Rajasthan Polytechnic third year paper 2016
Data Processing Assistant Model Paper
If You are appearing in UPSC exam for Data Processing Assistant posts in Information Technology Department, Govt. of NcT of Delhi or in National Crime Records Bureau (NCRB), Women Safety, Ministry of Home Affairs which will be conducting on 30th Jan 2022 at various exam centers and searching the Data Processing Assistant Previous year papers. Then you are at right place. Here we are providing the Data Processing Assistant Model paper on Cryptography,
Rajasthan Polytechnic Third Year Paper 2016 – Introduction to Network Security and Cryptography
In computer security, ________means that computer system assets can be modified only by authorized parties.
(a) Confidentiality
(b) Integrity
(c) Availability
(d) Authenticity
The principle of _______ ensures that only the sender and the intended receipents have access to the contents of a message
(a) Confidentiality
(b) Authentication
(c) Integrity
(d) Access control
The __________attack is related to integrity
(a) Interception
(b) Fabrication
(c) Modification
(d) Interruption
Virus is a computr ________
(a) File
(b) Program
(c) Database
(d) Application software
In __________attacks, the message contents are modified
(a) Passive
(b) Active
(c) Both of the above
(d) None of the above
A _________replicates itself by creating its own copies, in order to bring the network to a halt.
(a) Virus
(b) Worm
(c) Trojan horse
(d) Bomb
DOS attacks are caused by ________
(a) Authentication
(b) Modification
(c) Fabrication
(d) Replay attacks
______________ is a form of virus explicitly designed to hide itself from detection by antivirus software.
(a) Stealth virus
(b) Polymorphic virus
(c) Parasitic virus
(d) Macro virus
The language that we commonly use can be termed as _________
(a) Pure text
(b) Simple text
(c) Plain text
(d) Normal text
The codified language can be termed as __________
(a) Clear text
(b) Unclear text
(c) Code text
(d) Cipher text
Caesar cipher is an example of ________
(a) Substitution cipher
(b) Transposition cipher
(c) Substitution as well as transposition cipher
(d) None of the above
Vernam cipher is also called as __________
(a) Rail fence technique
(b) one time pad
(c) Book cipher
(d) Running key cipher
Leave a Reply