Network Security solved MCQs

1 of 2

1. Message ________ means privacy that the sender and reciever expect privacy.

a. confidentiality

B. integrity

c. authentication

d. Authorization

2. Message_____ means that the data must arrive at the reciever exactly as sent

a. confidentiality

B. integrity

c. authentication

d. Authorization

3. Message _______ means that the receiver is ensured that the message message is coming fromthe indended sender not an imposter.

a. confidentiality

B. integrity

c. authentication

d. Authorization

4. __________means that a sender must not be able to deny sending a message that he sent.

a. Confidentiality

B. Integrity

c. Authentication

d. Nonrepudiation

5. A(n) can be used to preserve the integrity of a document or amessage.

a. message digest

B. message summary

c. encrypted message


6. A(n) function creates a message digest out of a message.

a. encryption

B. decryption

c. hash

d. integrity

7. A hash function must meet criteria.

a. two

B. three

c. four

d. ten

8. Password-based authentication can be divided into two broad categories: and_____

a. fixed; variable

B. time-stamped; fixed

c. fixed; one-time

d. none of the above

9. _ creates a secret key only between a member and the center.

a. CA


c. KDD

d. CD

10. The secret key between members needs to be created as a ________key when two members contact KDC.

a. public

B. session

c. complimentary

d. private

11. is a popular session key creator protocol that requires an authentica

a. KDC

B. Kerberos

c. CA ion server and a ticket-granting server.

d. CD

12. A(n) is a hierarchical system that answers queries about keycertification.

a. KDC


c. CA

d. CD

13. Firewalls are to protect against

a. Virus Attacks

B. Fire Attacks

c. Data Driven Attacks

d. Unauthorized Attacks

14. The ________criterion ensures that we cannot find two messages that hash to thesame digest

a. one-wayness

B. weak-collision-resistance

c. strong-collision-resistance

d. Keyless

15. _______________________ is a term used in cryptography that refers to a message beforeencryption or after decryption.

a. Cipher text

B. Plain text

c. Plain script

d. Original text

16. The ________ is encrypted text

a. cipher text

B. cipher scricpt

c. secret text

d. secret script

17. _______________________ ensures that information are in a format that is true andcorrect to its original purposes.

a. Availability

B. Confidentiality

c. Cryptography

d. Integrity

18. _____________________ ensures that information and resources are available to thosewho need them.

a. Availability

B. Confidentiality

c. Cryptography

d. Integrity

19. _______________________ is the process of identifying an individual, usually based ona username and password.

a. Authentication

B. Authorization

c. integrity

d. crytography

20. ___________________ is the process of giving individuals access to system objectsbased on their identity.

a. Authentication

B. Authorization

c. key

d. Confidentiality

21. In symmetric-key cryptography, the key locks and unlocks the box is

a. Same

B. shared

c. private

d. Public

22. The ciphers of today are called round ciphers because they involve

a. Single Round

B. Double Rounds

c. Multiple Round

d. Round about

23. Symmetric-key cryptography started thousands of years ago when people needed toexchange

a. Files

B. Packets

c. Secrets

d. Tr

24. The Advanced Encryption Standard (AES) was designed

a. National Institute of Standards and Technology


c. HP

d. Intel

25. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?

a. SNMP (Simple Network Management Protocol)

B. SMTP (Simple Mail Transfer Protocol)

c. SS7 (Signalling System 7)

d. HTTP (Hyper Text Tr


Question and answers in Network Security,

Network Security Multiple choice questions and answers,

Important MCQ of Network Security,

Solved MCQs for Network Security,

Network Security MCQ with answers PDF download