1.
In computer security, what term means that computer system assets can only be modified
by authorized parties?
A) Confidentiality B) Integrity C) Availability D) Authenticity
2. In computer security, what term means that information in a computer system should
only be accessible for reading by authorized parties?
A) Confidentiality B) Integrity C) Availability D) Authenticity
3. Which of the following is an independent malicious program that does not require a host
program?
A) Trap doors B) Trojan Horse C) Virus D) Worm
4. What is the term for code that recognizes a special sequence of input or is triggered by
being run from a specific user ID or by an unlikely sequence of events?
A) Logic Bomb B) Virus C) Trojan Horse D) Trap doors
5. What is the term for code embedded in a legitimate program that is set to "explode" when
certain conditions are met?
A) Logic Bomb B) Trap doors C) Virus D) Trojan Horse
6. Which of the following malicious programs does not replicate automatically?
A) Trojan Horse B) Virus C) Worm D) Zombie
7. What kind of programs can be used to indirectly accomplish functions that an
unauthorized user could not do directly?
A) Zombie B) Trojan Horses C) Worm D) Logic Bomb
8. What is the term for a program that can infect other programs by modifying them, where
the modification includes a copy of the virus program, which can then infect other
programs?
A) Worm B) Zombie C) Virus D) Trap doors
9. Which of the following does NOT use a 'Cryptographic Technique' to protect data?
A) the use of digital signatures B) data encryption C) the use of stored encrypted
password files D) using asymmetric keys at 'sender' and 'receiver' nodes
10. Which of the following crimes is done using a computer as the instrument?
A) Computer Manipulation B) Money Laundering C) Data Alteration D) Theft of
services
11. What are software programs that are installed on a computer system, usually located
between the OS and keyboard hardware, to record every keystroke?
A) Keystroke B) PC key logger C) Software Key Logger D) Anonymizer
12. What are people called who use readymade software or applications to hack a computer?
A) Hacker B) Cracker C) Script kiddies D) Phreakers
13. In which year was the Information Technology Act implemented in India?
A) 2013 B) 2000 C) 2015 D) 2003
14. What is another term for junk mail?
A) Spoof B) Spam C) Fake D) Fraud
15. What is the science of changing information into an unintelligible form called?
A) Cryptography B) Steganography C) Password diving D) None of them
16. What is the term for fraud involving another person's identity for an illegal purpose?
A) Password Sniffing B) Internet Time Theft C) Identity Theft D) Salami
17. What is the term for altering raw data just before it is processed by a computer?
A) Data Diddling B) Forgery Attack C) Salami Attack D) None of them
18. What is a primary purpose of hacking?
A) Greed B) Revenge C) Passion D) All of them
19. Which of the following terms best describes data that is to be encrypted?
A) Text B) Cipher Text C) Plain text D) Cryptography
20. In what year was the first cybercrime recorded?
A) 1820 B) 1880 C) 1940 D) 2004
21. What is the origin of the prefix 'Cyber'?
A) cybernoc B) cybercell C) cybermatic D) cybernetic
22. On which brand of computer was the first virus installed in 1982?
A) Apple B) Microsoft C) Google D) IBM
23. What term describes any information, whether or not it's subject to human action, that
can be extracted from a computer?
A) Digital Evidence B) Analog Evidence C) Physical Evidence D) Logical Evidence
24. Which of the following uses Computer Forensics?
A) Corporations B) Insurance Companies C) Criminal Prosecutors D) All of them
25. What is a reason for performing Computer Forensics?
A) Forgery B) Virus C) Fraud D) All of them
26. What kind of technique is Computer/Cyber Crime?
A) Social B) Corporate C) Socio-Technical D) General
27. What is the term for the process of recovering deleted, encrypted, and damaged data?
A) Cyber Security B) Computer Forensic C) Physical Security D) None of them
28. What does a Hashing algorithm protect in Cryptography?
A) Availability B) Integrity C) Confidentiality D) Authenticity
29. What technology does a Transposition stream cipher use?
A) Replace the character B) Rearrange the letters C) Substitute the character D) None
of them
30. Which of these provides keyword searching service?
A) Computer Crime B) Cyber security C) Cyber criminals D) Computer forensics
31. In Block Cipher, what size blocks can plain text content be divided into?
A) 16 Bytes B) 26 Bytes C) 6 Bytes D) All of them
32. What does an Asymmetric Encryption algorithm protect?
A) Confidentiality B) Integrity C) Availability D) All of them
33. What is the term for a kind of malware whose presence is typically hidden from the user?
A) Spyware B) Logic Bomb C) Key Logger D) Anonymizer
34. What should it be called when someone takes control of your website?
A) Salami B) Web Jacking C) Spoofing D) Data Diddling
35. What is the term for mail that originates from one source but is actually sent from
another?
