

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Science in Information Technology TY (BSc IT) , Bachelor of Science in Information Technology (BSc IT) .
1. |
Message_____ means that the data must arrive at the receiver exactly as sent. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | none of the above |
Answer» B. integrity |
2. |
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | none of the above |
Answer» C. authentication |
3. |
A(n) ________function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | none of the above |
Answer» C. hash |
4. |
The secret key between members needs to be created as a ______ key when two members contact KDC. |
A. | public |
B. | session |
C. | complimentary |
D. | none of the above |
Answer» B. session |
5. |
The ________ criterion ensures that a message cannot easily be forged. |
A. | one-wayness |
B. | weak-collision-resistance |
C. | strong-collision-resistance |
D. | none of the above |
Answer» B. weak-collision-resistance |
6. |
A(n) _____ is a trusted third party that assigns a symmetric key to two parties. |
A. | kdc |
B. | ca |
C. | kdd |
D. | none of the above |
Answer» A. kdc |
7. |
A witness used in entity authentication is ____________. |
A. | something known |
B. | something possessed |
C. | something inherent |
D. | all of the above |
Answer» D. all of the above |
8. |
A _______ message digest is used as an MDC. |
A. | keyless |
B. | keyed |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» A. keyless |
9. |
A(n)______ creates a secret key only between a member and the center. |
A. | ca |
B. | kdc |
C. | kdd |
D. | none of the above |
Answer» B. kdc |
10. |
________ means to prove the identity of the entity that tries to access the system's resources. |
A. | message authentication |
B. | entity authentication |
C. | message confidentiality |
D. | none of the above |
Answer» B. entity authentication |
11. |
A ________ signature is included in the document; a _______ signature is a separate entity. |
A. | conventional; digital |
B. | digital; digital |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» A. conventional; digital |
12. |
If _________ is needed, a cryptosystem must be applied over the scheme. |
A. | integrity |
B. | confidentiality |
C. | nonrepudiation |
D. | authentication |
Answer» B. confidentiality |
13. |
Digital signature provides ________. |
A. | authentication |
B. | non-repudiation |
C. | both (a) and (b) |
D. | neither (a) nor (b) |
Answer» C. both (a) and (b) |
14. |
Digital signature cannot provide ________ for the message. |
A. | integrity |
B. | confidentiality |
C. | non-repudiation |
D. | authentication |
Answer» B. confidentiality |
15. |
To authenticate the data origin, one needs a(n) _______. |
A. | mdc |
B. | mac |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» A. mdc |
16. |
A(n) _________ can be used to preserve the integrity of a document or a message. |
A. | message digest |
B. | message summary |
C. | encrypted message |
D. | none of the above |
Answer» A. message digest |
17. |
Challenge-response authentication can be done using ________. |
A. | symmetric-key ciphers |
B. | asymmetric-key ciphers |
C. | keyed-hash functions |
D. | all of the above |
Answer» D. all of the above |
18. |
The _______criterion ensures that we cannot find two messages that hash to the same digest. |
A. | one-wayness |
B. | weak-collision-resistance |
C. | strong-collision-resistance |
D. | none of the above |
Answer» C. strong-collision-resistance |
19. |
A digital signature needs a(n)_________ system. |
A. | symmetric-key |
B. | asymmetric-key |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» B. asymmetric-key |
20. |
A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate. |
A. | kdc |
B. | kerberos |
C. | ca |
D. | none of the above |
Answer» C. ca |
21. |
Message ________ means that the sender and the receiver expect privacy. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | none of the above |
Answer» A. confidentiality |
22. |
In ________ authentication, the claimant proves that she knows a secret without actually sending it. |
A. | password-based |
B. | challenge-response |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» B. challenge-response |
23. |
In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses. |
A. | message authentication |
