Q.1
The value ofmod 7 is(use fermat's theorem)
  • 3
  • 4
  • 8
  • 9
Q.2
Who created PGP?
  • phil zimmermann
  • tim berners-lee
  • marc andreessen
  • ken thompson
Q.3
What is the PGP stand for?
  • permuted gap permission
  • permuted great privacy
  • pretty good privacy
  • none of the mentioned
Q.4
Encryption Strength is based on
  • strength of algorithm
  • secrecy of key
  • length of key
  • all of the above
Q.5
Why did SSL certificate require inHTTP?
  • for making security weak
  • for making information movefaster
  • for encrypted data sent overhttp protocol
  • for sending and receivingemails unencrypted
Q.6
The full form of Malware is
  • malfunctioned software
  • multipurpose software
  • malicious software
  • malfunctioning of security
Q.7
Which of the following is not a type of symmetric-key cryptography technique?
  • caesar cipher
  • data encryption standard (des)
  • diffie hellman cipher
  • playfair cipher
Q.8
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfersthe cookie to that website.
  • true
  • false
Q.9
Which of the following is a non-technicaltype of intrusion or attack technique?
  • reverse engineering
  • malware analysis
  • social engineering
  • malware writing
Q.10
In RSA, Ф(n) = in terms of p and q
  • (p)/(q)
  • (p)(q)
  • (p-1)(q-1)
  • (p+1)(q+1)
Q.11
SSL primarily focuses on
  • integrity and authenticity
  • integrity and non-repudiation
  • authenticity and privacy
  • confidentiality and integrity
Q.12
Which of them is an example ofgrabbing email information?
  • cookie stealing
  • reverse engineering
  • port scanning
  • banner grabbing
Q.13
What is the block size of RC6 Feistel block cipher?
  • 5013 bits
  • 128 bits
  • 596 bits
  • 1768 bits
Q.14
USENET falls under which category of public key sharing?
  • public announcement
  • publicly available directory
  • public-key authority
  • public-key certificates
Q.15
Elliptic curve cryptography follows the associative property
  • true
  • false
Q.16
What is the key size allowed in PGP?
  • 1024-1056
  • 1024-4056
  • 1024-4096
  • 1024-2048
Q.17
Which of them is not an ideal way ofspreading the virus?
  • infected website
  • e-mails
  • official antivirus cds
  • usbs
Q.18
What are email security services?
  • confidentiality
  • authentication
  • non-repudation of origin
  • all of the above
Q.19
Which of them is not an ideal way ofspreading the virus?
  • infected website
  • e-mails
  • official antivirus cds
  • usbs
Q.20
How many real and imaginary roots does the equation y2=x3-have
  • 2 real, 1 imaginary
  • all real
  • all imaginary
  • 2 imaginary, 1 real
0 h : 0 m : 1 s