1. | Consider the two statements. (A) Protection is an internal problem. (B) Security is considered as an external environment within which the system works. Which of the statement is not true? |
Discuss |
Answer: (d).None of the above
|
2. | Which of the following is true ? |
Discuss |
Answer: (c).Both a and b.
|
3. | Program generation activity aims at |
Discuss |
Answer: (a).Automatic generation of program
|
4. | The main reason to encrypt a file is to ______________. |
Discuss |
Answer: (b).Secure it for transmission
|
5. | A public key encryption system |
Discuss |
Answer: (a).Allows only the correct receiver to decode the data
|
6. | A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place. (I) S can launch a birthday attack to replace m with a fraudulent message. (II) A third party attacker can launch a birthday attack to replace m with a fraudulent message. (III) R can launch a birthday attack to replace m with a fraudulent message. |
Discuss |
Answer: (b).(I) only
|
7. | In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the public key of Ais 35. Then the private key of A is ____________. |
Discuss |
Answer: (a).11
|
8. | Which of the following are forms of malicious attack ? |
Discuss |
Answer: (d).All of the mentioned
|
9. | What are common security threats ? |
Discuss |
Answer: (b).File sharing and permission
|
10. | From the following, which is not a common file permission ? |
Discuss |
Answer: (c).Stop
|