 23
B : 64
C : 11
D : 54
Clear selection
Q. MD5 is a widely used hash function for producing hash value of
A : 64 bits
B : 128 bits
C : 512 bits
D : 1024 bits
Clear selection
Q. Using public key cryptography, X adds a digital signature σ to message M, encrypts <m, σ=””>, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?</m,>
A : Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key
B : Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key
C : Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key
D : Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key
Clear selection
Q. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
A : S can launch a birthday attack to replace m with a fraudulent message.
B : A third party attacker can launch a birthday attack to replace m with a fraudulent message.
C : R can launch a birthday attack to replace m with a fraudulent message.
D : R can launch a birthday attack
Clear selection
Q. What is the effectiveness of an n-bit hash value?
A : 22n
B : 2n
C : 2-n
D : 2-2n
Clear selection
Q. Certificate extensions fall into 3 categories. Which one of the following is not a Certificate extensions category?
A : Subject and Issuer attributes
B : Key and Policy information
C : Certification path constraints
D : All of the above are Certificate extensions categories
Clear selection
Q. Which of the following is not an element/field of the X.509 certificates?
A : Issuer Name
B : Serial Modifier
C : Issuer unique
D : Identifier Signature
Clear selection
Q. What is the PGP stand for?
A : Permuted Gap Permission
B : Permuted Great Privacy
C : Pretty Good Privacy
D : Permuted Great Permission
Clear selection
Q. PGP makes use of which cryptographic algorithm?
A : DES
B : AES
C : RSA
D : Rabin
Clear selection
Q. Which Authentication Encryption approach is taken by the IPSec protocol?
A : Authentication followed by encryption (A→E)
B : Hashing followed by encryption (H→E)
C : Encryption followed by authentication (E→A)
D : Independently encrypt and authenticate (E + A)
Clear selection
Q. IPSec is designed to provide security at the _________
A : transport layer
B : network layer
C : application layer
D : presentation layer
Clear selection
Q. PGP encrypts data by using a block cipher called ____
A : international data encryption algorithm
B : private data encryption algorithm
C : internet data encryption algorithm
D : local data encryption algorithm
Clear selection
Q. Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.
A : SSL
B : TLS
C : either (a) or (b)
D : none of above
Clear selection
Q. In tunnel mode, IPSec protects the ______
A : Entire IP packet
B : IP header
C : IP payload
D : IP trailer
Clear selection
Q. Which of the following field in IPv4 datagram is not related to fragmentation?
A : Flags
B : Offset
C : TOS
D : Identifier
Clear selection
Q. Which one of the following is not a higher –layer SSL protocol?
A : Alert Protocol
B : Handshake Protoco
C : Alarm Protocol
D : Change Cipher Spec Protocol
Clear selection
Q. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
A : 2^16
B : 2^32
C : 2^14
D : 2^12
Clear selection
Q. IPsec services are available in ______ Layer.
A : Application
B : Data Link
C : Network
D : Transport
Clear selection
Q. Encapsulating Security Payload (ESP) belongs to which Internet Security Protocol?
A : Secure Socket Layer Protocol
B : Secure IP Protocol
C : Secure Http Protocol
D : Transport Layer Security Protocol
Clear selection
Q. Suppose that everyone in a group of N people wants to communicate secretly with the N–1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
A : 2N
B : N(N-1)
C : N(N-1)/2
D : (N – 1)2
Clear selection
Q. Which of the statements are not true to classify VPN systems?
A : Protocols used for tunnelling the traffic
B : Whether VPNs are providing site-to-site or remote access connection
C : Securing the network from bots and malwares
D : Levels of security provided for sending and receiving data privately
Clear selection
Q. The DSS signature uses which hash algorithm?
A : MD5
B : SHA-2
C : SHA-1
D : Does not use hash algorithm
Clear selection
Q. Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
A : Remote access VPNs
B : Site-to-site VPNs
C : Peer-to-Peer VPNs
D : Router-to-router VPNs
Clear selection
Q. Why did SSL certificate require in HTTP?
A : For making security weak
B : For making information move faster
C : For encrypted data sent over HTTP protocol
D : For sending and receiving emails unencrypted
Clear selection
Q. In SSL, what is used for authenticating a message?
A : MAC (Message Access Code)
B : MAC (Message Authentication Code)
C : MAC (Machine Authentication Code)
D : MAC (Machine Access Code)
Clear selection
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google.
Report Abuse
-
Terms of Service
-
Privacy Policy
Forms