What is the Most Suuccessful attack on AES
Key analysis
Plain text
Public key over ride
interception
What is Serpent algorithm famous for in the World of Cryptography
Variable Key mechanism
Round key mechanism
Data security mechanism
Data integrity Mechanism
AES uses which of the following mechanism for encyption
Round Key
Variable Key
Plain Key
Public Key
Up to how much bits(MAX) of Encyption is a normal civilian allowed to use in INDIA
148
80
192
134
Which testing requires access to the source code?
Black Box Testing
Smoke Testing
Sanity check
White Box Testing
Which of the following is most critical for effective implementation of security
Defining and communicating individual roles, responsibilities and authorities
Having regular external audit of security implementation
User training
Senior management is well versed with technological aspects of security
Which of the following is NOT a type of system backup?
Incremental
Sequential
Full
Differential
Which term often means a piece of code left behind in the system that will allow the original programmer back into the system?
Flap Jack
Trap Door
Unicode
Stealth code
As a security precaution, visitors are escorted by a pre-designated responsible employee or security staff. Which of the following would be classified as visitors?
Vendors only
Vendors and maintenance personnel only
Vendors, maintenance personnel and contract workers only
Vendors, maintenance personnel, contract workers and auditors only
If a program is written using mnemonics and op-codes then the program is in
Machine language
Assembly level language
Procedural language
Non Procedural language