Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1.. In the above figure from left to right, the correct order of the shaded levels are
a) Network level, Application level, Transport level
b) Application level, Network level, Transport level
c) Transport level, Application level, Network level
d) Network level, Transport level, Application level
Ans D
5. Which protocol is used to convey SSL related alerts to the peer entity?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
d) Change Cipher Spec Protocol
Ans A
6.“When there is a lack of a central point of control.” Which type of Wireless network threat would you
classify this under?
a) Man in the middle attack
b) Identity Theft
c) Ad Hoc Networks
d) Non-Traditional Networks
Ans C
10. Reliable data delivery and Wireless access control protocols are functions of which layer?
a) Physical Layer
b) Logic Link Control Layer
c) Medium Access Layer
d) None of the mentioned
Ans C
11. ___________ services are used to control IEEE 302.11 LAN access and confidentiality.
a) 4
b) 5
c) 2
d) 3
Ans D
12. A __________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope
of IEEE 802.11i.
a) pre-shared key
b) pairwise transient key
c) master session key
d) key conformation key
Ans A
13. “When bogus reconfiguration commands are used to affect routers and switches to degrade network
performance.” Which type of Wireless network threat would you classify this under?
a) Network Injection
b) Malicious Association
c) Man in the middle attack
d) Denial Of Service
Ans A
15. Mobile Device security falls under 3 categories. Which of these is not a valid Mobile Device security
category?
a) Barrier security
b) Traffic security
c) Device security
d) All of the above
Ans d
Unit – 5
4. The processed S/MIME along with security related data is called as ________.
a. public key cryptography standard.
b. private key cryptography standard.
c. S/MIME.
d. MIME.
Ans A
6. Which process will ensure that the issues of the credit card is an approved
transactions?
a. Payment capture.
b. Payment authorization.
c. Purchase request.
d. Purchase reply.
Ans B.
8. A four layer semiconductor device that conducts current in one direction when activated by a sufficient
amount of light and continues to conduct until current falls below a specified value is called
1. LASER
2. LASCR
3. Photodiode
4. LED
Ans B
Ans C
Ans B.
A) RSA
B) DES
C) Rabin
D) None of these
Ans: A
12. In the lower layer of SSL, ______ is used for transferring data using a variety of predefined cipher and
Message Authentication Code [NPTEL]
Ans: C
15. PGP offers _____ block ciphers for message encryption. [NPTEL]
A) Triple DES
B) CAST-128
C) IDEA
D) All of the mentioned
Ans: D3