Time Left - 10:00 mins

Cyber Security & emerging technology

Attempt now to get your rank among 76 students!

Question 1

Which of the following risk may arise, when same key is used to encrypt directions of a communication channel, that are not present if using different keys in both direction?

Question 2

Which one of the following algorithm is not used in asymmetric-key cryptography?

Question 3

___________ is a weakness that can be exploited by attackers.

Question 4

Which of them is not a wireless attack?

Question 5

CIA triad is also known as ________
  • 76 attempts
  • 0 upvotes
  • 0 comments
Jul 5GATE & PSU CS