A) Spam B) Fake C) Spoof D) Fraud
36. What kind of computer program lies dormant and is triggered by an event on a particular
day?
A) Virus B) Worm C) Logic Bomb D) Trojan Horse
37. What does CGA stand for?
A) Cryptographically granted Access B) Cryptographically generated address C)
Cryptographically granted Address D) None of them
38. What term describes crime that is not reported to the police and that remains unknown to
officials?
A) Dark figure of crime B) Light figure of crime C) Cyber stalking D) Crime typology
39. Which term describes unlawful activity undertaken and supported by organized criminal
groups operating across national boundaries?
A) Malware B) Transnational organized crime C) Computer crime D) Corporate crime
40. Which of the following describes malicious computer programs such as viruses, worms,
and Trojan horses?
A) Arson B) Software Piracy C) Malware D) Larceny
41. What is the term for unsolicited commercial bulk email whose primary purpose is
commercial advertising or promotion of a product or service?
A) Cyber terrorism B) Terrorism C) Spam D) Malware
42. What is the purpose of encryption?
A) Encryption B) Authentication C) Authorization D) Non-repudiation
43. What does SSID stand for?
A) Service Set ID B) Service Set Identifier C) System Service Identifier D) None of the
above
44. What is the term for an attack that deducts a small amount of money that would go
unnoticed at first?
A) Salami B) Data Diddling C) Web Jacking D) Spoofing
45. What does WEP stand for?
A) Wireless Equivalent Privacy B) Wired Equivalent Protocol C) Wireless Equivalent
Protocol D) None of them
46. Which of the following is used to send secure messages from one location to another
using a public network like the Internet?
A) Physical Public Network B) Virtual Public Network C) Physical Private Network D)
Virtual Private Network
47. Which of the following is/are methods of providing secure communication between two
entities through the use of mathematical coding?
A) Private key encryption B) Public key encryption C) Digital Signature D) All of the
above
48. What term best describes the type of attack that makes it seem like two computers are
communicating with each other, when actually they are sending and receiving data
through a computer in between?
A) Spoofing B) Man in Middle C) Middle Man D) None of them
49. What is a software defect considered as?
A) Risk B) Threat C) Vulnerability D) Asset
50. What technique involves an attacker launching an attack on a wireless network by
creating a new network with a strong signal strength?
A) Sniffing B) Man in the Middle C) DoS D) Spoofing
51. What has become more important due to increased computer use, the internet, and the
WWW?
A) Natural Disasters B) Data integrity and data security C) Hardware Malfunctions D)
Malicious deletions
52. What can a firewall protect against?
A) Viruses B) fire C) connecting to and from the "outside" world D) unauthenticated
interactive logins from the "outside" world
53. Which of the following methods can effectively be used to prevent a logical breach of
security?
A) Operating system and other system software design B) Distributed systems C)
Network design D) computer architectural design
54. What is the term for the criminal practice of using social engineering over the telephone?
A) Smishing B) Vishing C) Phishing D) Mishing
55. What is the term for the art of detecting messages that are hidden in images, audio/video
files?
A) Steganography B) Cryptanalysis C) Cryptography D) Steganalysis
56. What is an attempt to make a computer resource unavailable to its intended users called?
A) Botnet process B) DoS attack C) Virus attack D) worms attack
57. What is the term for the criminal practice of using social engineering through SMS
messages?
A) Smishing B) Vishing C) Mishing D) Phishing
58. What is the term for changing an assigned Media Access Control address of a network
interface card to a different one?
A) MAC Filtering B) MAC Spoofing C) IP Filtering D) IP Spoofing
59. What activities do attackers usually conduct after installing sniffers on a wireless
network?
