HAMRO
CSIT
Entrance
Take Free Test
MCQ Questions
Colleges
Semester
First Semester
Second Semester
Third Semester
Fourth Semester
Fifth Semester
Sixth Semester
Seventh Semester
Eight Semester
Questions
Subscription
New
Notices
Articles
Help
Ask Question
Application (
2.9.1
)
Contribute
Contact Us
Account
Sign In
Create Account
Questions
Ask Any Question From TU CSIT Syllabus?
Search
Search
Semester
All Semester
First Semester
Second Semester
Third Semester
Fourth Semester
Fifth Semester
Sixth Semester
Seventh Semester
Eight Semester
Subject
All Subjects
Eight Semester
Fifth Semester
First Semester
Fourth Semester
Second Semester
Seventh Semester
Sixth Semester
Third Semester
Answer
All
Has Answer
Not Answer
Order
Oldest
Newest
Search
Prove or disprove the validity of argument. Every living thing is a plant or an animal. Hari’s dog is alive and it is not a plant. All animals have heart. Hence, Hari’s dog has heart.
Not Answered
Discrete Structure
Write short notes on
Classes of Intruder
SSL
DoS Attack
Answered
Cryptography
Asked on 2076 Exam
Write down any two limitations of MAC. What do policy and mechanism mean in cryptography? Describe with a scenario.
Answered
Cryptography
Asked on 2076 Exam
What is the role of the prime number in the Euler totient Function? Find the GCD of 12 and 16 using the Euclidean algorithm.
Answered
Cryptography
Asked on 2076 Exam
Explain the procedure of mix column transformation in AES with an example.
Answered
Cryptography
Asked on 2076 Exam
How does the nature of worms differ from viruses? Define PKI with its architecture model.
Answered
Cryptography
Asked on 2076 Exam
What is the task of a firewall? List the elements of X.509.
Answered
Cryptography
Asked on 2076 Exam
Define digital signature. Describe the approaches of DSS.
Answered
Cryptography
Asked on 2076 Exam
Distinguish between stream cipher and block cipher. Encrypt the message WE ARE IN SAME RACE UNTILL OVER LIVE END using Rail fence cipher using 4 as a number of rails.
Answered
Cryptography
Asked on 2076 Exam
Define discrete logarithm. Explain the procedure of sharing the secret key in Diffie Hellman.
Answered
Cryptography
Asked on 2076 Exam
Page navigation
«
« First
Page
103
Page
104
Current Page
105
Page
106
Page
107
Last »
»
Question's Answer
Solution
Share
Share this link via
Or copy link
Copy
HAMROCSIT.COM