Computer System Security 10th Week Solution

1
3921
Computer System Security 10th Week Solution
Computer System Security 10th Week Solution

Disclaimer for ReGyan

If you require any more information or you have any problem regarding Copyright or have any questions about our site’s disclaimer, please feel free to contact us by email at hello@regyan.com.

Disclaimers for ReGyan

All the information on this website is published in good faith and for general information and educational purpose only. ReGyan does not make any warranties about the completeness, reliability, and accuracy of this information. Any action you take upon the information you find on this website (regyan.com), is strictly at your own risk. We will not be liable for any losses and/or damages in connection with the use of our website.

 


Computer System Security 10th Week Solution is given below.

Q:1. Which of the following is false for RSA algorithm :-

1. Security of RSA depends on problem of factoring large number

2. In software, RSA is 100 times slower than DES

3. In hardware, RSA is 10 times slower than DES

4. RSA can be faster than the symmetric algorithm

Answer:- 3. In hardware, RSA is 10 times slower than DES

Q:2. Which of the follwoing is true :-

1. The receiver can verify signature using public key

2. Public key is used to encrypt the message

3. Message is send without any key

4. public key cryptography is symmetric cryptography




Answer:-1. The receiver can verify signature using public key

Q:3. A cryptographic hash functions are :

1. Easy to compute

2. Used in creating digital fingerprint

3. Both 1 and 2

4. None of the above

Answer:- 3. Both 1 and 2

Q:4. In public key distribution :-

1. Public keys are published in a database

2. Receiver decrypts the message using their private key

3. Sender gets receiver’s public key from databse

4. All of the above

Answer:- 4. All of the above

Q:5. Some of cryptography protocols are :-




1. SSL

2. SET

3. IPSec

4. All of the above

Answer:- 4. All of the above

Q:6. Which of the following is true of SSL(Secured Socket Layer) :-

1. Client authentication is compulsary

2. It is developed by Netscape

3. Connection is need not be encrypted

4. All of the above

Answer:- 2. It is developed by Netscape

Also See:- Computer Science and Engineering Junior Research Fellowship 2020

Q:7. The OSI model has :-

1. 8 Layers

2. IP Sec protocol in network layer

3. SSL protocol in application layer

4. All of the above




Answer:- 2. IP Sec protocol in network layer

Q:8. In OSI Model :-

1. routing takes place in network layer

2. Physical layer transmits and receives unstructured raw data

3. HTTP is application level protocol

4. All of the above

Answer:- 4. All of the above

Q:9. A public key certificate contains :-

1. Private and public key of the entity being certified

2. Digital signature algorithm id

3. Identity of the receiver

4. Both 1 and 2

Answer:- 4. Both 1 and 2

Q:10. In HTTP model, content being sent might be changed by a third person

1. True

2. False




Answer:- 1. True

Q:11. The TLS is developed by Microsoft

1. True

2. False

Answer:- 2. False

Q:12. Which of the following is false :-

1. There are 13 root servers in the world

2. DoS attack was performed on them in 2007

3. Both 1 and 2

4. None of the above

Answer:- 3. Both 1 and 2

Q:13. DNS cache poisoning is

1. Entering false information into DNS cache

2. Also known as DNS spoofing

3. where raffic goes to wrong website

4. All of the above




Answer:- 4. All of the above

Q:14. DNS servers generally use UDP protocol

1. True

2. False

Answer:- 1. True

Also See:- Central Sector Scholarship 2019-20 For College & University

Q:15. Which of the following is wrong :-

1. DNSSEC provides mechanism to authenticate servers and requests

2. DNSSEC protects from data spoofing

3. Public key is needed for DNSSEC

4. None of the above

Answer:- 3. Public key is needed for DNSSEC

Computer System Security 10th Week Solution is given below. the solution of Computer System Security 7rd Week Solution and all the answers are correct.

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here