90+ Internet Security Solved MCQs

1.

Message_____ means that the data must arrive at the receiver exactly as sent.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» B. integrity
2.

Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» C. authentication
3.

A(n) ________function creates a message digest out of a message.

A. encryption
B. decryption
C. hash
D. none of the above
Answer» C. hash
4.

The secret key between members needs to be created as a ______ key when two members contact KDC.

A. public
B. session
C. complimentary
D. none of the above
Answer» B. session
5.

The ________ criterion ensures that a message cannot easily be forged.

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer» B. weak-collision-resistance
6.

A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A. kdc
B. ca
C. kdd
D. none of the above
Answer» A. kdc
7.

A witness used in entity authentication is ____________.

A. something known
B. something possessed
C. something inherent
D. all of the above
Answer» D. all of the above
8.

A _______ message digest is used as an MDC.

A. keyless
B. keyed
C. either (a) or (b)
D. neither (a) nor (b)
Answer» A. keyless
9.

A(n)______ creates a secret key only between a member and the center.

A. ca
B. kdc
C. kdd
D. none of the above
Answer» B. kdc
10.

________ means to prove the identity of the entity that tries to access the system's resources.

A. message authentication
B. entity authentication
C. message confidentiality
D. none of the above
Answer» B. entity authentication
11.

A ________ signature is included in the document; a _______ signature is a separate entity.

A. conventional; digital
B. digital; digital
C. either (a) or (b)
D. neither (a) nor (b)
Answer» A. conventional; digital
12.

If _________ is needed, a cryptosystem must be applied over the scheme.

A. integrity
B. confidentiality
C. nonrepudiation
D. authentication
Answer» B. confidentiality
13.

Digital signature provides ________.

A. authentication
B. non-repudiation
C. both (a) and (b)
D. neither (a) nor (b)
Answer» C. both (a) and (b)
14.

Digital signature cannot provide ________ for the message.

A. integrity
B. confidentiality
C. non-repudiation
D. authentication
Answer» B. confidentiality
15.

To authenticate the data origin, one needs a(n) _______.

A. mdc
B. mac
C. either (a) or (b)
D. neither (a) nor (b)
Answer» A. mdc
16.

A(n) _________ can be used to preserve the integrity of a document or a message.

A. message digest
B. message summary
C. encrypted message
D. none of the above
Answer» A. message digest
17.

Challenge-response authentication can be done using ________.

A. symmetric-key ciphers
B. asymmetric-key ciphers
C. keyed-hash functions
D. all of the above
Answer» D. all of the above
18.

The _______criterion ensures that we cannot find two messages that hash to the same digest.

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer» C. strong-collision-resistance
19.

A digital signature needs a(n)_________ system.

A. symmetric-key
B. asymmetric-key
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. asymmetric-key
20.

A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.

A. kdc
B. kerberos
C. ca
D. none of the above
Answer» C. ca
21.

Message ________ means that the sender and the receiver expect privacy.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» A. confidentiality
22.

In ________ authentication, the claimant proves that she knows a secret without actually sending it.

A. password-based
B. challenge-response
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. challenge-response
23.

In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

A. message authentication
B. entity authentication
C. message confidentiality
D. message integrity
Answer» B. entity authentication
24.

The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer» A. one-wayness
25.

A(n) ______ is a hierarchical system that answers queries about key certification.

A. kdc
B. pki
C. ca
D. none of the above
Answer» C. ca
26.

_________ means that a sender must not be able to deny sending a message that he sent.

A. confidentiality
B. integrity
C. authentication
D. nonrepudiation
Answer» D. nonrepudiation
27.

A hash function must meet ________ criteria.

A. two
B. three
C. four
D. none of the above
Answer» B. three
28.

__________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.

A. kdc
B. kerberos
C. ca
D. none of the above
Answer» B. kerberos
29.

Password-based authentication can be divided into two broad categories: _______ and _______.

A. fixed; variable
B. time-stamped; fixed
C. fixed; one-time
D. none of the above
Answer» C. fixed; one-time
30.

_________ operates in the transport mode or the tunnel mode.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» A. ipsec
31.

