How many rounds does the Feistel strucutre have.
A. 16.
B. 18.
C. 20.
D. 21.
ANSWER: A
How many rounds does the Feistel strucutre have. Read More »
A. 16.
B. 18.
C. 20.
D. 21.
ANSWER: A
How many rounds does the Feistel strucutre have. Read More »
A. block cipher.
B. stream cipher.
C. key cipher.
D. bit cipher.
ANSWER: B
..,…….processes the input elements continously, producing output one element at a time. Read More »
A. blocked.
B. allowed.
C. released.
D. suspended.
ANSWER: A
A threat is………by control of vulnerability. Read More »
A. Internet Executing Task Force.
B. Indian Engineers Task Force.
C. Internet Engineering Task Force.
D. Indian Executing Task Force.
ANSWER: C
A. control.
B. data.
C. security.
D. attack.
ANSWER: D
A human who exploits vulnerability perpetrates a………on the system. Read More »
A. threat.
B. software.
C. vulnerability.
D. confidentiality.
ANSWER: C
A……..is a weakness in the security system. Read More »
A. Hardware.
B. Attacks.
C. Integrity.
D. Vulnerabilities.
ANSWER: A
A. confidentiality.
B. integrity.
C. availability.
D. all the above.
ANSWER: D
The goals of secure computing include……. Read More »
A. attacks.
B. confidential information.
C. threats.
D. uncovered vulnerabilities.
ANSWER: B
Security in enterprise systems that are connected in network share Read More »