Introduction to Cyber Security IV
MBA-IV SEM-IV 2021-22 Online Exam

S. P. Mandali's
Prin. N.G.Naralkar Institute of Career Development & Research
536 Shaniwar Peth, Appa Balwant Chowk (ABC Chowk) Pune-411030


Email *
Student Name *
Roll No *
Class / Division *
MBA Specialization *
Subject *
Online Exam - Introduction to Cyber Security IV
MBA-IV SEM-IV 2021-22 online Exam
Q. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.
Clear selection
Q. MD5 is a widely used hash function for producing hash value of

Clear selection
Q. Using public key cryptography, X adds a digital signature σ to message M, encrypts <m, σ=””>, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?</m,>

Clear selection
Q. A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
Clear selection
Q. What is the effectiveness of an n-bit hash value?

Clear selection
Q. Certificate extensions fall into 3 categories. Which one of the following is not a Certificate extensions category?

Clear selection
Q. Which of the following is not an element/field of the X.509 certificates?
Clear selection
Q.  What is the PGP stand for?
Clear selection
Q. PGP makes use of which cryptographic algorithm?

Clear selection
Q. Which Authentication Encryption approach is taken by the IPSec protocol?
Clear selection
Q. IPSec is designed to provide security at the _________
Clear selection
Q. PGP encrypts data by using a block cipher called ____

Clear selection
Q. Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.

Clear selection
Q. In tunnel mode, IPSec protects the ______
Clear selection
Q. Which of the following field in IPv4 datagram is not related to fragmentation?

Clear selection
Q. Which one of the following is not a higher –layer SSL protocol?

Clear selection
Q. In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.
Clear selection
Q. IPsec services are available in ______ Layer.

Clear selection
Q. Encapsulating Security Payload (ESP) belongs to which Internet Security Protocol?

Clear selection
Q. Suppose that everyone in a group of N people wants to communicate secretly with the N–1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

Clear selection
Q. Which of the statements are not true to classify VPN systems?



Clear selection
Q. The DSS signature uses which hash algorithm?
Clear selection
Q. Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
Clear selection
Q. Why did SSL certificate require in HTTP?
Clear selection
Q. In SSL, what is used for authenticating a message?
Clear selection
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy