Objective Questions on Network Security and Cryptography

Rajasthan Polytechnic third year paper 2016

Data Processing Assistant Model Paper

If You are appearing in UPSC exam for Data Processing Assistant posts in Information Technology Department, Govt. of NcT of Delhi or in National Crime Records Bureau (NCRB), Women Safety, Ministry of Home Affairs which will be conducting on 30th Jan 2022 at various exam centers and searching the Data Processing Assistant Previous year papers. Then you are at right place. Here we are providing the Data Processing Assistant Model paper on Cryptography,

Rajasthan Polytechnic Third Year Paper 2016 – Introduction to Network Security and Cryptography

In computer security, ________means that computer system assets can be modified only by authorized parties.
(a) Confidentiality
(b) Integrity
(c) Availability
(d) Authenticity

The principle of _______ ensures that only the sender and the intended receipents have access to the contents of a message
(a) Confidentiality
(b) Authentication
(c) Integrity
(d) Access control

The __________attack is related to integrity
(a) Interception
(b) Fabrication
(c) Modification
(d) Interruption

Virus is a computr ________
(a) File
(b) Program
(c) Database
(d) Application software

In __________attacks, the message contents are modified
(a) Passive
(b) Active
(c) Both of the above
(d) None of the above

A _________replicates itself by creating its own copies, in order to bring the network to a halt.
(a) Virus
(b) Worm
(c) Trojan horse
(d) Bomb

DOS attacks are caused by ________
(a) Authentication
(b) Modification
(c) Fabrication
(d) Replay attacks

______________ is a form of virus explicitly designed to hide itself from detection by antivirus software.
(a) Stealth virus
(b) Polymorphic virus
(c) Parasitic virus
(d) Macro virus

The language that we commonly use can be termed as _________
(a) Pure text
(b) Simple text
(c) Plain text
(d) Normal text

The codified language can be termed as __________
(a) Clear text
(b) Unclear text
(c) Code text
(d) Cipher text

Caesar cipher is an example of ________
(a) Substitution cipher
(b) Transposition cipher
(c) Substitution as well as transposition cipher
(d) None of the above

Vernam cipher is also called as __________
(a) Rail fence technique
(b) one time pad
(c) Book cipher
(d) Running key cipher


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *