1.
[ ]
Which of the following contains the order information such as which items are
being Purchased?
(a)PI (b)OI (c)MD (d)DS
2. [ C ]
The original message digest algorithm is called as
(a)MAC (b)SHA (c)MD (d)DSA
3. ________________helps in ensuring non-fraudulent transactions on the web. [ D ]
(a)Certificate authority (b)Digital authority
(C)Dual authority (D)Digital signature
4. SSL is placed in between the layers. [ B ]
(a)Transport & data link (b) Application & presentation
(c)Application & transport (d)Application & session
5. SSL is used to encrypt the . [ A ]
(a)L5data (b)L4data (c)L3 data (d)L2data
6. SET provides an authentication with the help of . [ ]
(a)Dual signature (b) Digital certificate
(c)Payment’s public key (d)Payment’s private key
7. [ B ]
S/MIME stands for
(a) Standard multi purpose internet mail extensions
(b) Secure multi purpose internet mail extensions
(c) Secure multi purpose international mail extensions
(d) Standard multi purpose international mail extensions
8. [ B ]
Uniquely identifies the MIME entities uniquely with reference to multiple
Contexts
(a) Content description (b) Content-id
(c)Content type (d) Content transfer coding
9. The processed S/MIME along with security related data is called as [ C ]
(a) Public key cryptography standard
(b) Private key cryptography standard
(c) S/MIME (d). MIME
10 In S/MIME, MLA stands for . [ A ]
.
A. Mailing list agent B. Multi purpose list agent
C. Mail lock agent D. Message link agent
II. Fill in the blanks
11. ___Cryptology_________is the study of cryptography and cryptanalysis together.
12. In ____Symmetric________________only one key issued for encryption and decryption.
13._______ digital signature____is an authentication mechanism that enables the creator of a
message to attach a code that acts as a signature.
14. SHA Stands for ____Secure Hash Algorithm
15. Attacks on MAC are ___MAC spoofing, MAC flooding, and wireless jamming
16. A hash function accepts a variable size message as input and produces a____ fixed-length_______
output.
17. ____Pretty Good Privacy (PGP)__________is the technique which is used for E-mail
compatibility.
18. PGP stands for_____Pretty Good Privacy (PGP)
19. E-mail stands for____Electronic mail
20. Various secure E-Mail standards , such as
I. Choose the correct alternative answer for the following question
1. MD5 is quite fast and produces message digests [ C ]
A. 512bits. B. 1024 bits. C. 128bits. D. 64bits
2. [ B ]
Which financial institutions have a relationship with merchants
for processing payment card authorizations and payments?
A. Issuer B. Acquirer C. Merchant D. Dealer
3. In the basic TCP/IP protocol suite, the number of layers used are . [ A ]
A. 4 B. 6 C. 5 D. 7
4. are very crucial for success of RSA algorithm [ B ]
A. Integers B. Prime numbers C. Negative number D. Fraction
5. SSL provides only [ A ]
A. Authentication B. Confidentiality C. Integrity D. Durability
6. Physical layer transmits the data in TCP/IP as . [ D ]
A. Packets B. Pulse codes C .Data D. Bits
7. In anonymous e-money factor is used to encrypt the random number [ ]
A. Blinded B. Prince C. Prime D. Anonymity
8. The bank can trace the transaction using money. [ ]
A. Anonymous B. Identified C. physical D. Rational
9. E-money is classified into types. [ ]
A.3 B.2 C.4 D.5
10 Customer uses key for decryption. [ B ]
.
A. Public key B. Private Key C. Secret key D. Hash key
II. Fill in the blanks
11. In SHA1 hash value will be with the size of __ 160-bit (20-byte) ____
12. List out asymmetric encryption algorithms___Diffie-Hellman ,Rivest-Shamir-Adleman
(RSA) ,Digital Signature Algorithm (DSA), ElGamal_____________________________
13. SSL is placed in between the ___ presentation and application ______layers.
14. __Digital signatures_________helps in ensuring non-fraudulent transactions on the web.
15. SET provides an authentication with the help of__ Digital certificates__________
16. SSL is used to encrypt the__ data sent between a website and a browser, or between two
servers. __
17. S/MIME stands for____ Secure Multipurpose Internet Mail Extensions. ________________
18.______ Content-id________Uniquely identifies the MIME entities with reference to multiple
Contexts.
19. The processed S/MIME along with security related data is called as _ S/MIME
certificate.____________________.
20. In S/MIME, MLA stands for Mail List Agent_____________.