McqMate
1. |
Message_____ means that the data must arrive at the receiver exactly as sent. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | none of the above |
Answer» B. integrity |
2. |
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | none of the above |
Answer» C. authentication |
3. |
A(n) ________function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | none of the above |
Answer» C. hash |
4. |
The secret key between members needs to be created as a ______ key when two members contact KDC. |
A. | public |
B. | session |
C. | complimentary |
D. | none of the above |
Answer» B. session |
5. |
The ________ criterion ensures that a message cannot easily be forged. |
A. | one-wayness |
B. | weak-collision-resistance |
C. | strong-collision-resistance |
D. | none of the above |
Answer» B. weak-collision-resistance |
6. |
A(n) _____ is a trusted third party that assigns a symmetric key to two parties. |
A. | kdc |
B. | ca |
C. | kdd |
D. | none of the above |
Answer» A. kdc |
7. |
A witness used in entity authentication is ____________. |
A. | something known |
B. | something possessed |
C. | something inherent |
D. | all of the above |
Answer» D. all of the above |
8. |
A _______ message digest is used as an MDC. |
A. | keyless |
B. | keyed |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» A. keyless |
9. |
A(n)______ creates a secret key only between a member and the center. |
A. | ca |
B. | kdc |
C. | kdd |
D. | none of the above |
Answer» B. kdc |
10. |
________ means to prove the identity of the entity that tries to access the system's resources. |
A. | message authentication |
B. | entity authentication |
C. | message confidentiality |
D. | none of the above |
Answer» B. entity authentication |
11. |
A ________ signature is included in the document; a _______ signature is a separate entity. |
A. | conventional; digital |
B. | digital; digital |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» A. conventional; digital |
12. |
If _________ is needed, a cryptosystem must be applied over the scheme. |
A. | integrity |
B. | confidentiality |
C. | nonrepudiation |
D. | authentication |
Answer» B. confidentiality |
13. |
Digital signature provides ________. |
A. | authentication |
B. | non-repudiation |
C. | both (a) and (b) |
D. | neither (a) nor (b) |
Answer» C. both (a) and (b) |
14. |
Digital signature cannot provide ________ for the message. |
A. | integrity |
B. | confidentiality |
C. | non-repudiation |
D. | authentication |
Answer» B. confidentiality |
15. |
To authenticate the data origin, one needs a(n) _______. |
A. | mdc |
B. | mac |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» A. mdc |
16. |
A(n) _________ can be used to preserve the integrity of a document or a message. |
A. | message digest |
B. | message summary |
C. | encrypted message |
D. | none of the above |
Answer» A. message digest |
17. |
Challenge-response authentication can be done using ________. |
A. | symmetric-key ciphers |
B. | asymmetric-key ciphers |
C. | keyed-hash functions |
D. | all of the above |
Answer» D. all of the above |
18. |
The _______criterion ensures that we cannot find two messages that hash to the same digest. |
A. | one-wayness |
B. | weak-collision-resistance |
C. | strong-collision-resistance |
D. | none of the above |
Answer» C. strong-collision-resistance |
19. |
A digital signature needs a(n)_________ system. |
A. | symmetric-key |
B. | asymmetric-key |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» B. asymmetric-key |
20. |
A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate. |
A. | kdc |
B. | kerberos |
C. | ca |
D. | none of the above |
Answer» C. ca |
21. |
Message ________ means that the sender and the receiver expect privacy. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | none of the above |
Answer» A. confidentiality |
22. |
In ________ authentication, the claimant proves that she knows a secret without actually sending it. |
A. | password-based |
B. | challenge-response |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» B. challenge-response |
23. |
In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses. |
A. | message authentication |
B. | entity authentication |
C. | message confidentiality |
D. | message integrity |
Answer» B. entity authentication |
24. |
The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given. |
A. | one-wayness |
B. | weak-collision-resistance |
C. | strong-collision-resistance |
D. | none of the above |
Answer» A. one-wayness |
25. |
A(n) ______ is a hierarchical system that answers queries about key certification. |
A. | kdc |
B. | pki |
C. | ca |
D. | none of the above |
Answer» C. ca |
26. |
_________ means that a sender must not be able to deny sending a message that he sent. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | nonrepudiation |
Answer» D. nonrepudiation |
27. |
A hash function must meet ________ criteria. |
A. | two |
B. | three |
C. | four |
D. | none of the above |
Answer» B. three |
28. |
__________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server. |
A. | kdc |
B. | kerberos |
C. | ca |
D. | none of the above |
Answer» B. kerberos |
29. |
