computer system security quiz 10 solution
Q:1. Which of the following statement is true for RSA algorithm ?
1.Security of RSA depends on problem of factoring large number
2.In software, RSA is 10 times slower than DES
3.In hardware, RSA is 100 times slower than DES
4.RSA can be faster than the symmetric algorithm
Answer:- Security of RSA depends on problem of factoring large number
Reason:- Security of RSA relies on the computational difficulty of factoring large integers. As computing power increases and more efficient factoring algorithms are discovered, the ability to factor larger and larger numbers also increases.
Q:2. In cryptography,
1.The receiver can verify signature using public key
2.cryptographic hash function is used in creating digital fingerprint
3.Both 1 and 2
4.None of the above
Answer:- 3.Both 1 and 2
Reason:- Cryptographic hash functions are one of the fundamental building blocks of todays digital economy. ... Hash functions are sometimes called fingerprint functions because they can be used to create a unique fingerprint of a digital file.
Q:3. Which of the following statements is/are true (For cryptography) ?
1.SET and IPSec are cryptography protocols.
2.Receiver decrypts the message using their private key.
3.Sender gets receiver's public key from databse.
4.All of the above.
Answer:- 4.All of the above.
Reason:- this key is known to everyone. The encrypted message is sent to the receiving end, who will decrypt the message with his private key. Only the receiver can decrypt the message because no one else has the private key.
Q:4. Select the correct statement for OSI model.
1.IP Sec protocol is in network layer of OSI model.
2.Physical layer transmits and receives unstructured raw data.
3.HTTP is application level protocol.
4.All of the above.
Reason:-The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software and ip sec protocol is in network layer of osi model.
Q:5. What is DNS spoofing ?
1.Entering false information into DNS cache so that it returns incorrect information.
2.It is also known as DNS changing.
3.Users are redirected to right website.
4.All of the above
Answer:- 4.All of the above
Reason:- DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record, its is very best spoofing.
10 Comments
thanku bhai
ReplyDeleteBahut shi kaaam kiya hai aapne
Thanks
DeleteThanks Bhai , but I think last one is wrong .😓
ReplyDeleteHaa galat hain last ques ka ...usme 3rd option galat hain .
DeleteReason - it communicates with the compromised DNS server, resulting in the user being redirected to a false website planted by the attacker
It's incorrect.
yrr unhone bola h ki sbke ans. same hoye to quiz reject kr diya jaeygea
ReplyDeletemujhe or ans. do isi questions k
jab question hi same hai sab ka to answer bii same hoga na itna tension na lo bas exam pe focus karo sab dekha jayga
DeleteThanks bro ❤️❤️
ReplyDeletewelcome
Deletebro quiz 11 pla upload
ReplyDeleteYes
Delete