Question
a.
Smurfing
b.
Denial of service
c.
E-mail bombing
d.
Ping storm
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. A technique in which a program attacks a network by exploiting IP broadcast addressing operations.
Similar Questions
Discover Related MCQs
Q. An attack in which the user receives unwanted amount of e-mails.
View solution
Q. These ciphers replace a character or characters with a different character or characters, based on some key.
View solution
Q. Encryption is the study of creating and using decryption techniques.
View solution
Q. A type of cipher that uses multiple alphabetic strings.
View solution
Q. An encryption technique with 2 keys is ______________
View solution
Q. In public key cryptography, a key that decrypts the message.
View solution
Q. DES stands for?
View solution
Q. Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption.
View solution
Q. Triple-DES has ______ keys.
View solution
Q. Encryption standard that is selected by the US government to replace DES.
View solution
Q. An electronic document that establishes your credentials when you are performing transactions.
View solution
Q. ___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.
View solution
Q. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
View solution
Q. Which of the following is not a property of good encryption technique ?
View solution
Q. In which of the following encryption key is used to encrypt and decrypt the data ?
View solution
Q. Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________
View solution
Q. Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?
View solution
Q. Which of the following requires no password travel across the internet ?
View solution
Q. Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?
View solution
Q. Which is the largest disadvantage of the symmetric Encryption?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!