Filters
Question type

Study Flashcards

_________is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.


A) email security
B) email hacking
C) email protection
D) email safeguarding

Correct Answer

verifed

verified

A

PGP system uses


A) private key system
B) public key system
C) private & public key system
D) none of the mentioned

Correct Answer

verifed

verified

In public key cryptosystem_______ keys are used for encryption and decryption.


A) same
B) different
C) encryption keys
D) none of the mentioned

Correct Answer

verifed

verified

B

Which of them is an example of grabbing email information?


A) cookie stealing
B) reverse engineering
C) port scanning
D) banner grabbing

Correct Answer

verifed

verified

In Elgamal cryptosystem, given the prime p=31,What is the respective plaintext character for C = (27, 20) ?


A) h
B) l
C) o
D) m

Correct Answer

verifed

verified

There are________major ways of stealing email information.


A) 2
B) 3
C) 4
D) 5

Correct Answer

verifed

verified

Which of them is not a major way of stealing email information?


A) stealing cookies
B) reverse engineering
C) password phishing
D) social engineering

Correct Answer

verifed

verified

In a trapdoor function, the functions are easy to go in


A) one direction
B) two directions
C) all directions
D) none of the mentioned

Correct Answer

verifed

verified

A set of numbers is called as super increasing if


A) each element is greater than previous element
B) each element greater than sum of all the previous elements
C) each element greater than the average of all elements
D) each element lesser than the sum of all the elements

Correct Answer

verifed

verified

------------ is the technique used for tricking users to disclose their username and passwords through fake pages.


A) social engineering
B) phishing
C) cookie stealing
D) banner grabbing

Correct Answer

verifed

verified

A cryptographic hash function has variable output length.

Correct Answer

verifed

verified

In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is 2P if P = (4, 3.464)


A) (12.022, -39.362)
B) (32.022, 42.249)
C) (11.694, -43.723)
D) (43.022, 39.362)

Correct Answer

verifed

verified

How many real and imaginary roots does the equation y2=x3-4x have


A) 2 real, 1 imaginary
B) all real
C) all imaginary
D) 2 imaginary, 1 real

Correct Answer

verifed

verified

Which algorithm can be used to sign a message?


A) public key algorithm
B) private key algorith
C) public & private key algorithm
D) none of the mentioned

Correct Answer

verifed

verified

Unsolicited Bulk E-mails (UBI) are called


A) sms
B) mms
C) spam emails
D) malicious emails

Correct Answer

verifed

verified

Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as________details and passwords.


A) credit card, antivirus name
B) credit card, login id
C) cell phone, antivirus name
D) car model, account id

Correct Answer

verifed

verified

Using email hacking illicit hackers can send & spread______virus________and spam emails.


A) trojans, redirected malicious urls
B) antivirus, patches
C) cracked software, redirected malicious urls
D) malware, security patches

Correct Answer

verifed

verified

"In ECC, the inverse of point P =(x1, y1) is Q = (-x1, y1). "

Correct Answer

verifed

verified

False

In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0) ?


A) (15, -56)
B) (-23, -43)
C) (69, 26)
D) (12, -86)

Correct Answer

verifed

verified

In public key cryptosystem which is kept as public?


A) encryption keys
B) decryption keys
C) encryption & decryption keys
D) none of the mentioned

Correct Answer

verifed

verified

Showing 1 - 20 of 25

Related Exams

Show Answer