A) Collecting MAC address B) Detection of SSID C) Collecting frames to crack WEP D)
All of them
60. What must be used to protect from a SQL injection attack?
A) Modify error report B) Input Validation C) Isolate servers D) All of them
61. What kind of attack involves a query sent to a database to check if a user has a valid
name and password?
A) Brute Force attack B) SQL injection attack C) Password Guessing D) Dictionary
attack
62. What technique involves using hundreds or thousands of zombie computers to flood a
device with requests?
A) Buffer Overflow B) DDoS C) Man in Middle D) DoS
63. What kind of attack involves inquiring the network to discover host(s) to confirm
information?
A) Active reconnaissance B) Active attack C) Rattling the doorknobs D) All of them
64. What is the purpose of a proxy server?
A) Keep System behind curtain B) Speed up access to a resource C) Both A and B D)
None of them
65. What kind of attack involves all possible combinations of letters, numbers, and special
characters to crack a password?
A) Brute force attack B) Dictionary attack C) Hybrid attack D) Rainbow table attack
66. Which type of virus infects program files and the boot sector when activated?
A) Program virus B) Multipartite virus C) Boot sector virus D) Stealth virus
67. Which of the following accurately reflects the purpose of steganography?
A) Steganography scrambles a message so that it cannot be viewed B) Steganography
hides the existence of the data. C) Steganography exposes hidden data D)
Steganography encrypts cleartext data
68. What does ______ scanning do to understand the existing weakness in the system?
A) Port B) Vulnerability C) Network D) System
69. What is the term for a program that is designed to take advantage of vulnerability in an
application or operating system to enter an application?
A) Zombie B) Worm C) Trojan Horse D) Virus
70. What technique involves an attacker inserting a new node between two existing nodes?
A) Spoofing B) Sniffing C) Man in the Middle D) DOS
71. Which of the following attacks is likely to result in Identity theft?
A) Phishing attack B) Denial of Service attack C) Worm attack D) Virus infection
72. What is a virus considered?
A) File B) Database C) Program D) Network
73. What is the term for a software update to fix a security flaw or other problem?
A) Repair B) Patch C) Exploit D) Hot Fix
74. What type of cookies cannot be retained after the browser is closed?
A) Persistent cookies B) Session cookies C) Stored cookies D) None of them
75. What is the term for a program that advertises itself as performing one activity but is
actually doing something else, or performing both advertised and malicious activities?
A) Virus B) Zombie C) Trojan Horse D) Worm
76. What is Public Key Cryptography synonymous with?
A) Symmetric Key Cryptography B) Private key Cryptography C) Asymmetric Key
Cryptography D) None of the above
77. How are threats categorized?
A) Passive or active B) Traffic C) Masquerade D) Others
78. What technology is used to measure and analyze human body characteristics for
authentication purposes?
A) Footprinting B) JBOD C) Biometric D) Anthropomorphism
79. In a SQL injection attack, what command is used to retrieve data from a web page/site?
A) Get B) Post C) Select D) Retrieve
80. What is the difference between Data Integrity and Data Security?
A) Limiting physical access to computer systems; assigning passwords to users. B)
Encryption; Audit trails C) Consistent, accurate and reliable data; protection of data
from unauthorized access. D) Distributing work to preserve integrity; installing system
passwords
81. In what type of phishing attack do phishers identify the victim in advance?
A) Dragnet B) Lobsterpot C) Rod and reel D) Gilnet
82. How are viruses spread?
A) Through Firewalls B) Downloading infected programs and files from the internet.
C) Garbled information D) Install anti-virus
83. What is it considered if someone steals and sells the source code of a game?
A) Patent B) Trade secret C) Trademark D) Copyright
84. What is the main purpose of a sniffer in a wireless network?
A) Detect SSID B) Collect MAC C) Collect frame to crack WEP D) All of them
85. Gaining unauthorized access to a computer system would fall under which category of
computer crime?
A) Hacking B) Destruction of data & Software C) Theft of Services D) Data Theft
86. What technique involves copying information of a debit/credit card to create a duplicate
card?
A) Triangulation B) Traditional C) Modern D) None of them
87. How can a wireless network be secured?
A) MAC address filtering B) Disabling MAC filtering C) Disabling SSID D) All of
them
88. What process involves blocking access of a specific IP address?
A) IP Blocking B) IP Clocking C) Industry Espionage D) None of them
89. What can be used as an IP address Multiplexer to enable a connection to a number of
computers on the internet?
