Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption
Last Answer : (D) Encryption
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption
Last Answer : a. Guided or Unguided
Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink
Last Answer : (C) Application
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens
Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private
Last Answer : d. public, private
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it
Last Answer : c. scrambling it to preserve its security
Description : Explain encryption and decryption. -Technology
Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.
Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation
Last Answer : d. presentation
Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification
Last Answer : A. encryption, authentication.
Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These
Last Answer : a) Encryption
Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These
Last Answer : c) Decryption
Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above
Last Answer : c. e‐cash
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption
Last Answer : D
Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2
Last Answer : (C) N(N-1)/2
Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : c. Intrusion‐detection software
Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding
Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above
Description : Encryption can be done A. only on textual data B. only on ASCII coded data C. on any bit string D. only on mnemonic data
Last Answer : C. on any bit string
Description : The way in which the message travels to the receiver is called: A. Encoding B. Decoding C. Channel D. Source
Last Answer : C. Channel
Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above
Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption
Last Answer : d. encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption
Last Answer : a. digital wallet
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : Cross Site Scripting is also shortly khown as a) XSS b) HTTP c) HTTPS d) DNS
Last Answer : a) XSS
Description : The nodal department for wind detection IMD refers to a) Indian meteorological department b) Indian metrological department c) Indian metallurgical department d) None of these
Last Answer : a) Indian meteorological department
Description : Errors in computer results could be due to 1) encoding of data 2) transmission of data 3) manipulation of data 4) all of the above
Last Answer : 4) all of the above
Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction
Last Answer : d. Error detection and correction
Description : Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks
Last Answer : a) collision detection
Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these
Last Answer : a) USB wireless network adapter
Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These
Last Answer : c) Presentation Layer
Description : Protection of life and liberty of Indian Citizen is secured by: a) Article 17 b) Article 21 c) Article 25 d) Article 29
Last Answer : b) Article 21
Description : Protection and improvement of environment is ensured in: a) Article 29 b) Article 32 c) Article 45 d) Article 48
Last Answer : d) Article 48
Description : When did the Indian Parliament pass the protection of Human Rights Act ? a. In 1993 b. In 1950 c. In 2000 d. In 2001
Last Answer : a. In 1993
Description : In India the Protection of Women from Domestic Violence Act. a. 2001 b. 2005 c. 2010 d. 2000
Last Answer : b. 2005
Description : The Protection of Civil Rights Act a. 1951. b. 1955. c. 1947. d. 1950.
Last Answer : b. 1955.
Description : The Protection of Human Rights Act 1993 describes‘Human Rights’as relating to a. Liberty. b. Equality. c. Dignity. d. All of these.
Last Answer : d. All of these.
Description : Which generation argues for special provisions for the protection and the promotion of the interests of the vulnerable groups in the society? a) Third Generation b) Second generation c) First Generation d) None of these
Last Answer : a) Third Generation
Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above
Last Answer : [D] All of the above
Description : The Convention on the Rights of Child, 1989, classified child rights into four categories – (a) Life, Liberty, Equality and Fraternity (b) Civil, Political, Economic and Cultural Rights (c) Survival, Development, Protection and Participation Rights (d) None of these
Last Answer : (c) Survival, Development, Protection and Participation Rights
Description : Indian constitution provides protection to the life and liberty of citizens as well as non citizens by a) Art. 20 b) Art. 21 c) Art. 22 d) Art. 19
Last Answer : b) Art. 21
Description : What was the fund allocation for the implementation of the ‘Protection from Domestic Violence Act’ in the Eleventh plan? a. Rs. 100 crore b. Rs. 300 crore c. Rs. 500 crore d. Rs. 1000 crore
Last Answer : c. Rs. 500 crore