Network Security


Q1.

Avalanche effect in cryptography refers
GateOverflow

Q2.

In a columnar transportation cipher, the plain text is "the tomato is a plant in the night shade family", keyword is "TOMATO". The cipher text is
GateOverflow

Q3.

Which one of the following algorithm is not used in asymmetric key cryptography?
GateOverflow

Q4.

What is one advantage of setting up a DMZ (Demilitarized Zone) with two firewalls?
GateOverflow

Q5.

In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also is known that \phi(n)=2880, where \phi() denotes Euler's Totient Function, then the prime factors of n which is greater than 50 is _________ .
GateOverflow

Q6.

Avalanche effect in cryptography
GateOverflow

Q7.

Pretty Good Privacy (PGP) is used in:
GateOverflow

Q8.

In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton)WELCOME TO NETWORK SECURITY!
GateOverflow

Q9.

If a class C is derived from class B, which is derived form class A, all through public inheritance, then a class C member function can access
GateOverflow

Q10.

Which one of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5
GateOverflow