Online Technical Quiz Competition conducted by Prof. R. H. Rathod, Computer Eng. Deptt.
Trojan Horse
Worm
Virus
Zombie
Rate this question:
Logitech
Netscape
LG
AMD
Rate this question:
Password based
Challenge response
Encryption based
None
Rate this question:
Message Authentication
Message Confidentiality
Entity Authentication
None
Rate this question:
Fixed and Variable
Fixed and One time
Time stamped and Fixed
None of the Above
Rate this question:
Cryptography
Cryptology
Cryptanalysis
None of the this
Rate this question:
Substitution & Transposition
Symmetric & Asymmetric
Encryption & Decryption
None of these
Rate this question:
Qhwzrun vhfxulwb
Qhwavwr vhfxvmxc
Qhwrvwx vhewulzf
Qhwvwxr vhevwmae
Rate this question:
Asymmetric key
Private key
Symmetric key
All of these
Rate this question:
Performance
Reliability
Security
None of these
Rate this question:
Public key
Private key
Asymmetric key
Symmetric key
Rate this question:
1 and 2
1 and 3
2 and 3
All 1 to 3
Rate this question:
64 ; 56
64 ; 48
48 ; 32
32 ; 32
Rate this question:
Using 56 bit key
Discarding every 8th bit of 64 bit key
Adding 8th bit of 56 bit key
None
Rate this question:
Symmetric key cryptography
Asymmetric key cryptography
Rate this question:
THTFAOAEAESYMYSTSA
STSATHTFAOAEYMYAES
THTFAOAESTSAAESYMY
AOAESTSATHTFYMYAES
Rate this question:
VRZURVZGS
UQXTQUYFR
TPWSPTXEQ
WSZVSWAHT
All the traffic should pass through the firewall
The firewall should allow only authorized traffic
The firewall itself can stop attacks
The firewall should detect viruses
Rate this question:
Screened subnet firewall
Screened Host Firewall, Dual-Homed Bastion
Screened Host Firewall, Single-Homed Bastion
None
Rate this question:
Physical layer
Data link layer
Network layer or Transport layer
Application layer
Rate this question:
HIDS
NIDS
Anomaly detection HIDS
Signature-based NIDS
Rate this question:
The host operating system logs in the audit information
Logs includes logins, file opens and program executions
Logs are analyzed to detect tails of intrusion
All of the mentioned
Rate this question:
Unselective logging of messages may increase the audit burdens
Selective logging runs the risk of missed attacks
They are very fast to detect
They have to be programmed for new patterns
Rate this question:
They look for attack signatures in network traffic
Filter decides which traffic will not be discarded or passed
It is programmed to interpret a certain series of packet
It models the normal usage of network as a noise characterization
Rate this question:
Phishing
Dumpster diving
Denial of Service (DoS)
Shoulder surfing
Rate this question:
True
False
Rate this question:
Authentication
Authorization
Encryption
None
Rate this question:
True
False
Rate this question:
User, AS, TGS, SS
User, CA, TGT, SS
User, CS, PGT, SS
None
Rate this question:
Encrypt, Transport, Application
Transport, Application, Network
Transport, Datalink, Session
None of this
Rate this question:
Rate this question:
Rate this question:
Simple Mail Transmission Protocol
Simple Mail Transfer Protocol
Simple Mail Transaction Protocol
None of this
Rate this question:
Rate this question:
Canonical conversion, digital signature, compression, enveloping
Canonical conversion, digital signature, envelopingg, base 64 encoding
Canonical conversion, digital signature, base 64 encoding, compression
Canonical conversion, digital signature, encryption, base 64 encoding
Plagiarism
Intellectual property rights
Piracy
All of these
Rate this question:
X.508
X.509
D.509
None of these
Rate this question:
Message digest
Digital Signature
Decryption algorithm
All of these
Rate this question:
Users public key
Users private key
Its own public key
Its own private key
Rate this question:
Rate this question:
A vulnerability in the software that allows someone to bypass the normal authentication process
It is a known bug or exploit hackers use to cause software to behave in a way that was not intended by the manufacturer
It is where viruses store their source code and begin to replicate
It is a way for spyware to leave a system without any trace of it being there
Rate this question:
A encrypts message using his /her private key
A encrypts message using his /her public key
A encrypts message using B’s private key
A encrypts message using B’s public key
Rate this question:
Credit card fraudulent
Spying someone using keylogger
IPR Violation
None of the above
Rate this question:
Exploit a weakness in the TCP/IP stack
To execute a Trojan on a system
To overload a system so it is no longer operational
To shutdown services by turning them off
Rate this question:
India’s Technology (IT) Act, 2000
India’s Digital Information Technology (DIT) Act, 2000
India’s Information Technology (IT) Act, 2000
The Technology Act, 2008
Rate this question:
Any crime that uses computers to jeopardise or attempt to jeopardise national security
Any crime that involves computers and networks
The use of computer networks to commit financial or identity fraud
The theft of digital information
Rate this question:
It is a supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks.
Cobit components include a framework to organize IT governance objectives and good practices by IT domains and processes, and link them to business requirements.
Process descriptions provide a reference process model and common language for everyone in an organization.
All of this
Rate this question:
True
False
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.