Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption
Last Answer : c) Encryption
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption
Last Answer : a. Guided or Unguided
Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink
Last Answer : (C) Application
Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private
Last Answer : d. public, private
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it
Last Answer : c. scrambling it to preserve its security
Description : Explain encryption and decryption. -Technology
Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation
Last Answer : d. presentation
Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification
Last Answer : A. encryption, authentication.
Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These
Last Answer : a) Encryption
Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These
Last Answer : c) Decryption
Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above
Last Answer : c. e‐cash
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption
Last Answer : D
Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2
Last Answer : (C) N(N-1)/2
Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : c. Intrusion‐detection software
Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding
Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer
Description : Which of the following is not related to information security on the Internet? (A) Data Encryption (B) Water marking (C) Data Hiding (D) Information Retrieval
Last Answer : (D) Information Retrieval
Description : An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the ... C) American Standard Code for Information Integrity (D) American Standard Code for Isolated Information
Last Answer : (A) American Standard Code for Information Interchange
Description : Transforming thoughts, ideas and messages into verbal and non-verbal signs is referred to as (A) channelization (B) mediation (C) encoding (D) decoding
Last Answer : (C) encoding
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : Errors in computer results could be due to 1) encoding of data 2) transmission of data 3) manipulation of data 4) all of the above
Last Answer : 4) all of the above
Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction
Last Answer : d. Error detection and correction
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens
Description : A major barrier in the transmission of cognitive data in the process of communication is an individual’s (A) personality (B) expectation (C) social status (D) coding ability
Last Answer : (D) coding ability
Description : Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks
Last Answer : a) collision detection
Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these
Last Answer : a) USB wireless network adapter
Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks
Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.
Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These
Last Answer : c) Presentation Layer
Description : Transmission of printed material over telephone lines. A. Video text B. Facsimile C. Encoding D. Xerox copy
Last Answer : B. Facsimile
Description : In ATM, the _____ layer defines thetransmission medium,bit transmission,encoding, and electrical-to-optical transformation. A) physical B) ATM layer C) AAL D) none of the above
Last Answer : physical
Description : Rate of change of a signal on a transmission medium after encoding and modulation have occurred
Last Answer : baud rate
Description : The process of putting one's thoughts (meaning) into signs (symbols) is called A)decoding. B)noise. C)interference. D)transmission. E)encoding.
Last Answer : E)encoding.
Description : ______ provides synchronization without increasingthe number of bits. A) Scrambling B) Line coding C) Block coding D) None of the above
Last Answer : Scrambling
Description : _______ isnormally referred toas mB/nB coding; it replaceseach m-bit group with an n-bit group. A) Block coding B) Line coding C) Scrambling
Last Answer : Block coding
Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above
Description : ________ is the process of converting digitaldata to adigital signal. A) Block coding B) Line coding C) Scrambling D) None of the above
Last Answer : Line coding
Description : __________ conversion involves three techniques: line coding,block coding, and scrambling. A) Analog-to-digital B) Digital-to-analog C) Analog-to-analog D) Digital-to-digital
Last Answer : Digital-to-digital
Description : When a retailer adds unrelated products and product lines to the existing product mix, this is termed 1. range expansion 2. mix scrambling 3. merchandise extension 4. scrambled merchandising 5. none of these
Last Answer : scrambled merchandising
Description : When a retailer adds unrelated products and product lines to the existing product mix this is termed A)range expansion B)mix scrambling C)merchandise extension D)scrambled merchandising
Last Answer : D)scrambled merchandising
Description : Every type of communication is affected by its: (A) Reception (B) Transmission (C) Non-regulation (D) Context
Last Answer : (D) Context
Description : Video transmission over the Internet that looks like delayed live casting is called: (A) virtual video (B) direct broadcast (C) video shift (D) real-time video
Last Answer : (D) real-time video
Description : Does old Windows XP Home edition allow WPA wireless network encryption or is it too old?
Last Answer : If I remember correctly, if you upgrade to SP2, you should be able to use WPA. But the original pre-service pack Windows XP doesn’t support WPA without a patch available from Microsoft. Good luck!