Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged network-security
385
views
1
answers
1
votes
ISRO 2024
CAPTCHA is used to provide protection fromZero day attackBuffer OverflowAutomated scripted attackMan in the middle attack
Ramayya
385
views
Ramayya
asked
Jan 7
Others
isro-2024
non-gate
network-security
web-technologies
+
–
459
views
0
answers
1
votes
DRDO CSE 2022 Paper 2 | Question: 21
You work for a company $X$ in Bangalore. Due to floods, you have been allowed to work from home. You have your code in the server in the company and you have to access it...
admin
459
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-marks
descriptive
+
–
361
views
1
answers
1
votes
DRDO CSE 2022 Paper 2 | Question: 23 (a)
Fill in the table below to create firewall rules that perform the actions described below on a local network with address $1.2.3.0$ (subnet $255.255.255.0).$ Assume that ...
admin
361
views
admin
asked
Dec 15, 2022
Computer Networks
drdocse-2022-paper2
computer-networks
network-security
2-and-half-marks
descriptive
+
–
355
views
0
answers
0
votes
UPSC Assistant Director (Systems) Exam
If a password hacker devised a system trying a password entry system by a program which ran once a second. How much time it would take to crack a password consisting of 4...
Kumar RahulSingh
355
views
Kumar RahulSingh
asked
Nov 28, 2022
Computer Networks
network-security
combinatory
+
–
505
views
0
answers
0
votes
The total number of keys required for a set of n individuals to be able to communicate with each other using secret key and public key crypto-systems, respectively are: (A) n(n-1) and 2n (B) 2n and ((n(n – 1))/2) (C) ((n(n – 1))/2) and 2n (D) ((n(n – 1))/2) and n
Jeetmoni saikia
505
views
Jeetmoni saikia
asked
Nov 18, 2022
Computer Networks
computer-networks
network-security
normal
+
–
1.5k
views
0
answers
0
votes
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2. a. If user A as public key YA=9 what is as private key XA? b. If user B has public key YB= 3 what is the shared secret key K?
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root a=2. If user A as public key YA=9 what is as private key XA? If user B has public key YB= 3...
JustPakYt
1.5k
views
JustPakYt
asked
Nov 13, 2022
Computer Networks
computer-networks
network-security
deadlock-prevention-avoidance-detection
counting
+
–
213
views
0
answers
0
votes
Is Ipv6 & network security is in gate 2023?
Is Ipv6 & network security is in gate 2023?
Vijay_Ram
213
views
Vijay_Ram
asked
Oct 8, 2022
Computer Networks
computer-networks
network-security
+
–
399
views
0
answers
0
votes
NIELIT STA 2021
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is: Vulnerability attackBandwidth flooding...
rsansiya111
399
views
rsansiya111
asked
Dec 6, 2021
Computer Networks
network-security
+
–
2.0k
views
1
answers
0
votes
UGC NET CSE | October 2020 | Part 2 | Question: 32
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$$20, 19$$33,11$$3, 28$$77, 28$
go_editor
2.0k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
+
–
2.4k
views
2
answers
0
votes
UGC NET CSE | October 2020 | Part 2 | Question: 54
Which among the following statement(s) is(are) true?A hash function takes a message of arbitrary length and generates a fixed length codeA hash function takes a message o...
go_editor
2.4k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-networks
network-security
cryptography
+
–
1.1k
views
2
answers
1
votes
UGC NET CSE | October 2020 | Part 2 | Question: 60
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis ofSource IP addressDestination I...
go_editor
1.1k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-neworks
network-security
+
–
1.2k
views
1
answers
0
votes
UGC NET CSE | October 2020 | Part 2 | Question: 89
Given below are two statements:Statement $I$: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryptionStatement $II$: Diffie-Hellman algori...
go_editor
1.2k
views
go_editor
asked
Nov 20, 2020
Computer Networks
ugcnetcse-oct2020-paper2
computer-networks
network-security
+
–
828
views
2
answers
1
votes
NIELIT 2016 MAR Scientist C - Section C: 38
How many bits are required to encode all twenty six letters, ten symbols, and ten numerals?$5$$6$$7$$46$
admin
828
views
admin
asked
Apr 2, 2020
Computer Networks
nielit2016mar-scientistc
computer-networks
network-security
+
–
3.0k
views
2
answers
0
votes
NIELIT 2017 DEC Scientific Assistant A - Section B: 14
$PGP$ encrypts data by using a block cipher called :international data encryption algorithmprivate data encryption algorithminternet data encryption algorithmnone of the ...
