computer system security quiz 10 Answers | css quiz 10 (all question and answer only for eduction purpose.)
Q:1. Which of the following statement is true for RSA algorithm ?
1.Security of RSA depends on problem of factoring large number
2.In software, RSA is 10 times slower than DES
3.In hardware, RSA is 100 times slower than DES
4.RSA can be faster than the symmetric algorithm
Answer:- Security of RSA depends on problem of factoring large number
reason:-RSA security depends on the statistical complexity of factoring large integers into large integers. The ability to factor larger and larger numbers often increases as the computational capacity increases and more powerful factoring algorithms are found.
Q:2. In cryptography,
1.The receiver can verify signature using public key
2.cryptographic hash function is used in creating digital fingerprint
3.Both 1 and 2
4.None of the above
Answer:- 3.Both 1 and 2
reason:-Hash functions are often referred to as fingerprint functions, because they can be used to construct a digital file with a specific fingerprint.
Q:3. Which of the following statements is/are true (For cryptography) ?
1.SET and IPSec are cryptography protocols.
2.Receiver decrypts the message using their private key.
3.Sender gets receiver's public key from databse.
4.All of the above.
Answer:- 4.All of the above.
Reason:- Everyone knows this key. The encrypted message is sent to the receiving end, which, with its private key, would decrypt the message. The message can be decrypted only by the recipient and no one else has the private key.
Q:4. Select the correct statement for OSI model.
1.IP Sec protocol is in network layer of OSI model.
2.Physical layer transmits and receives unstructured raw data.
3.HTTP is application level protocol.
4.All of the above.
Answer:- 4.All of the above.
Reason:-The Open Systems Interconnection Model (OSI) is a conceptual paradigm used to define a networking system's functions. In order to promote interoperability between different products and applications, the OSI model characterizes the computing functions into a universal set of rules and specifications, and the ip sec protocol is in the osi model network layer.
Q:5. What is DNS spoofing ?
1.Entering false information into DNS cache so that it returns incorrect information.
2.It is also known as DNS changing.
3.Users are redirected to right website.
4.All of the above
Answer:- 4.All of the above
Reason:- DNS spoofing, also known as DNS cache poisoning, is a type of computer security hacking in which corrupt data from the Domain Name System is inserted into the cache of the DNS resolver, causing the name server to return an incorrect record of the results.
No comments:
Post a Comment