A) FTP Server B) Proxy Server C) Web Server D) None of these
90. Which of the following is a Bluetooth hacking tool?
A) Bluejacking B) Car-Whispering C) Bluebugging D) All of them
91. What is the maximum header size of an IP packet?
A) 32 Bytes B) 30 Bytes C) 64 Bytes D) 62 Bytes
92. What is the term for a computer threat that attempts to exploit computer application
vulnerability that is unknown to anybody in the world?
A) Data Diddling B) Vulnerability C) Zero day D) None of the above
93. What is Dumpster diving an example of?
A) Phishing B) Fraud C) Social Engineering D) Cyber Stalking
94. What is a software update to fix a security flaw or other problem known as?
A) Repair B) Hot Fix C) Patch D) Exploit
95. What do people use counterfeit websites for?
A) Foistware B) Phreakers C) Heedless guests D) Stalkers
96. What is used by attackers to find open ports in a network?
A) Vulnerability Scanner B) Port Scanner C) Network Scanner D) All of them
97. What are people who send multiple mails from zombie computers known as?
A) Spoofer B) Spies Kiddies C) Spammer D) Stalker
98. Which of these is used to track missing laptops?
A) Motion Sensor B) Labels C) Alarms D) All of them
99. In the realm of 'cyber attack,' what does DDOS stand for?
A) Distributed Destruction of System B) Damaging Downtime of System C) Digital Data
Output Spoit D) None of them
100. What is it called when a service provider uses public cloud resources to create a
private cloud?
A) Public cloud B) Global cloud C) Private cloud D) Virtual cloud
101. Sam sends a message to Tim and Joe using the same encryption key. At the
receiving side, Tim and Joe decrypt
the message with the key used by Sam to encrypt it. What is this an example of?
(a) Symmetric encryption (b) Hashing (c) Asymmetric encryption (d) None of the
above
102. What is the term for a person who is ethically opposed to the abuse of computer
systems?
(a) White hat hacker (b) Red hat hacker (c) Green hat hacker (d) Black hat hacker
103. Which of these is a feature of Hashing?
(a) Confidentiality (b) Availability (c) Authenticity (d) None of these
104. What term describes the first phase to commit a crime that is treated as a passive
attack?
(a) Scanning (b) Scrutinizing (c) Reconnaissance (d) None of them
105. Which statement about a virus attack is true?
A. Boot sector virus infects the storage media
B. Multipartite virus targets .exe files
C. Program virus is a hybrid virus
D. Stealth virus masks itself, so detection is not easy
(a) Both A and B (b) Both A and C (c) Both A and D (d) None of them
106. What is the term for an attempt to make a computer resource unavailable to its
intended users?
(a) Virus attack (b) Worm attack (c) Botnet Process (d) Denial of Service
107. What is the term for the criminal practice of using social engineering over the
telephone?
(a) Phishing (b) Mishing (c) Vishing (d) Smishing
108. What is a computer threat that attempts to exploit computer application
vulnerabilities that are unknown to anybody in the world?
(a) Zero day (b) Vulnerability (c) Data Diddling (d) Salami
109. Which of the following is a Bluetooth hacking tool?
(a) Bluejacking (b) Blue bugging (c) Car Whispering (d) All of them
110. In an asymmetric cryptographic algorithm, when Tom wants to send a message to
Alisha, which key will Alisha use to decrypt it?
(a) His Public Key (b) Public key of Alisha (c) His Private Key (d) Private key of Alisha
111. What is another name for Public Key Cryptography?
(a) Symmetric Key Cryptography (b) Private key Cryptography (c) Asymmetric key
Cryptography (d) None of the above
112. What are software programs that are installed on a computer system, usually
located between the OS and keyboard hardware to record every keystroke?
(a) Key Stroker (b) Key Logger (c) Software Key logger (d) Anonymizers
113. What is the term for a destructive script that is installed by an employee and set to
execute later on?
(a) Worm (b) Logic Bomb (c) Virus (d) Trojan Horse
114. Which of the following has the motto "Do no evil"?
(a) Microsoft (b) Google (c) Yahoo (d) Intel
115. What term best describes the type of attack that makes it possible to deny the
service of a server using multiple computers from different geographical locations?