B. | entity authentication |
C. | message confidentiality |
D. | message integrity |
Answer» B. entity authentication |
24. |
The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given. |
A. | one-wayness |
B. | weak-collision-resistance |
C. | strong-collision-resistance |
D. | none of the above |
Answer» A. one-wayness |
25. |
A(n) ______ is a hierarchical system that answers queries about key certification. |
A. | kdc |
B. | pki |
C. | ca |
D. | none of the above |
Answer» C. ca |
26. |
_________ means that a sender must not be able to deny sending a message that he sent. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | nonrepudiation |
Answer» D. nonrepudiation |
27. |
A hash function must meet ________ criteria. |
A. | two |
B. | three |
C. | four |
D. | none of the above |
Answer» B. three |
28. |
__________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server. |
A. | kdc |
B. | kerberos |
C. | ca |
D. | none of the above |
Answer» B. kerberos |
29. |
Password-based authentication can be divided into two broad categories: _______ and _______. |
A. | fixed; variable |
B. | time-stamped; fixed |
C. | fixed; one-time |
D. | none of the above |
Answer» C. fixed; one-time |
30. |
_________ operates in the transport mode or the tunnel mode. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» A. ipsec |
31. |
IKE creates SAs for _____. |
A. | ssl |
B. | pgp |
C. | ipsec |
D. | vp |
Answer» C. ipsec |
32. |
______ provides either authentication or encryption, or both, for packets at the IP level. |
A. | ah |
B. | esp |
C. | pgp |
D. | ssl |
Answer» B. esp |
33. |
One security protocol for the e-mail system is _________. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» C. pgp |
34. |
IKE is a complex protocol based on ______ other protocols. |
A. | two |
B. | three |
C. | four |
D. | five |
Answer» B. three |
35. |
IPSec defines two protocols: _______ and ________. |
A. | ah; ssl |
B. | pgp; esp |
C. | ah; esp |
D. | all of the above |
Answer» A. ah; ssl |
36. |
In the ______ mode, IPSec protects information delivered from the transport layer to the network layer. |
A. | transport |
B. | tunnel |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» A. transport |
37. |
______ is the protocol designed to create security associations, both inbound and outbound. |
A. | sa |
B. | ca |
C. | kdc |
D. | ike |
Answer» D. ike |
38. |
A _______network is used inside an organization. |
A. | private |
B. | public |
C. | semi-private |
D. | semi-public |
Answer» A. private |
39. |
SSL provides _________. |
A. | message integrity |
B. | confidentiality |
C. | compression |
D. | all of the above |
Answer» D. all of the above |
40. |
The Internet authorities have reserved addresses for _______. |
A. | intranets |
B. | internets |
C. | extranets |
D. | none of the above |
Answer» D. none of the above |
41. |
An _________ is a network that allows authorized access from outside users. |
A. | intranet |
B. | internet |
C. | extranet |
D. | none of the above |
Answer» C. extranet |
42. |
_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» A. ipsec |
43. |
IKE uses _______. |
A. | oakley |
B. | skeme |
C. | isakmp |
D. | all of the above |
Answer» D. all of the above |
44. |
IPSec uses a set of SAs called the ________. |
A. | sad |
B. | sab |
C. | sadb |
D. | none of the above |
Answer» C. sadb |
45. |
An ________ is a private network that uses the Internet model. |
A. | intranet |
B. | internet |
C. | extranet |
D. | none of the above |
Answer» A. intranet |
46. |
______ is actually an IETF version of _____. |
A. | tls; tss |
B. | ssl; tls |
C. | tls; ssl |
D. | ssl; slt |
Answer» C. tls; ssl |
47. |
In ______, there is a single path from the fully trusted authority to any certificate. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» A. x509 |
48. |
The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session. |
A. | list of protocols |
B. | cipher suite |
C. | list of keys |
D. | none of the above |
Answer» B. cipher suite |
49. |
A ______ provides privacy for LANs that must communicate through the global Internet. |
A. | vpp |
B. | vnp |
C. | vnn |
D. | vpn |
Answer» D. vpn |
50. |
_______ uses the idea of certificate trust levels. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» B. pgp |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.