Password-based authentication can be divided into two broad categories: _______ and _______. |
A. | fixed; variable |
B. | time-stamped; fixed |
C. | fixed; one-time |
D. | none of the above |
Answer» C. fixed; one-time |
30. |
_________ operates in the transport mode or the tunnel mode. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» A. ipsec |
31. |
IKE creates SAs for _____. |
A. | ssl |
B. | pgp |
C. | ipsec |
D. | vp |
Answer» C. ipsec |
32. |
______ provides either authentication or encryption, or both, for packets at the IP level. |
A. | ah |
B. | esp |
C. | pgp |
D. | ssl |
Answer» B. esp |
33. |
One security protocol for the e-mail system is _________. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» C. pgp |
34. |
IKE is a complex protocol based on ______ other protocols. |
A. | two |
B. | three |
C. | four |
D. | five |
Answer» B. three |
35. |
IPSec defines two protocols: _______ and ________. |
A. | ah; ssl |
B. | pgp; esp |
C. | ah; esp |
D. | all of the above |
Answer» A. ah; ssl |
36. |
In the ______ mode, IPSec protects information delivered from the transport layer to the network layer. |
A. | transport |
B. | tunnel |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» A. transport |
37. |
______ is the protocol designed to create security associations, both inbound and outbound. |
A. | sa |
B. | ca |
C. | kdc |
D. | ike |
Answer» D. ike |
38. |
A _______network is used inside an organization. |
A. | private |
B. | public |
C. | semi-private |
D. | semi-public |
Answer» A. private |
39. |
SSL provides _________. |
A. | message integrity |
B. | confidentiality |
C. | compression |
D. | all of the above |
Answer» D. all of the above |
40. |
The Internet authorities have reserved addresses for _______. |
A. | intranets |
B. | internets |
C. | extranets |
D. | none of the above |
Answer» D. none of the above |
41. |
An _________ is a network that allows authorized access from outside users. |
A. | intranet |
B. | internet |
C. | extranet |
D. | none of the above |
Answer» C. extranet |
42. |
_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» A. ipsec |
43. |
IKE uses _______. |
A. | oakley |
B. | skeme |
C. | isakmp |
D. | all of the above |
Answer» D. all of the above |
44. |
IPSec uses a set of SAs called the ________. |
A. | sad |
B. | sab |
C. | sadb |
D. | none of the above |
Answer» C. sadb |
45. |
An ________ is a private network that uses the Internet model. |
A. | intranet |
B. | internet |
C. | extranet |
D. | none of the above |
Answer» A. intranet |
46. |
______ is actually an IETF version of _____. |
A. | tls; tss |
B. | ssl; tls |
C. | tls; ssl |
D. | ssl; slt |
Answer» C. tls; ssl |
47. |
In ______, there is a single path from the fully trusted authority to any certificate. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» A. x509 |
48. |
The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session. |
A. | list of protocols |
B. | cipher suite |
C. | list of keys |
D. | none of the above |
Answer» B. cipher suite |
49. |
A ______ provides privacy for LANs that must communicate through the global Internet. |
A. | vpp |
B. | vnp |
C. | vnn |
D. | vpn |
Answer» D. vpn |
50. |
_______ uses the idea of certificate trust levels. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» B. pgp |
51. |
IPSec in the ______ mode does not protect the IP header. |
A. | transport |
B. | tunnel |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» A. transport |
52. |
________ provides privacy, integrity, and authentication in e-mail. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» C. pgp |
53. |
In _____, there can be multiple paths from fully or partially trusted authorities. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» B. pgp |
54. |
______ provides authentication at the IP level. |
A. | ah |
B. | esp |
C. | pgp |
D. | ssl |
Answer» A. ah |
55. |
In _______, the cryptographic algorithms and secrets are sent with the message. |
A. | ipsec |
B. | ssl |
C. | tls |
D. | pgp |
Answer» D. pgp |
56. |
______ is designed to provide security and compression services to data generated from the application layer. |
A. | ssl |
B. | tls |
C. | either (a) or (b) |
D. | both (a) and (b) |
Answer» D. both (a) and (b) |
57. |
_______ provide security at the transport layer. |
A. | ssl |
B. | tls |
C. | either (a) or (b) |
D. | both (a) and (b) |
Answer» D. both (a) and (b) |
58. |
______ was invented by Phil Zimmerman. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» C. pgp |
59. |
A _______ layer security protocol provides end-to-end security services for applications. |
A. | data link |
B. | network |
C. | transport |
D. | none of the above |
Answer» C. transport |
60. |
In PGP, to exchange e-mail messages, a user needs a ring of _______ keys. |
A. | secret |
B. | public |
C. | either (a) or (b) |
D. | both (a) and (b) |
Answer» B. public |
61. |
A user needs to send the server some information. The request line method is _______. |
A. | option |
B. | patch |
C. | post |
D. | none of the above |
Answer» C. post |
62. |
In a URL, the _______ is the client-server program used to retrieve the document. |
A. | path |
B. | protocol |
