Share this Post

a) server
b) client
c) client after the sever
d) a third party

a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) unless the server is disconnected

a) inter-process communication
b) a single process
c) a single thread
d) a single stream

a) its own address space
b) another address space
c) both its own address space and another address space
d) applications address space

a) on the same computer
b) on different computers connected with a network
c) on the same computer and also on different computers connected with a network
d) on none of the computers

a) program number
b) version number
c) procedure number
d) all of the mentioned

a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned

a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) establish a server on remote machine that can respond to queries and retrieve information by calling a query
d) to secure the client

a) synchronous operation
b) asynchronous operation
c) time independent operation
d) channel specific operation

a) server stub
b) client stub
c) client operating system
d) client process

a) Secret key cryptography
b) Public key cryptography
c) Conventional encryption
d) Private key cryptography

a) KVIIY LIV
b) KVIIX LIV
c) LWJJY MJW
d) JUHHW KHU

a) TKMTTEATAEEOHPRY
b) TAKEMETOTHEPARTY
c) TAEKMEOTTHPEARYT
d) YRPHOEEATAETTMKT

a) Transposition and substitution
b) Classical and modern
c) Stream and Block
d) Classical and Block

a) DES
b) RC4
c) AES
d) Diffie-Hellman

a) (N(N-1))/2 keys are required for N people
b) sharing secret key over communication channel
c) Brute force attack for small key size
d) Quick encryption and decryption

a) It uses common key for both encryption and decryption
b) It is a secret key cryptography
c) It uses single fixed length key for each algorithm
d) Symmetric key can be combined with asymmetric key to achieve more security

a) Quick encryption
b) Less computational power
c) High level of security
d) Transmission of secret key

a) Data security
b) Cloud storage
c) User privacy
d) Bitcoin’s block chain

a) True
b) False

a) Secret key and private key
b) Private key and public key
c) Public key and secured key
d) Secured key and private key

a) Rivest, shamir, Aldleman
b) Routest, Shamir, adem
c) Robert, shamuel, alice
d) Radmir, shadhur, Alice

a) RSA algorithm
b) AES algorithm
c) 3DES algorithm
d) Knapsack algorithm

a) Uses different keys
b) Every user has a unique private key
c) Public key can be same for number of users
d) Cannot deduce private key from public key

a) RSA, EIGamal, Elliptic curve cryptography
b) Elliptic curve, RSA
c) RSA, EIGamal
d) EIGmal, RSA

a) It is efficient for decryption
b) Lengthy keys are required for more security
c) It is not efficient for encryption
d) It is not popular

a) DES
b) AES
c) RC4
d) RSA

a) Used over RSA
b) Uses elliptic curve theory
c) Key length is larger than RSA
d) Uses discrete logarithms

a) No need of key distribution
b) Security
c) Using digital signatures
d) Used to decrypt small messages

a) True
b) False

a) H = M(N)
b) M = H(N)
c) N = H(M)
d) N = M(H)

a) Apparently random hash values
b) Evenly distributed hash values
c) Apparently random and evenly distributed values
d) Evenly distributed but not apparently random values

a) Integrity
b) Authenticity
c) Confidentiality
d) Security


Share this Post

Leave a Reply

Your email address will not be published. Required fields are marked *