
- •10. What is Encryption algorithm?
- •35. Which of these is not considered as a symmetric-key algorithm?
- •36. Which of the following statement(s) is(are) properties of public-key encryption?
- •59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.
- •60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
- •61. What is Hacking?
- •62. What is Cracking?
- •63. What is Phreaking?
- •71. Which of the following statements is the definition of ip Spoofing – Source Routing?
- •72. Which of the following statements is the definition of e-mail Spoofing?
- •73. Which of the following statements is the definition of Session Hijackig?
- •82. One of the most famous documented dDoS attacks Back. How does the Back work?
- •83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
- •84. One of the most famous documented dDoS attacks Land. How does the Land work?
- •85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
- •87. In Magic Square cipher what will be the value of magic constant or magic sum m if the key is 17? 2465
- •89. What is Data integrity?
82. One of the most famous documented dDoS attacks Back. How does the Back work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
84. One of the most famous documented dDoS attacks Land. How does the Land work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.
86. Using Magic Square cipher encrypt the message “MAJOR” with the given key 3 and generated magic square .<br/> .M..RJA.O