C. | host |
D. | none of the above |
Answer» B. protocol |
63. |
A _______ document is created by a Web server whenever a browser requests the document. |
A. | static |
B. | dynamic |
C. | active |
D. | none of the above |
Answer» B. dynamic |
64. |
One way to create an active document is to use __________. |
A. | cgi |
B. | java stand-alone programs |
C. | java applets |
D. | none of the above |
Answer» C. java applets |
65. |
A cookie is made by the ________ and eaten by the _________. |
A. | client; client |
B. | client; server |
C. | server; server |
D. | none of the above |
Answer» C. server; server |
66. |
A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only. |
A. | static |
B. | dynamic |
C. | active |
D. | none of the above |
Answer» A. static |
67. |
The _________ is a standard for specifying any kind of information on the Internet. |
A. | url |
B. | ulr |
C. | rlu |
D. | none of the above |
Answer» A. url |
68. |
_________ is a repository of information linked together from points all over the world. |
A. | the www |
B. | http |
C. | html |
D. | none of the above |
Answer» A. the www |
69. |
Which of the following is present in both an HTTP request line and a status line? |
A. | http version number |
B. | url |
C. | status code |
D. | none of the above |
Answer» A. http version number |
70. |
Active documents are sometimes referred to as _________ dynamic documents. |
A. | client-site |
B. | server-site |
C. | both a and b |
D. | none of the above |
Answer» A. client-site |
71. |
HTTP uses the services of _________ on well-known port 80. |
A. | udp |
B. | ip |
C. | tcp |
D. | none of the above |
Answer» C. tcp |
72. |
Dynamic documents are sometimes referred to as _________ dynamic documents. |
A. | client-site |
B. | server-site |
C. | both a and b |
D. | none of the above |
Answer» B. server-site |
73. |
For many applications, we need a program or a script to be run at the client site. These are called _______________ documents. |
A. | static |
B. | dynamic |
C. | active |
D. | none of the above |
Answer» C. active |
74. |
In HTTP, a _______ server is a computer that keeps copies of responses to recent requests. |
A. | regular |
B. | proxy |
C. | both a and b |
D. | none of the above |
Answer» B. proxy |
75. |
The HTTP request line contains a _______ method to get information about a document without retrieving the document itself. |
A. | head |
B. | post |
C. | copy |
D. | none of the above |
Answer» A. head |
76. |
A response message always contains _______. |
A. | a header and a body |
B. | a request line and a header |
C. | a status line and a header |
D. | none of the above |
Answer» C. a status line and a header |
77. |
In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon. |
A. | path |
B. | protocol |
C. | host |
D. | none of the above |
Answer» D. none of the above |
78. |
An applet is _______ document application program. |
A. | a static |
B. | an active |
C. | a passive |
D. | a dynamic |
Answer» B. an active |
79. |
The documents in the WWW can be grouped into ______ broad categories. |
A. | two |
B. | three |
C. | four |
D. | none of the above |
Answer» B. three |
80. |
_____________ is a language for creating Web pages. |
A. | http |
B. | html |
C. | fttp |
D. | none of the above |
Answer» B. html |
81. |
___________ is a technology that creates and handles dynamic documents. |
A. | gic |
B. | cgi |
C. | gci |
D. | none of the above |
Answer» B. cgi |
82. |
The HTTP request line contains a _______ method to request a document from the server. |
A. | get |
B. | post |
C. | copy |
D. | none of the above |
Answer» A. get |
83. |
In a ___________connection, the server leaves the connection open for more requests after sending a response. |
A. | persistent |
B. | nonpersistent |
C. | both a and b |
D. | none of the above |
Answer» A. persistent |
84. |
An HTTP request message always contains _______. |
A. | a header and a body |
B. | a request line and a header |
C. | a status line, a header, and a body |
D. | one of the above |
Answer» B. a request line and a header |
85. |
In a ___________ connection, one TCP connection is made for each request/response. |
A. | persistent |
B. | nonpersistent |
C. | both a and b |
D. | none of the above |
Answer» B. nonpersistent |
86. |
In a URL, the _______ is the full name of the file where the information is located. |
A. | path |
B. | protocol |
C. | host |
D. | none of the above |
Answer» A. path |
87. |
In a URL, the ______ is the computer on which the information is located. |
A. | path |
B. | protocol |
C. | host |
D. | none of the above |
Answer» C. host |
88. |
HTTP version 1.1 specifies a _________connection by default. |
A. | persistent |
B. | nonpersistent |
C. | both a and b |
D. | none of the above |
Answer» A. persistent |
89. |
In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line. |
A. | request; response |
B. | response; request |
C. | response; status |
D. | none of the above |
Answer» D. none of the above |
90. |
The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server. |
A. | limited |
B. | vast |
C. | distributed |
D. | none of the above |
Answer» C. distributed |
Done Reading?