1. The MD5 is a message digest algorithm developed by ______.
a. Ron Rivest.
b. WhiteField Diffie.
c. Martin Hellman.
d. Diffie-Hellman.
Answer: A.
2. The original message digest algorithm is called as _______.
a. MAC.
b. SHA.
c. MD.
d. DSA.
Answer: C.
3. MD5 is quite fast and produces ________ message digests.
a. 512 bits.
b. 1024 bits.
c. 128 bits.
d. 64 bits.
Answer: C.
4. The first step of MD5 is __________.
a. add padding bits to original messsge.
b. adding append length bits.
c. divide the input into 512 bit blocks.
d. compression.
Answer: A.
5. In MD5, the process block divides the 512 bits into ________ sub blocks.
a. 16.
b. 24.
c. 32
d. 84.
Answer: A.
6. Which financial institutions have a relationship with merchants for processing payment
card authorizations and payments?
a. Issuer.
b. Acquirer.
c. Merchant.
d. Dealer.
Answer: B.163E-NETWORK SECURITY
2
7. Which of the following contains the order information such as which items are being
purchased?
a. PI.
b. OI.
c. MD.
d. DS.
Answer: B.
8. The purchase request exchange is made up of _______ messages.
a. 2.
b. 3.
c. 4.
d. 5.
Answer: C.
9. The payment gateway sends back an _________ message to the merchant.
a. authorization response.
b. request.
c. no response.
d. acknowledgement.
Answer: A.
10. Payment information can be encrypted by using ________.
a. customer’s private key.
b. merchant public key.
c. one-time session key.
d. customer’s public key.
Answer: C.
11. Digital signature envelope is decrypted by using _________.
a. merchant private key.
b. payment’s private key.
c. payment public key.
d. merchant’s public key.
Answer: B.
12. __________ will ensure the merchant and their payment information.
a. Digital certificate.
b. Merchant.
c. Dual signature.
d. Certificate authority.
Answer: C.
13. SET provides an authentication with the help of ____________.
a. dual signature.
b. digital certificate.
c. payment’s public key.
d. payment’s private key.
Answer: B.163E-NETWORK SECURITY
3
14. _________ helps in ensuring non-fraudulent transactions on the web.
a. Certificate authority
b. Digital authority.
c. Dual authority.
d. Digital signature.
Answer: A.
15. SSL is placed in between the ________ layers.
a. transport & datalink.
b. application & presentation.
c. application & transport.
d. application & session.
Answer: C.
16. SSL is used to encrypt the ___________.
a. L5 data.
b. L4 data.
c. L3 data.
d. L2 data.
Answer: A.
17. SSL provides only ___________.
a. authentication.
b. confidentiality.
c. integrity.
d. durability.
Answer: A.
18. ___________are very crucial for success of RSA algorithm.
a. Integers.
b. Prime numbers.
c. Negative number.
d. Fraction.
Answer: B.
19. In the basic TCP/IP protocol suite, the number of layers used are _________.
a. 4.
b. 6.
c. 5.
d. 7.
Answer: A.
20. Physical layer transmits the data in TCP/IP as _________.
a. packets.
b. pulse codes.
c. data.
d. bits.
Answer: B.163E-NETWORK SECURITY
4
21. S/MIME stands for ____________.
a. standard multipurpose internet mail extensions.
b. secure multipurpose internet mail extensions.
c. secure multipurpose international mail extensions.
d. standard multipurpose international mail extensions.
Answer: B.
22. _________ uniquely identifies the MIME entities uniquely with reference to multiple
contexts.
a. Content description.
b. Content -id.
c. Content type.
d. Content transfer encoding.
Answer: B.
23. The processed S/MIME along with security related data is called as ________.
a. public key cryptography standard.
b. private key cryptography standard.
c. S/MIME.
d. MIME.
Answer: A.
24. In S/MIME,MLA stands for __________.
a. mailing list agent.
b. multipurpose list agent.
c. mail lock agent.
d. message link agent.
Answer: A.
25. The cryptography algorithms used in S/MIME are _________.
a. IDEA.
b. RC4.
c. RSA,DES-3.
d. RC5.
Answer: C.
26. The __________ acts as financial institutions who provides a payment card to a card
holder.
a. payment gateway.
b. card holder.
c. acquirer.
d. issuer.
Answer: D.
27. Who will be responsible for processing the payment from the customer’s account to
the merchant account?
a. Acquirer.
b. Merchant.
c. Issuer.
d. Payment gateway.
Answer: D.163E-NETWORK SECURITY
5
28. The cardholder combines the PIMD and OIMD and hashes them together to form
________.
a. OPMD.
b. POMD.
c. MD.
d. DS.
Answer: B.
29. Which process will ensure that the issues of the credit card is an approved
transactions?
a. Payment capture.
b. Payment authorization.
c. Purchase request.
d. Purchase reply.
Answer: B.
30. _________ is used for hiding the payment information from the merchant.
a. SET.
b. SSL.
c. SHTTP.
d. TSP.
Answer: A.
31. _________ is a block cipher.
a. DES.
b. IDEA.
c. AES.
d. RSA.
Answer: A.
32. DES encrypts data in block size of __________ bits each.
a. 64.
b. 128.
c. 32.
d. 56.
Answer: A.
33. Merkle and Hellman introduced the concept of ________.
a. meet in middle attack.
b. meet in attack.
c. hijack.
d. virus attacks.
Answer: A.
34. Data Encryption Standard also called as __________.
a. Data Encryption Algorithm.
b. Double DES.
c. AES.
d. RSA.
Answer: A.163E-NETWORK SECURITY
6
35. __________ is generally used in ECB,CBC, or CFB mode.
a. DES
b. AES
c. IDEA
d. RSA.
Answer: A.
36. DES consists of __________ rounds to perform the substitution and transposition
techniques.
a. 16.
b. 18.
c. 21.
d. 25.
Answer: A.
37. _________is the first step in DES.
a. Key transformation.
b. Expansion permutation.
c. S-box substitution.
d. P-box substitution.
Answer: A.
38. ___________ substitution is a process that accepts 48 bits from the XOR operation.
a. S-box.
b. P-box.
c. Expansion permutations.
d. Key transformation.
Answer: A.
39. __________ refers more to asymmetric key cryptography.
a. Timing attack.
b. Meet in middle attack.
c. Virus attack.
d. Worms attack.
Answer: A.
40. Eli Biham & Adi Shamir introduced ___________.
a. differential & linear cryptoanalysis.
b. Double DES.
c. DES.
d. RSA.
Answer : A.
41. Electronic money is also called as _______________.
a. digital cash.
b. internet cash.
c. eucash.
d. physical cash.
Answer: A.163E-NETWORK SECURITY
7
42. The physical form of money is converted into ___________.
a. octal form.
b. hexadecimal.
c. decimal.
d. binary form.
Answer: D.
43. The bank ___________the customer’s message after getting the email request for emoney.
a. integrate.
b. access.
c. authenticates.
d. non-repudiate.
Answer: C.
44. The encryption of an original message can be done __________.
a. only once.
b. twice.
c. thrice.
d. many times.
Answer: B.
45. Customer uses ____________ key for decryption.
a. public key.
b. private key.
c. secret key.
d. hash key.
Answer: B.
46. E-money is classified into __________types.
a. 3.
b. 2.
c. 4.
d. 5.
Answer: B.
47. The bank can trace the transaction using ___________money.
a. anonymous.
b. identified.
c. physical.
d. rational.
Answer: B.
48. In anonymous e-money ___________ factor is used to encrypt the random number.
a. blinded.
b. prince.
c. prime.
d. anonymity.
Answer: A.

Leave a Reply

Subscribe to Posts | Subscribe to Comments

All Notes on BCA

All Notes  on BCA
BCA all subjects notes

Total Pageviews

Translate

Powered by Blogger.

Copyright © All Notes on BCA