1
GATE CSE 2014 Set 1
MCQ (Single Correct Answer)
+1
-0.3
Which one of the following are used to generate a message digest by the network security protocols?
(P) RSA
(Q) SHA-1
(R) DES
(S) MD5
(P) RSA
(Q) SHA-1
(R) DES
(S) MD5
2
GATE CSE 2013
MCQ (Single Correct Answer)
+1
-0.3
Using public key cryptography, X adds a digital signature σ to message M, encrypts, and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?
3
GATE CSE 2011
MCQ (Single Correct Answer)
+1
-0.3
A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT
4
GATE CSE 2007
MCQ (Single Correct Answer)
+1
-0.3
Consider the following two statements:
i. A hash function (these are often used for computing digital signatures) is an injective function.
ii. encryption technique such as DES performs a permutation on the elements of its input alphabet.
Questions Asked from Network Security (Marks 1)
Number in Brackets after Paper Indicates No. of Questions
GATE CSE Subjects
Theory of Computation
Operating Systems
Algorithms
Database Management System
Data Structures
Computer Networks
Software Engineering
Compiler Design
Web Technologies
General Aptitude
Discrete Mathematics
Programming Languages