Data Processing Assistant Question Paper on Network Security

Data Processing Assistant Model Paper

If You are appearing in UPSC exam for Data Processing Assistant posts in Information Technology Department, Govt. of NcT of Delhi or in National Crime Records Bureau (NCRB), Women Safety, Ministry of Home Affairs which will be conducting on 30th Jan 2022 at various exam centers and searching the Data Processing Assistant Previous year papers. Then you are at right place. Here we are providing the Data Processing Assistant Model paper on Network Security

Solapur University MCA (Semester-V) Paper on Network Security  March 2019

If you are already applied for STQC Scientific Assistant post and preparing the NIELIT STQC Scientific Assistant Exam 2021, then this article is very useful to you. As per the NIELIT STQC Scientific Assistant Syllabus Network Security is a part of syllabus. Our team are providing the Objective Questions on Network Security topic for NIELIT Scientific Assistant Exam preparation.

Sr. No. Question
1 _________identifies a security association.(a)    Sequence Number

(b)   Security parameters Index

(c)    Payload Data (variable)

(d)   None of these

2 ________ indicates the number of pad bytes immediately preceding this field.(a)    Pad length (8 bits)

(b)   Next header (8 bits)

(c)    Authentication data (variable)

(d)   None of these

3 _______an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.(a)    Clandestine user

(b)   Misfeasor

(c)    Masquerader

(d)   None of these

4 __________involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.(a)    Modifications of message

(b)   Replay

(c)    Masquerade

(d)   Denial of service

5 __________ is an open-source freely available software package for e-mail security.(a)    TCP

(b)   IBM

(c)    Windows

(d)   PGP

6 ______prevents either sender or receiver from denying a transmitted message.(a)    Data confidentiality

(b)   Nonrepudiation

(c)    Access control

(d)   Data integrity

7 The numbers of subkeys generated in IDEA algorithm are ______(a)    54

(b)   48

(c)    52

(d)   50

8 ____________description of a packet encryption extension to IPv4 and IPv6.(a)    RFC 2401

(b)   RFC 2402

(c)    RFC 2408

(d)   RFC 2406

9 SET stands for _________(a)    Secure Electronic Transaction

(b)   Secure Encryption Transmission

(c)    Sequential Electronic Transaction

(d)   Serial Encryption Transaction

10 Typically, PKI implementation makes use of ______(a)    Digital signature

(b)   X.5090 certificates

(c)    Biometric

(d)   None of these

11 _________Anything to which access is controlled. Examples include files, portions of files, programs, and segments of memory.(a)    Object

(b)   Subject

(c)    Access right

(d)   None of these

12 ________ determines the direction in which particular service requests may initiated and allowed to flow through the firewall.(a)    Service control

(b)   Behavior control

(c)    User control

(d)   Direction control

13 A nonnegative integer that may be incremented or decremented typically it is used to measure the current value of some entity.(a)    Gauge

(b)   Interval timer

(c)    Counter

(d)   Resource utilization

 14 A ____model focuses on time intervals, looking for sequences of events that happen too rapidly or too slowly.(a)    Multivariate

(b)   Markov process

(c)    Time series

(d)   Operational

Published on 6th Oct 2021
Last Updated on – 10th Nov 2021

Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *