Recent questions tagged network-security

385
views
1 answers
1 votes
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
459
views
0 answers
1 votes
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it...
361
views
1 answers
1 votes
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that ...
355
views
0 answers
0 votes
If a password hacker devised a system trying a password entry system by a program which ran once a second. How much time it would take to crack a password consisting of 4...
1.5k
views
0 answers
0 votes
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2. If user A as public key YA=9 what is as private key XA? If user B has public key YB= 3...
213
views
0 answers
0 votes
Is Ipv6 & network security is in gate 2023?
399
views
0 answers
0 votes
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is: Vulnerability attackBandwidth flooding...
2.0k
views
1 answers
0 votes
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$$20, 19$$33,11$$3, 28$$77, 28$
2.4k
views
2 answers
0 votes
Which among the following statement(s) is(are) true?A hash function takes a message of arbitrary length and generates a fixed length codeA hash function takes a message o...
1.1k
views
2 answers
1 votes
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis ofSource IP addressDestination I...
1.2k
views
1 answers
0 votes
Given below are two statements:Statement $I$: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryptionStatement $II$: Diffie-Hellman algori...
828
views
2 answers
1 votes
How many bits are required to encode all twenty six letters, ten symbols, and ten numerals?$5$$6$$7$$46$
3.0k
views
2 answers
0 votes
$PGP$ encrypts data by using a block cipher called :international data encryption algorithmprivate data encryption algorithminternet data encryption algorithmnone of the ...
888
views
2 answers
1 votes
Why is one - time password safe ?It is easy to generateIt cannot b sharedIt is different for every accessIt can be easily decrypted
2.1k
views
2 answers
2 votes
The ability to inject packets into the Internet with a false source address is known asMan-in-the-middle attackIP phishingIP sniffingIP spoofing
2.4k
views
1 answers
1 votes
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used ini...
757
views
1 answers
0 votes
A math class has 25 students. Assuming that all of the students were born in the firsthalf of the year—between January 1st and June 30th— what is the probability that...
501
views
0 answers
0 votes
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, evenif they have never met, share no secrets, and have no certificates(a) Explain how ...
1.8k
views
1 answers
0 votes
The Diffie-Hellman key exchange is being used to establish a secret key betweenAlice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’ssecret numbe...
485
views
0 answers
0 votes
Alice wants to communicate with Bob, using public-key cryptography. She establishesa connection to someone she hopes is Bob. She asks him for his public key andhe sends i...
1.1k
views
1 answers
0 votes
Alice and Bob use RSA public key encryption in order to communicate between them.Trudy finds out that Alice and Bob shared one of the primes used to determine thenumber n...
2.4k
views
2 answers
1 votes
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26.(a) If p = 5 and q = 13, list five legal values for d.(b) If p = 5, q = 31, and d = 37, find...
325
views
0 answers
0 votes
I’m not able to distinguish the difference between digital certificate and digital signature… Correct me if there is flaw in my understanding : A Digital Certificate ...
9.1k
views
6 answers
13 votes
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Funct...
1.8k
views
2 answers
0 votes
Which of the following statement/s is/are true?Firewalls can screen traffic going into or out of an organization.Virtual private networks can stimulate an old leased netw...
1.1k
views
2 answers
0 votes
Suppose that everyone in a group of $N$ people wants to communicate secretly with $(N-1)$ other people using symmetric key cryptographic system. The communication between...