On This Page

This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on Network Security Set 1

Q1 | Message ________ means privacy that the sender and reciever expect privacy.
  • confidentiality
  • integrity
  • authentication
  • Authorization
Q2 | Message_____ means that the data must arrive at the reciever exactly as sent
  • confidentiality
  • integrity
  • authentication
  • Authorization
Q3 | Message _______ means that the receiver is ensured that the message message is coming fromthe indended sender not an imposter.
  • confidentiality
  • integrity
  • authentication
  • Authorization
Q4 | __________means that a sender must not be able to deny sending a message that he sent.
  • Confidentiality
  • Integrity
  • Authentication
  • Nonrepudiation
Q5 | A(n) can be used to preserve the integrity of a document or amessage.
  • message digest
  • message summary
  • encrypted message
  • ENCRYPTION
Q6 | A(n) function creates a message digest out of a message.
  • encryption
  • decryption
  • hash
  • integrity
Q7 | A hash function must meet criteria.
  • two
  • three
  • four
  • ten
Q8 | Password-based authentication can be divided into two broad categories: and_____
  • fixed; variable
  • time-stamped; fixed
  • fixed; one-time
  • none of the above
Q9 | _ creates a secret key only between a member and the center.
  • CA
  • KDC
  • KDD
  • CD
Q10 | The secret key between members needs to be created as a ________key when two members contact KDC.
  • public
  • session
  • complimentary
  • private
Q11 | is a popular session key creator protocol that requires an authentica
  • KDC
  • Kerberos
  • CA ion server and a ticket-granting server.
  • CD
Q12 | A(n) is a hierarchical system that answers queries about keycertification.
  • KDC
  • PKI
  • CA
  • CD
Q13 | Firewalls are to protect against
  • Virus Attacks
  • Fire Attacks
  • Data Driven Attacks
  • Unauthorized Attacks
Q14 | The ________criterion ensures that we cannot find two messages that hash to thesame digest
  • one-wayness
  • weak-collision-resistance
  • strong-collision-resistance
  • Keyless
Q15 | _______________________ is a term used in cryptography that refers to a message beforeencryption or after decryption.
  • Cipher text
  • Plain text
  • Plain script
  • Original text
Q16 | The ________ is encrypted text
  • cipher text
  • cipher scricpt
  • secret text
  • secret script
Q17 | _______________________ ensures that information are in a format that is true andcorrect to its original purposes.
  • Availability
  • Confidentiality
  • Cryptography
  • Integrity
Q18 | _____________________ ensures that information and resources are available to thosewho need them.
  • Availability
  • Confidentiality
  • Cryptography
  • Integrity
Q19 | _______________________ is the process of identifying an individual, usually based ona username and password.
  • Authentication
  • Authorization
  • integrity
  • crytography
Q20 | ___________________ is the process of giving individuals access to system objectsbased on their identity.
  • Authentication
  • Authorization
  • key
  • Confidentiality
Q21 | In symmetric-key cryptography, the key locks and unlocks the box is
  • Same
  • shared
  • private
  • Public
Q22 | The ciphers of today are called round ciphers because they involve
  • Single Round
  • Double Rounds
  • Multiple Round
  • Round about
Q23 | Symmetric-key cryptography started thousands of years ago when people needed toexchange
  • Files
  • Packets
  • Secrets
  • Tr
Q24 | The Advanced Encryption Standard (AES) was designed
  • National Institute of Standards and Technology
  • IBM
  • HP
  • Intel
Q25 | The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
  • SNMP (Simple Network Management Protocol)
  • SMTP (Simple Mail Transfer Protocol)
  • SS7 (Signalling System 7)
  • HTTP (Hyper Text Tr