Looking for Information Technology and Cyber Security test answers and solutions? Browse our comprehensive collection of verified answers for Information Technology and Cyber Security at lms.upes.ac.in.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
Component | Purpose |
---|---|
1. PGP | A. X.509 certificates |
2. S/MIME | B. Challenge-response login |
3. SSH | C. Web security |
4. HTTPS | D. Web of trust |
Which of the following values satisfy the congruence : x ≡ 4 mod 9
In the previous question (Q no. 6, where Alice chooses the values p=13, q=17), If Alice encrypts the message M=10, what is the ciphertext C?
(Use : C=Me mod n)
Alice chooses p=13, q=17. She selects e=5. Which of the following statements are true?
If a≡7(mod11) and b≡9(mod11), then which of the following is/are true?
Group 1 | Group 2 |
---|---|
P. Data Link Layer | 1. Ensures reliable transport of data over a physical point-to-point link |
Q. Network layer | 2. Encodes/decodes data for physical transmission |
R. Transport Layer | 3. Allows end-to-end communication between two processes |
4. Routes data from one network node to the next |
Compute 7128 mod 15 using Euler’s Theorem.
Let a=3, n=10. If gcd(a,n)≠1, which of the following is TRUE?
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!