Cryptography includes the __________to securely and consistently prevent
or delay unauthorized access to sensitive information and enable verifiability of
every component in a communication:
a) Protocols
b) Algorithms
c) Strategies
d) All of the Above
e) None of These

1 Answer

Answer :

d) All of the Above

Related questions

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : To prevent unauthorized access to and / or from the network, a system known as ......., can be implemented -Technology

Last Answer : To prevent unauthorized access to and / or from the network, a system known as Firewall, can be implemented by hardware and / or software.

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : Credit Card Fraud includes: a) Credit cards are illegally get and used to get movable or immovable property b) Unauthorized and illegal use of credit cards c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Credit Card Fraud includes: a) Credit cards are illegally get and used to get movable or immovable property b) Unauthorized and illegal use of credit cards c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Social engineering the ____ of exploiting the human elements to gain access to unauthorized resources. a. Art b. Science c. Hacking d. Skill

Last Answer : a. Art

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : Rule 11 of CCS Conduct rules explained a) Evidence before committee b) Unauthorized communication of information c) Election d) Gift

Last Answer : b) Unauthorized communication of information

Description : Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services ... to use all internet services d. to prevent corporate users from using internet services

Last Answer : b. to allow intranet users to securely use specified internet services 

Description : A treatment of angina that consistently decreases the heart rate and can prevent vasospastic angina attacks is (a) Isosorbide dinitrate (b) NIFedipine (c) Nitroglycerin (d) Propranolol (e) Verapamil

Last Answer : Ans: E

Description : Reliability in the fundamental quality of a research which also reflects Options: A) Validity B) Verifiability C) Purity of data D) Superiority

Last Answer : A) Validity

Description : Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____: a) Wired b) Wireless c) Wired or Wireless d) None of These

Last Answer : c) Wired or Wireless

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv

Last Answer : It's D

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : ………… is not the component of data structure. A) Operations B) Storage Structures C) Algorithms D) None of above

Last Answer : D) None of above

Description : A successor auditor is required to communicate with the previous auditor. The primary concern in this communication is a. Information which will help the successor auditor in determining whether the client ... a more efficient audit. d. To save successor auditor time and money in gathering data.

Last Answer : Information which will help the successor auditor in determining whether the client management has integrity.

Description : A report of bag balance in the pro forma given below will be submitted by each UBO to its _____daily and by each DBO to its weekly. The Circle Bag Office will send a______ of balances in the prescribed pro ... , 5th of each month c) UBO, DBO, monthly report , 10th of each month d) None of these

Last Answer : b) DBO, CBO, monthly report , 5th of each month

Description : The meaning of Extranet is a) Global information system b) Sharing devices update c) Windows for selling d) A private network system to securely share part of business information with their clients.

Last Answer : d) A private network system to securely share part of business information with their clients.

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description : Is a security software program that protects a computer from access by unauthorized users.?

Last Answer : That's called a firewall.

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description :  ____ is known as unauthorized access to the system.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer :  Hacking is known as unauthorized access to the system. 

Description : Search engines use a(n) __________to automatically index sites. A) crawler B) query C) enterprise D) sitebuilder

Last Answer : crawler

Description : Telephone companies normally provide a voltage of __________to power telephones. (A) +24 volts DC (B) -24 volts DC (C) +48 volts DC (D) -48 volts DC.

Last Answer : (D) -48 volts DC.

Description : A boiler is a device used to create steam by applying __________to water a) Light energy b) heat energy c) Wind energy d) mechanical energy

Last Answer : b) heat energy

Description : Pre-operatively, the nurse identified the nursing dagnosis, Knowledge Deficit: Post-operative communication strategies . Which of the following is a relevant nursing intervention? A. ... uses an alternative form of verbal communication D. Illustrate means of communicating post- operatively

Last Answer : D. Illustrate means of communicating post- operatively

Description : E-marketing strategies includes a) Search Engine Market b) Online Public Relation c) Email- marketing d) All of the above.

Last Answer : d) All of the above.

Description : License is still required to use cryptography in which among the following countries: a) Iran and China b) China and India c) India and Pakistan d) None of These

Last Answer : a) Iran and China

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use ... as _______mathematics: a) Increte b) Discrete c) Both of Above d) None of These

Last Answer : b) Discrete

Description : Cryptography and Cryptanalysis are sometimes grouped together under the ____term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science: a) Umbrella b) Shield c) Veil d) None of These

Last Answer : a) Umbrella

Description : Cryptography is the study of information______: a) Hiding b) Verification c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Cryptography is derived from the ____word: a) Greek b) French c) Latin d) None of These

Last Answer : a) Greek

Description : License is still required to use cryptography in which among the following countries: a) Iran and China b) China and India c) India and Pakistan d) None of These

Last Answer : a) Iran and China

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above