IKE creates SAs for _____.

A. ssl
B. pgp
C. ipsec
D. vp
Answer» C. ipsec
32.

______ provides either authentication or encryption, or both, for packets at the IP level.

A. ah
B. esp
C. pgp
D. ssl
Answer» B. esp
33.

One security protocol for the e-mail system is _________.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» C. pgp
34.

IKE is a complex protocol based on ______ other protocols.

A. two
B. three
C. four
D. five
Answer» B. three
35.

IPSec defines two protocols: _______ and ________.

A. ah; ssl
B. pgp; esp
C. ah; esp
D. all of the above
Answer» A. ah; ssl
36.

In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
Answer» A. transport
37.

______ is the protocol designed to create security associations, both inbound and outbound.

A. sa
B. ca
C. kdc
D. ike
Answer» D. ike
38.

A _______network is used inside an organization.

A. private
B. public
C. semi-private
D. semi-public
Answer» A. private
39.

SSL provides _________.

A. message integrity
B. confidentiality
C. compression
D. all of the above
Answer» D. all of the above
40.

The Internet authorities have reserved addresses for _______.

A. intranets
B. internets
C. extranets
D. none of the above
Answer» D. none of the above
41.

An _________ is a network that allows authorized access from outside users.

A. intranet
B. internet
C. extranet
D. none of the above
Answer» C. extranet
42.

_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» A. ipsec
43.

IKE uses _______.

A. oakley
B. skeme
C. isakmp
D. all of the above
Answer» D. all of the above
44.

IPSec uses a set of SAs called the ________.

A. sad
B. sab
C. sadb
D. none of the above
Answer» C. sadb
45.

An ________ is a private network that uses the Internet model.

A. intranet
B. internet
C. extranet
D. none of the above
Answer» A. intranet
46.

______ is actually an IETF version of _____.

A. tls; tss
B. ssl; tls
C. tls; ssl
D. ssl; slt
Answer» C. tls; ssl
47.

In ______, there is a single path from the fully trusted authority to any certificate.

A. x509
B. pgp
C. kdc
D. none of the above
Answer» A. x509
48.

The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.

A. list of protocols
B. cipher suite
C. list of keys
D. none of the above
Answer» B. cipher suite
49.

A ______ provides privacy for LANs that must communicate through the global Internet.

A. vpp
B. vnp
C. vnn
D. vpn
Answer» D. vpn
50.

_______ uses the idea of certificate trust levels.

A. x509
B. pgp
C. kdc
D. none of the above
Answer» B. pgp
51.

IPSec in the ______ mode does not protect the IP header.

A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
Answer» A. transport
52.

________ provides privacy, integrity, and authentication in e-mail.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» C. pgp
53.

In _____, there can be multiple paths from fully or partially trusted authorities.

A. x509
B. pgp
C. kdc
D. none of the above
Answer» B. pgp
54.

______ provides authentication at the IP level.

A. ah
B. esp
C. pgp
D. ssl
Answer» A. ah
55.

In _______, the cryptographic algorithms and secrets are sent with the message.

A. ipsec
B. ssl
C. tls
D. pgp
Answer» D. pgp
56.

______ is designed to provide security and compression services to data generated from the application layer.

A. ssl
B. tls
C. either (a) or (b)
D. both (a) and (b)
Answer» D. both (a) and (b)
57.

_______ provide security at the transport layer.

A. ssl
B. tls
C. either (a) or (b)
D. both (a) and (b)
Answer» D. both (a) and (b)
58.

______ was invented by Phil Zimmerman.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» C. pgp
59.

A _______ layer security protocol provides end-to-end security services for applications.

A. data link
B. network
C. transport
D. none of the above
Answer» C. transport
60.

In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

A. secret
B. public
C. either (a) or (b)
D. both (a) and (b)
Answer» B. public
61.

A user needs to send the server some information. The request line method is _______.

A. option
B. patch
C. post
D. none of the above
Answer» C. post
62.

In a URL, the _______ is the client-server program used to retrieve the document.

