Posts

Showing posts from 2022

T20 squad team

  First Round Group A Namibia:  Gerhard Erasmus (c), JJ Smit, Divan la Cock, Stephan Baard, Nicol Loftie Eaton, Jan Frylinck, David Wiese, Ruben Trumpelmann, Zane Green, Bernard Scholtz, Tangeni Lungameni, Michael van Lingen, Ben Shikongo, Karl Birkenstock, Lohan Louwrens, Helao Ya France.  Netherlands:  Scott Edwards (c), Colin Ackermann, Shariz Ahmad, Logan van Beek, Tom Cooper, Brandon Glover, Timm van der Gugten, Fred Klaassen, Bas de Leede, Paul van Meekeren, Roelof van der Merwe, Stephan Myburgh, Teja Nidamanuru, Max O’Dowd, Tim Pringle, Vikram Singh. Sri Lanka:  Dasun Shanaka (c), Danushka Gunathilaka, Pathum Nissanka, Kusal Mendis, Charith Asalanka, Bhanuka Rajapaksa, Dhananjaya de Silva, Wanindu Hasaranga, Maheesh Theekshana, Jeffrey Vandersay, Chamika Karunaratne, Dushmantha Chameera (subject to fitness), Lahiru Kumara (subject to fitness), Dilshan Madushanka, Pramod Madushan.  Standby Players:  Ashen Bandara, Praveen Jayawickrema, Dinesh Cha...

AKTU : 10 Computer System Security Quiz answer

Image
  AKTU : 10 Computer System Security  Quiz answer Question:1- Which of the following statement is true for RSA algorithm ? Security of RSA depends on problem of factoring large number In software, RSA is 10 times slower than DES In hardware, RSA is 100 times slower than DES RSA can be faster than the symmetric algorithm Question:2-  In cryptography The receiver can verify signature using public key cryptographic hash function is used in creating digital fingerprint Both 1 and 2 None of the above Question:3-  Which of the following statements is/are true (For cryptography) ? SET and IP Sec are cryptography protocols. Receiver decrypts the message using their private key. Sender gets receiver's public key from databse. All of the above . Question: 4- Select the correct statement for OSI model. IP Sec protocol is in network layer of OSI model. Physical layer transmits and receives unstructured raw data. HTTP is application level protocol. All of the above . Question:5-...

AKTU : 9 Computer System Security Quiz answer

Image
  AKTU : 9 Computer System Security  Quiz answer QUESTION:1- Which of the following is correct for CSRF attack ? It tricks user to send malicious request to server. Cookie can be used in CSRF attack Both 1 and 2 None of the mentioned above QUESTION:2-   One of the ways to prevent CSRF attack is that you should use _____ validation. Referrer CSRF token browser Both 1 and 2 QUESTION:3-  Some of the vulnerability of a websites is/are ? SQL Injection CSRF Cross Side Scripting All of the above QUESTION:4- ________ is a attack in which the script is stored permanently on server. Stored XSS Reflected XSS DOM based attack All of the above QUESTION:5-   Which of the following is true for DOM-based XSS attack ? Set the Http Only flag in cookies Ensure that session IDs are not exposed in a URL payload can not be found in response None of the above

AKTU : 8 Computer System Security Quiz answer

Image
  AKTU : 8 Computer System Security  Quiz answer QUESTION:1-  Password should be combination of ____. (according to the video lecture). Lower case letters only Memorable names and dates Upper case and lower-case letters, numbers and non letter characters Upper case and lower-case letters, numbers and symbols QUESTION:2-  The cookies we use, are sent with ______, which in general, _____ the performance. only when requested,improves every request, degrades extra information, is useless for None of the mentioned QUESTION:3-   Which of the following header is used to create cookie ? Create-Cookie Init-Cookie Set-Cookie Start-Cookie QUESTION:4-   _______ is an attack to inject code, in which malicious SQL code is passed to an instance of SQL Server from ______. SQL injection, user input field code injection, another server both 1 and 2 None of the above. QUESTION:5- How to prevent SQL injection ? Use parameterized / prepared SQL use string concatenated...

AKTU : 7 Computer System Security Quiz answer

Image
  AKTU : 7 Computer System Security  Quiz answer Question: 1- ____ is a type of permission in an unix file which can be assigned to a ______. execute, administrator read, group write, user All of the above   Question: 2- Which of the following statement is correct for access token ? It contains the destination for access token. It contains a list of the privileges held by either the user or the user's groups. Impersonation Token is a personal token . All of the above Question :3 - Making a user click on something, disguised as something else, is known as ? Clickjacking Brute force attack Eavesdropping Waterhole Question :4 - ____ is a process to break into password protected system. Dictionary attack Brute force attack Rainbow Table Attack All of the above Question :5- For chromium browser, which of the following statement is false ? It has a rendering engine and browser kernel. Browser kernel is used to parse html. It uses v8 java script engine. All of the above