NPTEL E-Business Week 6 Assignment Answers 2024

Sanket
By Sanket
NPTEL E-Business Assignment Answers 2023

NPTEL E-Business Week 6 Assignment Answers 2024

1. I am booking my LPG cylinder online using my Digital Payment App. This is possible because my KYC identity registered with LPG provider is also registered with the Digital Payment App. Because of this arrangement, I can never deny that I have booked the cylinder. Which of the following security category best describes this situation.

a. Integrity
b. Availability
c. Non-repudiation
d. Confidentiality

Answer :- For Answers Click Here 

2. A website is refusing connection when an HTTP request is made. It may be a case of_____________.

a. Sniffing
b. IP Spoofing
c. Open connection
d. Denial of service attack

Answer :- For Answers Click Here 

3. Symmetric key cryptographic algorithms are faster than asymmetric key algorithms. However, the former has the following drawback

a. Lack of mathematical validity of the underlying algorithms
b. Too much use of computing resources including
c. Unavailability of specialized hardware in both the hosts
d. Key distribution in a secure manner between both the hosts

Answer :- For Answers Click Here 

4. The difference between a hacker and intruder is the former tries to___________, while the latter tries to_______.

a. get unauthorized access to the system, identify various security vulnerabilities.
b. identify various security vulnerabilities, get unauthorized access to the system.
c. block the access of legitimate users of a system, mask identify of unauthorized users
d. get unauthorized access to the banks, get unauthorized access to defense establishments

Answer :- 

5. During digital signature generation process, the sender’s credentials are signed using the_____________
key of the__________

a. Public, Sender
b. Private, Receiver
c. Public. Receiver
d. Private, Sender

Answer :- 

6. In the context of TLS protocol which of the following protocol uses symmetric key cryptographic algorithms

a) HTTP
b) TLS Record Protocol
c) TLS Handshake protocol
d) TCP

Answer :- For Answers Click Here 

7. Using X.509 digital certificate which of the following security category cannot be addressed

a) Integrity
b) Authentication
c) Non-repudiation
d) Encryption

Answer :- 

8. Average size of a file requested by the client during TLS transaction is 16, 385 bytes. Key Size used is 512 (bits), time for verification of server certificate, decryption of the master secrete, key generation are 2.4 ms, 1.31 ms, 0.10 ms respectively. Decryption and message digest generation in mbps is 140 and 180 respectively. What is the service time at the client?

a. Between 0.005 – 0.006
b. Between 0.05 – 0.06
c. Between 0.5 – 0.6
d. Between 5 – 6

Answer :- 

9. During the execution of TLS protocol, use of cryptographic accelerator decreases computational time. Cryptographic accelerator is a

a. Hardware
b. Software
c. Malware
d. A combination of software and hardware

Answer :- 

10. In a digital certificate the hash function is used to ensure

a) Data integrity
b) Authentication
c) Non-repudiation
d) Encryption

Answer :- For Answers Click Here 
Share This Article
Leave a comment