Here are the answers to your updated set of questions:
1. Which of the following is passive attack?
c. Release of message contents
2. Which of the following is asymmetric key crypto system?
c. RSA
3. Plaintext converted into ciphertext is called
b. Encryption
4. IP Sec is designed to provide security at the
d. Network Layer
5. Which of the following is protocol for email security?
a. PGP
6. Physical and logical sub-network that separates an internal LAN from another untrusted network like the internet is called
b. DMZ
7. WPA stands for?
c. Wi-Fi Protected Access
8. What is the block size of DES?
d. 64-bit
9. Which of the following is network monitoring protocol?
c. SNMP
10. Which of the following is a program that copies itself throughout a computer or network?
a. Worms
No comments:
Post a Comment