Which among the following is correct about goals in cryptography:
a) Confidentiality - Only an authorized recipient should be able to extract the contents of
the
message from its encrypted form. Resulting from steps to hide, stop or delay free access
to the
encrypted information.
b) Message Integrity - The recipient should be able to determine if the message has been
altered.
c) Sender Authentication - The recipient should be able to verify from the message, the
identity
of the sender, the origin or the path it traveled (or combinations) so to validate claims
from
emitter or to validated the recipient expectations.
d) Sender Non repudiation - The emitter should not be able to deny sending the message
e) None of These
f) All of the Above

1 Answer

Answer :

f) All of the Above

Related questions

Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates

Last Answer : a. hashing algorithms

Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates

Last Answer : (a) Hashing algorithms

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : ………… is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : When martial law is imposed, Parliament cannot make law ill respect of which one of following matters? (1) indemnify any person in respect of any act done by him in connection with the maintenance of order ... force in the area (4) Any act done under martial law can be validated by Parliament by law

Last Answer : (4) Any act done under martial law can be validated by Parliament by law Explanation: Any act done under martial law cannot be validated by parliament by law.

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : When sending an e-mail, the _____ line describes the contents of the message. 1) to 2) subject 3) contents 4) CC 5) None of these

Last Answer : Answer :2

Description : When sending an e-mail, the _____line describe the contents of the message: a) Subject b) Contents c) CC d) None of These

Last Answer : a) Subject

Description : When sending an e-mail, the … line describe the contents of the message a) Subject b) To c) Contents d) CC e) None of these

Last Answer : a) Subject

Description : Authentication means: a) Verify Password Only b) Verification of Login name and Password c) To know details of login name d) None of These

Last Answer : b) Verification of Login name and Password

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption ... and hashed message using DES d. sends both message and hashed message using public key encryption

Last Answer : a. sends message key using public key encryption using DES and hashed message using public key encryption  

Description : Prevention of disclosure of information to unauthorized persons is __________ A. Confidentiality B. Integrity C. Availability D. None of the above

Last Answer : A. Confidentiality

Description : The amount noted for remittance to sender of VP article a) Can be altered free of cost at the request of the sender b) Can be altered on payment of prescribed fee at the request of the sender c) Can only recall the article d) None of these

Last Answer : a) Can be altered free of cost at the request of the sender

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500

Last Answer : a. 2500

Description : In the SMTP header field_____ is a summary of the message being sent which is specified by the sender. a. Reply-to b. Return-path c. Subject d. From

Last Answer : c. Subject

Description : I'm using GMAIL 2-step authentication. It asks me to re-verify for no particular reason. Was someone messing with my GMAIL?

Last Answer : Not necessarily. Someone could have tried to log in as you from another machine and failed. Your machine could have lost its cookies if you cleaned them out or for a number of other reasons. You might ... cause this. You have to rule out a lot of other reasons before getting to the paranoid reason.

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Which one of the following is incorrect about the characteristics of protobionts (coacervates and microspheres) as envisaged in the abiogenic origin of life? (a) They were partially isolated from ... were able to reproduce. (d) They could separate combinations of molecules from the surroundings.

Last Answer : (c) They were able to reproduce

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : Which of the following is FALSE A. The digital forensic investigator must maintain absolute objectivity B. It is the investigator's job to determine someone's guilt or innocence. C. It is the ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba

Last Answer : B. It is the investigator’s job to determine someone’s guilt or innocence.

Description : Which of the following is FALSE? a. The digital forensic investigator must maintain absolute objectivity b. It is the investigator's job to determine someone's guilt or innocence. c. It is ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba

Last Answer : b. It is the investigator’s job to determine someone’s guilt or innocence.

Description : If a professional accountant is billing an audit client a number of hours greater than those actually worked, which of the following fundamental principles is likely violated? a. Objectivity b. Integrity c. Professional due care d. Confidentiality

Last Answer : Integrity

Description : Which fundamental principle is seriously threatened by an engagement that is compensated based on the net proceeds on loans received by the client from a commercial bank? a. Integrity b. Objectivity c. Professional behavior d. Confidentiality

Last Answer : Objectivity

Description : A professional accountant is likened to a prudent father to his son. This relates to what fundamental principle? a. Professional competence and due care b. Confidentiality c. Integrity d. Objectivity

Last Answer : Professional competence and due care

Description : There are fundamental principles that the professional accountant has to observe when performing assurance engagements. The requirement of which principle is of particular importance in an assurance ... the intended user? a. Integrity b. Confidentiality c. Professional competence d. Objectivity

Last Answer : Objectivity

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : Who among the following was the first Indian origin recipient of the prestigious Pulitzer prize? —

Last Answer : Gobind Behari Lal

Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above

Last Answer : C) Security