Network Security Set 1
On This Page
This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on Network Security Set 1
Q1 | Message ________ means privacy that the sender and reciever expect privacy.
- confidentiality
- integrity
- authentication
- Authorization
Q2 | Message_____ means that the data must arrive at the reciever exactly as sent
- confidentiality
- integrity
- authentication
- Authorization
Q3 | Message _______ means that the receiver is ensured that the message message is coming fromthe indended sender not an imposter.
- confidentiality
- integrity
- authentication
- Authorization
Q4 | __________means that a sender must not be able to deny sending a message that he sent.
- Confidentiality
- Integrity
- Authentication
- Nonrepudiation
Q5 | A(n) can be used to preserve the integrity of a document or amessage.
- message digest
- message summary
- encrypted message
- ENCRYPTION
Q6 | A(n) function creates a message digest out of a message.
- encryption
- decryption
- hash
- integrity
Q7 | A hash function must meet criteria.
- two
- three
- four
- ten
Q8 | Password-based authentication can be divided into two broad categories: and_____
- fixed; variable
- time-stamped; fixed
- fixed; one-time
- none of the above
Q9 | _ creates a secret key only between a member and the center.
- CA
- KDC
- KDD
- CD
Q10 | The secret key between members needs to be created as a ________key when two members contact KDC.
- public
- session
- complimentary
- private
Q11 | is a popular session key creator protocol that requires an authentica
- KDC
- Kerberos
- CA ion server and a ticket-granting server.
- CD
Q12 | A(n) is a hierarchical system that answers queries about keycertification.
- KDC
- PKI
- CA
- CD
Q13 | Firewalls are to protect against
- Virus Attacks
- Fire Attacks
- Data Driven Attacks
- Unauthorized Attacks
Q14 | The ________criterion ensures that we cannot find two messages that hash to thesame digest
- one-wayness
- weak-collision-resistance
- strong-collision-resistance
- Keyless
Q15 | _______________________ is a term used in cryptography that refers to a message beforeencryption or after decryption.
- Cipher text
- Plain text
- Plain script
- Original text
Q16 | The ________ is encrypted text
- cipher text
- cipher scricpt
- secret text
- secret script
Q17 | _______________________ ensures that information are in a format that is true andcorrect to its original purposes.
- Availability
- Confidentiality
- Cryptography
- Integrity
Q18 | _____________________ ensures that information and resources are available to thosewho need them.
- Availability
- Confidentiality
- Cryptography
- Integrity
Q19 | _______________________ is the process of identifying an individual, usually based ona username and password.
- Authentication
- Authorization
- integrity
- crytography
Q20 | ___________________ is the process of giving individuals access to system objectsbased on their identity.
- Authentication
- Authorization
- key
- Confidentiality
Q21 | In symmetric-key cryptography, the key locks and unlocks the box is
- Same
- shared
- private
- Public
Q22 | The ciphers of today are called round ciphers because they involve
- Single Round
- Double Rounds
- Multiple Round
- Round about
Q23 | Symmetric-key cryptography started thousands of years ago when people needed toexchange
- Files
- Packets
- Secrets
- Tr
Q24 | The Advanced Encryption Standard (AES) was designed
- National Institute of Standards and Technology
- IBM
- HP
- Intel
Q25 | The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
- SNMP (Simple Network Management Protocol)
- SMTP (Simple Mail Transfer Protocol)
- SS7 (Signalling System 7)
- HTTP (Hyper Text Tr