1.Signature matching techniques are not capable to detect metamorphic malwares.
Select one:
True{correct}
False
2.ESP provides both message content confidentiality and authentication.
Select one:
True {correct}
False
3.DSA security level is 120 bit.
Select one:
True
False{correct}
4.Signature matching technique can be used to detect metamorphic malware.
Select one:
True
False{correct}
5.Digital signature only provide non-repudiation.
Select one:
True
False {correct}
6.In key agreement two or more parties jointly generate a secret key.
Select one:
True {correct}
False
7.In PGP signature is generated after encryption.
Select one:
True
False{correct}
8.In PGP signature is generated before encryption.
Select one:
True {correct}
False
9.SSL/TLS works below the TCP layer
Select one:
True
False{correct}
10.Kerberos is not scalable.
Select one:
True
False{correct}
11.SSL provides security at IP layer.
Select one:
True
False {correct} //at application layer
12.Default BLOCK/DROP action is good to set in firewall.
Select one:
True
False {correct}
13.RSA signature verification is less efficient then DSA.
Select one:
True
False{correct}
14.SSL is originally designed by google.
Select one:
True
False{correct} // by netscape
15.Without certificate Diffe-Hellman key exchange is vulnerable to MIM attack.
Select one:
True {correct}
False
16.Digital signature only provide Authentication.
Select one:
True
False{correct}
17.S/MIME provides security at application layer.
Select one:
True{correct}
False
18.In key agreement one party generates and distributes a secret key.
Select one:
True
False{correct}
19.In key transport two or more parties jointly generate a secret key.
Select one:
True
False{correct}
20.AH provides message content confidentiality.
Select one:
True
False{correct}
21.Default ACCEPT action is good to set in firewall.
Select one:
True
False{correct}
22.RSA signature verification is more efficient then DSA.
Select one:
True{correct}
False
23.Firewalls insulates the internal network from external network.
Select one:
True{correct}
False
24.Modulus of the DHKE can be a composite number.
Select one:
True
False{correct}
25.In key transport one party generates and distributes a secret key.
Select one:
True{correct}
False
Select one:
True{correct}
False
2.ESP provides both message content confidentiality and authentication.
Select one:
True {correct}
False
3.DSA security level is 120 bit.
Select one:
True
False{correct}
4.Signature matching technique can be used to detect metamorphic malware.
Select one:
True
False{correct}
5.Digital signature only provide non-repudiation.
Select one:
True
False {correct}
6.In key agreement two or more parties jointly generate a secret key.
Select one:
True {correct}
False
7.In PGP signature is generated after encryption.
Select one:
True
False{correct}
8.In PGP signature is generated before encryption.
Select one:
True {correct}
False
9.SSL/TLS works below the TCP layer
Select one:
True
False{correct}
10.Kerberos is not scalable.
Select one:
True
False{correct}
11.SSL provides security at IP layer.
Select one:
True
False {correct} //at application layer
12.Default BLOCK/DROP action is good to set in firewall.
Select one:
True
False {correct}
13.RSA signature verification is less efficient then DSA.
Select one:
True
False{correct}
14.SSL is originally designed by google.
Select one:
True
False{correct} // by netscape
15.Without certificate Diffe-Hellman key exchange is vulnerable to MIM attack.
Select one:
True {correct}
False
16.Digital signature only provide Authentication.
Select one:
True
False{correct}
17.S/MIME provides security at application layer.
Select one:
True{correct}
False
18.In key agreement one party generates and distributes a secret key.
Select one:
True
False{correct}
19.In key transport two or more parties jointly generate a secret key.
Select one:
True
False{correct}
20.AH provides message content confidentiality.
Select one:
True
False{correct}
21.Default ACCEPT action is good to set in firewall.
Select one:
True
False{correct}
22.RSA signature verification is more efficient then DSA.
Select one:
True{correct}
False
23.Firewalls insulates the internal network from external network.
Select one:
True{correct}
False
24.Modulus of the DHKE can be a composite number.
Select one:
True
False{correct}
25.In key transport one party generates and distributes a secret key.
Select one:
True{correct}
False
Hi, Any reference for this answer ?
ReplyDeleteDefault BLOCK/DROP action is good to set in firewall