admin
3.0k
views
admin
asked
Mar 31, 2020
Computer Networks
nielit2017dec-assistanta
computer-networks
network-security
+
–
888
views
2
answers
1
votes
NIELIT 2017 DEC Scientific Assistant A - Section B: 49
Why is one - time password safe ?It is easy to generateIt cannot b sharedIt is different for every accessIt can be easily decrypted
admin
888
views
admin
asked
Mar 31, 2020
Computer Networks
nielit2017dec-assistanta
computer-networks
network-security
+
–
2.1k
views
2
answers
2
votes
UGC NET CSE | June 2019 | Part 2 | Question: 89
The ability to inject packets into the Internet with a false source address is known asMan-in-the-middle attackIP phishingIP sniffingIP spoofing
Arjun
2.1k
views
Arjun
asked
Jul 2, 2019
Computer Networks
ugcnetcse-june2019-paper2
network-security
+
–
2.4k
views
1
answers
1
votes
UGC NET CSE | June 2019 | Part 2 | Question: 90
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used ini...
Arjun
2.4k
views
Arjun
asked
Jul 2, 2019
Computer Networks
ugcnetcse-june2019-paper2
network-security
rsa-security-networks
computer-networks
+
–
757
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the firsthalf of the year—between January 1st and June 30th— what is the probability that...
ajaysoni1924
757
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
+
–
501
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, evenif they have never met, share no secrets, and have no certificates(a) Explain how ...
ajaysoni1924
501
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
descriptive
+
–
1.8k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The Diffie-Hellman key exchange is being used to establish a secret key betweenAlice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’ssecret numbe...
ajaysoni1924
1.8k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
+
–
485
views
0
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using public-key cryptography. She establishesa connection to someone she hopes is Bob. She asks him for his public key andhe sends i...
ajaysoni1924
485
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
network-security
tanenbaum
cryptography
+
–
1.1k
views
1
answers
0
votes
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 18 (Page No. 873)
Alice and Bob use RSA public key encryption in order to communicate between them.Trudy finds out that Alice and Bob shared one of the primes used to determine thenumber n...
ajaysoni1924
1.1k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
network-security
rsa-security-networks
tanenbaum
+
–
2.4k
views
2
answers
1
votes
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 17 (Page No. 873)
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26.(a) If p = 5 and q = 13, list five legal values for d.(b) If p = 5, q = 31, and d = 37, find...
ajaysoni1924
2.4k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
rsa-security-networks
+
–
325
views
0
answers
0
votes
DIGITAL CERTIFICATE ( Self Doubts)
I’m not able to distinguish the difference between digital certificate and digital signature… Correct me if there is flaw in my understanding : A Digital Certificate ...
s_dr_13
325
views
s_dr_13
asked
Mar 11, 2019
Computer Networks
network-security
+
–
9.1k
views
6
answers
13
votes
GATE CSE 2019 | Question: 54
In an RSA cryptosystem, the value of the public modulus parameter $n$ is $3007$. If it is also known as that $\phi(n)=2880$ where $\phi()$ denotes Euler’s Totient Funct...
Arjun
9.1k
views
Arjun
asked
Feb 7, 2019
Computer Networks
gatecse-2019
numerical-answers
computer-networks
network-security
out-of-gate-syllabus
2-marks
+
–
719
views
1
answers
0
votes
Ace Test Series: Computer Networks - IP Inverse
Shubhanshu
719
views
Shubhanshu
asked
Jan 19, 2019
Computer Networks
ace-test-series
computer-networks
network-security
+
–
1.8k
views
2
answers
0
votes
UGC NET CSE | December 2018 | Part 2 | Question: 66
Which of the following statement/s is/are true?Firewalls can screen traffic going into or out of an organization.Virtual private networks can stimulate an old leased netw...
Arjun
1.8k
views
Arjun
asked
Jan 2, 2019
Computer Networks
ugcnetcse-dec2018-paper2
network-security
+
–
1.1k
views
2
answers
0
votes
UGC NET CSE | December 2018 | Part 2 | Question: 90
Suppose that everyone in a group of $N$ people wants to communicate secretly with $(N-1)$ other people using symmetric key cryptographic system. The communication between...
Arjun
1.1k
views
Arjun
asked
Jan 2, 2019
Computer Networks
ugcnetcse-dec2018-paper2
computer-networks
network-security
+
–
Page:
1
2
3
4
5
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register