Computer Network


Q101.

Consider the following two statements: i.A hash function (these are often used for computing digital signatures) is an injective function. ii.A. encryption technique such as DES performs a permutation on the elements of its input alphabet. Which one of the following options is valid for the above two statements?
GateOverflow

Q102.

SSL is not responsible for
GateOverflow

Q103.

The minimum positive integer p such that 3^{p} \pmod {17} = 1 is
GateOverflow

Q104.

You are given the following four bytes : \begin{array}{|l|l|l|l|l|l|l|l|l|l|} \hline 10100011 & 00110111 & 11101001 & 10101011 \\ \hline \end{array} Which of the following are substrings of the base 64 encoding of the above four bytes?
GateOverflow

Q105.

A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow external hosts to send packets on existing open TCP connections or connections that are being opened (by internal hosts) but not allow them to open TCP connections to hosts in the private network. To achieve this the minimum capability of the firewall should be that of
GateOverflow

Q106.

The standard for certificates used on internet is
GateOverflow

Q107.

Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key is
GateOverflow

Q108.

Which of the following statement(s) is TRUE? I. A hash function takes a message of arbitrary length and generates a fixed length code. II. A hash function takes a message of fixed length and generates a code of variable length. III. A hash function may give the same hash value for distinct messages.
GateOverflow

Q109.

In which layer of network architecture, the secured socket layer (SSL) is used?
GateOverflow

Q110.

A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?
GateOverflow