(a) Buffer Over flow (b) DoS (c) Man in Middle (d) None of these
116. What term best describes the type of attack that makes it seem like two computers
are communicating with each other, when actually they are sending and receiving data
with a computer between them?
(a) Spoofing (b) Middle Man (c) Bucket Brigade (d) Replay
117. What is a program that secretly takes over another Internet-attached computer and
then uses that computer to launch attacks called?
(a) Worm (b) Zombie (c) Virus (d) Trap doors
118. What type of attack involves gathering information about an individual's
knowledge, like when they arrive and leave from work?
(a) Passive attack (b) Active attack (c) Forgery attack (d) None of these
119. What is the difference between Data Integrity and Data Security?
(a) Limiting physical access to computer systems and assigning passwords to users. (b)
Consistent, accurate, and reliable data, protection of data from unauthorized access.
(c) Encryption and Audit trails (d) Distributing work to preserve integrity and installing
system passwords
120. In computer security, what term means that computer system assets can be
modified only by authorized parties?
(a) Confidentiality (b) Integrity (c) Availability (d) Authenticity
121. What type of program does not replicate automatically?
(a) Worm (b) Zombie (c) Trojan Horse (d) Logic Bomb
122. Which of the following is an independent malicious program that does not need a
host program?
(a) Trap doors (b) Trojan Horse (c) Virus (d) Worm
123. What term describes a "trading name" that a business trader uses under
commercial purposes?
(a) Trade Secret (b) Trade Name (c) Patent (d) Copy Right
124. What was the Doodle me Diddle fraud held in 1996 in India considered to be a
type of cyber crime?
(a) Salami (b) Credit Card (c) Data Diddling (d) None of them
125. What is the purpose of a DoS attack?
(a) Flood a network with traffic, thereby preventing legitimate network traffic (b)
Disrupt connections between two systems (c) Prevent an individual from accessing
services (d) All of them
126. Which of the following is issued online for use over the Internet and is stored in
an electronic device such as a chip card or computer memory?
(a) Hard Cash (b) Business Card (c) E-Cash (d) E-Card
127. What category of computer crime does unauthorized access to a computer system
fall under?
(a) Hacking (b) Theft of Service (c) Destruction of data & Software (d) Data Theft
128. What should you do if, while working on your system, you receive an email from
an organization asking that you verify your account information within 12 hours or your
account will be closed?
(a) Reply to the email asking them why this information is required. (b) Reply to the
email with the information asked for (c) report the email to the actual organization
and then delete the email. (d) None of these
129. What term describes a document that grants the holder exclusive right on an
invention for a fixed number of years?
(a) Copy Right (b) Patent (c) Trade Mark (d) Trade Secret
130. Which of these companies is not a leader in Cloud Computing?
(a) Google (b) Amazon (c) Microsoft (d) Blackboard
131. What is the term for the simple process of intercepting wireless data that is
broadcasted on an unsecured network?
(a) Spoofing (b) Sniffing (c) Spamming (d) None of them
132. Which of the following is a cyber crime?
(a) Hacking (b) Worm Attack (c) Virus Attack (d) None of these
133. What type of attack involves altering raw data just before final processing and
then changing it back after processing is completed?
(a) Data Tampering (b) Data Diddling (c) Salami Attack (d) None of these
134. What is a type of virus that effects or infects the storage media on which the OS is
stored?
(a) Boot Sector Virus (b) Program Virus (c) Multipartite Virus (d) Stealth Virus
135. What must a network administrator do to protect a wireless network?
(a) MAC address filtering (b) Disabling SSID (c) Disabling Mac filtering (d) All of
them
136. What is the technique for breaking into phone or other communication systems
called?
(a) Hacking (b) Cracking (c) Phreaking (d) War dialing
137. What ethical responsibilities should IT professionals uphold?
(a) Limiting risks (b) Minimizing cost (c) Maximizing profit (d) Minimizing testing
138. What is a generic term which refers to all the legal and regulate aspects of Internet
and the World Wide Web?
(a) Cyber Law (b) Cyber Dyne (c) Cyber Cafe (d) Electronic Law
139. What art or science detects messages that are hidden in images, audio/video files
using steganography?
(a) Cryptography (b) Steganography (c) Cryptanalysis (d) Steganalysis
140. What is the name of the server that is used by attackers to connect with a network
which is blocked through the firewall of the organization/institution?