A. path
B. protocol
C. host
D. none of the above
Answer» B. protocol
63.

A _______ document is created by a Web server whenever a browser requests the document.

A. static
B. dynamic
C. active
D. none of the above
Answer» B. dynamic
64.

One way to create an active document is to use __________.

A. cgi
B. java stand-alone programs
C. java applets
D. none of the above
Answer» C. java applets
65.

A cookie is made by the ________ and eaten by the _________.

A. client; client
B. client; server
C. server; server
D. none of the above
Answer» C. server; server
66.

A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.

A. static
B. dynamic
C. active
D. none of the above
Answer» A. static
67.

The _________ is a standard for specifying any kind of information on the Internet.

A. url
B. ulr
C. rlu
D. none of the above
Answer» A. url
68.

_________ is a repository of information linked together from points all over the world.

A. the www
B. http
C. html
D. none of the above
Answer» A. the www
69.

Which of the following is present in both an HTTP request line and a status line?

A. http version number
B. url
C. status code
D. none of the above
Answer» A. http version number
70.

Active documents are sometimes referred to as _________ dynamic documents.

A. client-site
B. server-site
C. both a and b
D. none of the above
Answer» A. client-site
71.

HTTP uses the services of _________ on well-known port 80.

A. udp
B. ip
C. tcp
D. none of the above
Answer» C. tcp
72.

Dynamic documents are sometimes referred to as _________ dynamic documents.

A. client-site
B. server-site
C. both a and b
D. none of the above
Answer» B. server-site
73.

For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.

A. static
B. dynamic
C. active
D. none of the above
Answer» C. active
74.

In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.

A. regular
B. proxy
C. both a and b
D. none of the above
Answer» B. proxy
75.

The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.

A. head
B. post
C. copy
D. none of the above
Answer» A. head
76.

A response message always contains _______.

A. a header and a body
B. a request line and a header
C. a status line and a header
D. none of the above
Answer» C. a status line and a header
77.

In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon.

A. path
B. protocol
C. host
D. none of the above
Answer» D. none of the above
78.

An applet is _______ document application program.

A. a static
B. an active
C. a passive
D. a dynamic
Answer» B. an active
79.

The documents in the WWW can be grouped into ______ broad categories.

A. two
B. three
C. four
D. none of the above
Answer» B. three
80.

_____________ is a language for creating Web pages.

A. http
B. html
C. fttp
D. none of the above
Answer» B. html
81.

___________ is a technology that creates and handles dynamic documents.

A. gic
B. cgi
C. gci
D. none of the above
Answer» B. cgi
82.

The HTTP request line contains a _______ method to request a document from the server.

A. get
B. post
C. copy
D. none of the above
Answer» A. get
83.

In a ___________connection, the server leaves the connection open for more requests after sending a response.

A. persistent
B. nonpersistent
C. both a and b
D. none of the above
Answer» A. persistent
84.

An HTTP request message always contains _______.

A. a header and a body
B. a request line and a header
C. a status line, a header, and a body
D. one of the above
Answer» B. a request line and a header
85.

In a ___________ connection, one TCP connection is made for each request/response.

A. persistent
B. nonpersistent
C. both a and b
D. none of the above
Answer» B. nonpersistent
86.

In a URL, the _______ is the full name of the file where the information is located.

A. path
B. protocol
C. host
D. none of the above
Answer» A. path
87.

In a URL, the ______ is the computer on which the information is located.

A. path
B. protocol
C. host
D. none of the above
Answer» C. host
88.

HTTP version 1.1 specifies a _________connection by default.

A. persistent
B. nonpersistent
C. both a and b
D. none of the above
Answer» A. persistent
89.

In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.

A. request; response
B. response; request
C. response; status
D. none of the above
Answer» D. none of the above
90.

The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server.

A. limited
B. vast
C. distributed
D. none of the above
Answer» C. distributed
Tags
Question and answers in Internet Security, Internet Security multiple choice questions and answers, Internet Security Important MCQs, Solved MCQs for Internet Security, Internet Security MCQs with answers PDF download