Tag: security

Questions Related to security

  1. Carrier Handshake Availability Protocol

  2. ChallengeHandover Authentication Protocol

  3. canonical Handshake Availability Protocol

  4. Challnge Handshake Authentication Protocol


Correct Option: D
  1. Cryptanalysis

  2. crptology

  3. cryptogram

  4. steganography


Correct Option: A
  1. hole in IIS

  2. vulnerability in NETSCAPE

  3. TCP/IP three way Handshake

  4. SCTP fourway Handshake


Correct Option: C
  1. Confidentiality,Integrity and Availability

  2. Confidentiality,Integrity and accessibility

  3. confidentiality Informativity Authentication

  4. Confidentiality Integrity Access Control


Correct Option: A
  1. SYMMETRIC CRYPTOSYSTEM

  2. ASYMETTRIC CRYPTOSYSTEM

  3. HYBRID CRYPTOSYSTEM

  4. NONE


Correct Option: D
  1. Hashed form

  2. Encrypted Form

  3. Plain text form

  4. none


Correct Option: A

Buffer overflows are most dangerous when they occur in programs

  1. Run by the administrator

  2. Run by normal user

  3. Run by the attacker

  4. Run by the remote user


Correct Option: A