Questions On Network Security
Questions On Network Security
Questions On Network Security
Q2. Which of the following are used to generate a message digest by the
network security protocols?
i) RSA
ii) SHA-1
iii) DES
iv) MD5
(a) i and iii only
(b) ii and iii only
(c) ii and iv only
(d) iii and iv only
Q5. The total number of keys required for a set of n individuals to be able
to communicate with each other using secret key and public key crypto-
systems, respectively are:
(a) n(n-1) and 2n
(b) 2n and ((n(n - 1))/2)
(c) ((n(n - 1))/2) and 2n
(d) ((n(n - 1))/2) and n