Professional Documents
Culture Documents
NSP
NSP
(A) Internet Key Exchange (IKE) V (A) scrtt sit caHa (IKE)
(E) Simple Key Exchange Protocol (B) YT LAHÀs vicioct (SKEP)
(SKEP)
(C) b r
(C) Kerberos
(D) MR IT (SSH)
(D) Secure Shell (SSH)
4. What does KMP stand for in the 4. IPsec o H KMP I GT 3H ?
context of IPsec?
8. 7. 6. 5
3T HTUozUT RaT
Gt HU
}ST (SA)
CGHa
(AH)
(IKE)
(D) 1
aRUT(D) 4 RUT(C) 3 aRUT(B) 2 (A) UT
fe 4
cas
fata
P.T.O.
12. Which of the following is NOT .r What is the primary function of SSL
(D) Transmission Control Protocol 36. Which SNMP version introduced the 36. foH SNMP #oRU MIB UÈÌT#
(D) çrHfA GT Ttct (TCP)
(TCP) concept of SNMP Views to restrict
33. HUAUH as y¢UH gujtt (-HUH)
33. What is the primary function of the
access to certain portions of the
Network Management System (NMS)
MIB?
in SNMP?
(A) UHETUHúta 1
SNMPV1
(A) To store network data
net (B) SNMPv2c
(B) CHUAUta 2
(B) To monitor and manage
work devices v (C) SNMP IT HatRa fe
(C) SNMPv2u (C) EHUTrtat 2
( ) To transmit SNMP traps
(D) SNMPV3 (D) HLUHa 3
(D) To compile MIB definitions
0628001 DI2024 [13] P.T.O.
0628001\D\2024 (12]
A) What is the pimary function of
37, SNM1 40. HE=A vAua qut 3UTR (CRTS)
the Management Information Base
(MIB) in SNMP?
(D) ARPANET model (D) ARPANET SR (D) Digital signature (D) sfcT BIGR
0628001D 2024 0628001\DI2024 [19] P.T.O.
[18]
S8À nasymmetric cryptography, what is 9)In asymmetric cryptography, what is
the purpOse of the public key? the purpose of the private key?
( To encrypt data
(A) To encrypt data V
(B) To decrypt data
( To decrypt data (B) tr ffhc rt fe (C) To generate digital signatures
(C) To generate digital signatures (C)
(D) To Verify digital signatures (D) A AR
(D) To verity digital signatures
63. What does the term "cryptanalysis"
59. Which cryptographic mechanism
refer to?
is primarily used for ensuring data
(A) The process of encrypting
integrity and authenticity? plaintext
(A) Encryption (B) The process of decrypting
(A) efoyA
(B) Decryption ciphertext
(B) sfy
(C) Digital signatures
( The study of cryptographic
(C) sCT 3R
( Hash functions algorithms and breaking them
(D) b
(D) The study of digital signatures
60. What does decryption refer to in the 64. Which cryptographic technique
context of cryptography? is used to verify the integrity of
(% Converting ciphertext into a message without revealing its
plaintext contents?
83. What is the primary purpose of the 83. bRr gHg fdGRU (osÍ) I 87. What component of Kerberos is
Key Distribution Center (KDC) in responsible for authenticating users fore Kerberos H ãf R ?
Kerberos? and services?
(A) qHds r fe (A) WHTUTtbU Hér (AS)
(A) To store passwords (A) Authentication Server (AS)
(B) fa d fee (B) fcoc uif Hr (TGS)
(B) Ticket Granting Server (TGS)
( To issue tickets
(C) Ticket-Granting Ticket (TGT) (C) feac-uif fct (TGT)
(G) To manage encryption keys
(D) 34uuoafsd enfora aRt> fe (6) Key Distribution Center (KDC) (D) afaary bz (KDC)
(D) To authenticate users
88. What does the acronym TGT stand
84. In X.509, what is the function of the 84. X.509 À, THIUUa fRlRU Yt (CRL) for in the Kerberos authentication
Certificate Revocation List (CRL)?
protocol? (A) foc acI fcoc
( It lists all the valid certificates
(Ð Ticket-Granting Ticket
(B) It verifies the authenticity of
certificates
(B) Token Generation Token