a. confidentiality
B. integrity
c. authentication
d. Authorization
a. Confidentiality
B. Integrity
c. Authentication
d. Nonrepudiation
a. message digest
B. message summary
c. encrypted message
d. ENCRYPTION
a. encryption
B. decryption
c. hash
d. integrity
a. two
B. three
c. four
d. ten
a. fixed; variable
B. time-stamped; fixed
c. fixed; one-time
d. none of the above
a. CA
B. KDC
c. KDD
d. CD
a. public
B. session
c. complimentary
d. private
a. KDC
B. Kerberos
c. CA ion server and a ticket-granting server.
B. PKI
c. CA
a. Virus Attacks
B. Fire Attacks
c. Data Driven Attacks
d. Unauthorized Attacks
a. one-wayness
B. weak-collision-resistance
c. strong-collision-resistance
d. Keyless
a. Cipher text
B. Plain text
c. Plain script
d. Original text
a. cipher text
B. cipher scricpt
c. secret text
d. secret script
a. Availability
B. Confidentiality
c. Cryptography
d. Integrity
a. Authentication
B. Authorization
c. integrity
d. crytography
c. key
d. Confidentiality
a. Same
B. shared
c. private
d. Public
a. Single Round
B. Double Rounds
c. Multiple Round
d. Round about
a. Files
B. Packets
c. Secrets
d. Tr
a. National Institute of Standards and Technology
B. IBM
c. HP
d. Intel
a. SNMP (Simple Network Management Protocol)
B. SMTP (Simple Mail Transfer Protocol)
c. SS7 (Signalling System 7)
d. HTTP (Hyper Text Tr
Each set has max 25 mcqs
Download PDFs from app without Waiting