Encoding or scrambling data for transmission across a network is khown as
 a)Protection b) Detection c) Encryption d) Decryption

1 Answer

Answer :

c) Encryption

Related questions

Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

Last Answer : (D) Encryption

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption

Last Answer : a. Guided or Unguided

Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

Last Answer : (C) Application

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it

Last Answer : c. scrambling it to preserve its security 

Description : Explain encryption and decryption. -Technology

Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Encryption can be done A. only on textual data B. only on ASCII coded data C. on any bit string D. only on mnemonic data

Last Answer : C. on any bit string

Description : The way in which the message travels to the receiver is called: A. Encoding B. Decoding C. Channel D. Source

Last Answer : C. Channel

Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above

Last Answer : a) Encryption

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : Cross Site Scripting is also shortly khown as a) XSS b) HTTP c) HTTPS d) DNS

Last Answer : a) XSS

Description : The nodal department for wind detection IMD refers to a) Indian meteorological department b) Indian metrological department c) Indian metallurgical department d) None of these

Last Answer : a) Indian meteorological department

Description : Errors in computer results could be due to 1) encoding of data 2) transmission of data 3) manipulation of data 4) all of the above

Last Answer : 4) all of the above

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks

Last Answer : a) collision detection

Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these

Last Answer : a) USB wireless network adapter

Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These

Last Answer : c) Presentation Layer

Description : Protection of life and liberty of Indian Citizen is secured by: a) Article 17 b) Article 21 c) Article 25 d) Article 29

Last Answer : b) Article 21

Description : Protection and improvement of environment is ensured in: a) Article 29 b) Article 32 c) Article 45 d) Article 48

Last Answer : d) Article 48

Description : When did the Indian Parliament pass the protection of Human Rights Act ? a. In 1993 b. In 1950 c. In 2000 d. In 2001

Last Answer : a. In 1993

Description : In India the Protection of Women from Domestic Violence Act. a. 2001 b. 2005 c. 2010 d. 2000

Last Answer : b. 2005

Description : The Protection of Civil Rights Act a. 1951. b. 1955. c. 1947. d. 1950.

Last Answer : b. 1955.

Description : The Protection of Human Rights Act 1993 describes‘Human Rights’as relating to a. Liberty. b. Equality. c. Dignity. d. All of these.

Last Answer : d. All of these.

Description : Which generation argues for special provisions for the protection and the promotion of the interests of the vulnerable groups in the society? a) Third Generation b) Second generation c) First Generation d) None of these

Last Answer : a) Third Generation

Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above

Last Answer : [D] All of the above

Description : The Convention on the Rights of Child, 1989, classified child rights into four categories – (a) Life, Liberty, Equality and Fraternity (b) Civil, Political, Economic and Cultural Rights (c) Survival, Development, Protection and Participation Rights (d) None of these

Last Answer : (c) Survival, Development, Protection and Participation Rights

Description : Indian constitution provides protection to the life and liberty of citizens as well as non citizens by a) Art. 20 b) Art. 21 c) Art. 22 d) Art. 19

Last Answer : b) Art. 21

Description : What was the fund allocation for the implementation of the ‘Protection from Domestic Violence Act’ in the Eleventh plan? a. Rs. 100 crore b. Rs. 300 crore c. Rs. 500 crore d. Rs. 1000 crore

Last Answer : c. Rs. 500 crore