(a) Web Server (b) FTP Server (c) Proxy Server (d) None of these
141. How can threats be categorized?
(a) Passive attack (b) Active attack (c) Both a and b (d) None of them
142. What is a hacker's purpose for hacking?
(a) Greed (b) Revenge (c) Desire to access forbidden information (d) All
143. What are the symbols used by businesses to identify their goods and services?
(a) Trade Mark (b) Trade Secret (c) Designs (d) None of them
144. What is the term for a preparation towards preattack?
(a) Passive attack (b) Active attack (c) Reconnaissance (d) None of them
145. What is it called whenever someone makes or publishes a harmful imputation
about another person by words, signs, or representations?
(a) Cyber Stalking (b) Phishing (c) Social Engineering (d) Cyberdefamation
146. Which type of cipher replaces one character with another character to create
cipher text?
(a) Substitution (b) Transposition (c) either (a) or (b) (d) neither (a) or (b)
147. In what year was the Information Technology Act (ITA) amended in India?
(a) 2000 (b) 2004 (c) 2008 (d) 2012
148. What is the name for a cookie that was not created by the Website that attempts to
access it?
(a) First-party cookie (b) Second-party cookie (c) Third-party cookie (d) Fourth-party
cookie
149. What is the term for a hacker who claims to be motivated by improving security
by uncovering vulnerabilities?
(a) Black hat attacker (b) White hat attacker (c) Cowboy attacker (d) Resource attacker
150. What mechanism is used to protect private networks from outside attacks?
(a) Firewall (b) Antivirus (c) Digital signature (d) Formatting
151. Which of the following can be used as an IP address Multiplexer to enable to
connect to a number of computers on the internet?
(a) Web Server (b) FTP Server (c) Proxy Server (d) None of these
152. What term best describes the type of password attack that uses a large
pregenerated data set of hashes from nearly every possible password?
(a) Brute Force Attack (b) Dictionary Attack (c) Rainbow Table Attack (d) Host File
Attack
153. What technology is used to determine and analyze human body uniqueness for
authentication purposes?
(a) Footprinting (b) Biometric (c) JBOD (d) Anthropomorphism
154. What is it called when hackers gain entry to a network by pretending to be at a
legitimate computer?
(a) Spoofing (b) Forging (c) IP Spoofing (d) ID Theft
155. What happens in a Denial of Service attack when multiple ping packets are sent
through the ping command, which results in more traffic than the victim can handle?
(a) Flood attack (b) Ping of death attack (c) SYN attack (d) Smurf attack
156. What is the name for a way of generating significant computer network traffic on
a victim network?
(a) Flood attack (b) Ping of death attack (c) Teardrop attack (d) Smurf attack
157. What happens when the control of a website is taken by an attacker?
(a) Data Diddling (b) Salami (c) Web theft (d) Web Jacking
158. What is installed between a computer and keyboard to generate the log of keys
pressed by a user?
(a) PC Key logger (b) Software key logger (c) Hardware key logger (d) None of them
159. What process involves changing the contents of a website depending upon a user's
IP address and geographical location?
(a) IP Base Clocking (b) IP Base Blocking (c) Industry Espionage (d) None of them
160. Which of the following are challenges for any organization?
(a) Employee wasted time on internet (b) Controlling Access to Web Applications (c)
Bandwidth Wastage (d) All of them
161. What techniques are used on a wireless network to scan the network passively?
(a) Scanning (b) Spoofing (c) Sniffing (d) All of them
162. What in-built feature of web browsers helps to warn about malicious sites?
(a) Anti-phishing filters in IE and Firefox (b) Web of Trust (c) Clearing history of
browser (d) Addlock Plus
163. What is the name for social media computing which allows people to connect and
share information?
(a) Facebook (b) My Space (c) Linkedin (d) Twitter
164. Which of the following is not a cloud sphere?
(a) Joint Sphere (b) User Sphere (c) Recipient Sphere (d) Client Sphere
165. Which type of cryptography is synonymous with Secret key cryptography?
(a) Symmetric Key Cryptography (b) Asymmetric key cryptography (c) Private key
cryptography (d) Quantum Cryptography
166. To encrypt a message from Aman to Alka using public key cryptography, what is
needed?
(a) Aman's private key (b) Aman's public key (c) Alka's private key (d) Alka's public
key