Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

SAQ 3.

4 APPLICATION OF CYPTOGRAPHIC SYSTEMS

1. The Secure Sockets Layer (SSL) protocol addresses the confidentiality of a message through:
A. Public Key of Server
B. Hash function.
C. Symmetric encryption
D. Digital signature certificates

2. Which of the following operates in Transport Mode or Tunnel Mode?


A. S-MIME
B. HTTPS
C. SSL
D. IPSec

3. In the following mode end to end (Host to host) security of data is provided.
A. Tunnel
B. Transport
C. Either Tunnel or Transport
D. None of the above

4. When we are browsing on to a secure Income Tax site which protocol are we using?
A. IPsec
B. S-MIME
C. HTTPS
D. SET

5. Security of e-mails can be ensured using


A. HTTPS
B. S-MIME
C. IPSEC
D. SET
ANSWERS

1 C

2 D

3 B

4 C

5 B

You might also like