1 The protection of transmitted data from passive attack is________
a) Authentication b) Access control c)Confidentiality d)Non-REpudation
2 Fabrication is attack on_________
a) Confidentiality b) Non-REpudation c) Authentication d) Availability
3 A hijacker can create a new session using the stolen data in_______
a) Network Layer b) Application Layer c) Transport Layer d) Data link Layer
4 __________Responsible for publishing the RFCs, with approval of the IESG
a) IAB b) IESG c) IBA d) IETF
Number of rounds in DES
a) 8 b) 16 c)32 d) 4
Which algorithm doesn’t use feistel cipher technique
a) DES b) IDEA c) RSA d) RC5
Fragmentation of large message in to number of part is called as
a) message/partial sub type b) Message/external body c) message/application type
d) All the above
Which MIME content type indicates that the body contains multiple independent parts
a) More Type b) Application Type
c) Multipart type d) Application subtype
9 RSA algorithm is not based on
a) exponentials b) modules numbers c) prime numbers d) ring numbers
10
One of the best application that use DES is
a) ATM b) digital significance c) Digital equipment d) none of these
11. Denying of message by destination is called_________________
12. In network security model the secret-key is distributed to the principles by______________
13.Releasing of message to an unauthorized person is called as___________
14.Security service____________requires that neither the sender nor the receiver of a message
be able
to deny the transmission
15. _________________is used be the participants to exchange keys without contacting public-
key
authority.
16. Size of a single buffer register in MDS is___________
17. In DES the term E/P stands for_____________18. Maximum allowable padding length in
MDS is
upto_______________
19. MLA in S/MIME represents_________
20. S/MIME uses_______ algorithm for encrypting signature