McqMate
1. |
Message ________ means privacy that the sender and reciever expect privacy. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | Authorization |
Answer» A. confidentiality |
2. |
Message_____ means that the data must arrive at the reciever exactly as sent |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | Authorization |
Answer» B. integrity |
3. |
Message _______ means that the receiver is ensured that the message message is coming from the indended sender not an imposter. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | Authorization |
Answer» C. authentication |
4. |
__________means that a sender must not be able to deny sending a message that he sent. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Nonrepudiation |
Answer» D. Nonrepudiation |
5. |
A(n) can be used to preserve the integrity of a document or a message. |
A. | message digest |
B. | message summary |
C. | encrypted message |
D. | ENCRYPTION |
Answer» A. message digest |
6. |
A(n) function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | integrity |
Answer» C. hash |
7. |
A hash function must meet criteria. |
A. | two |
B. | three |
C. | four |
D. | ten |
Answer» B. three |
8. |
Password-based authentication can be divided into two broad categories: and _____ |
A. | fixed; variable |
B. | time-stamped; fixed |
C. | fixed; one-time |
D. | none of the above |
Answer» C. fixed; one-time |
9. |
_ creates a secret key only between a member and the center. |
A. | CA |
B. | KDC |
C. | KDD |
D. | CD |
Answer» B. KDC |
10. |
The secret key between members needs to be created as a ________ key when two members contact KDC. |
A. | public |
B. | session |
C. | complimentary |
D. | private |
Answer» B. session |
11. |
is a popular session key creator protocol that requires an authentica |
A. | KDC |
B. | Kerberos |
C. | CA ion server and a ticket-granting server. |
D. | CD |
Answer» A. KDC |
12. |
A(n) is a hierarchical system that answers queries about key certification. |
A. | KDC |
B. | PKI |
C. | CA |
D. | CD |
Answer» C. CA |
13. |
Firewalls are to protect against |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Unauthorized Attacks |
Answer» D. Unauthorized Attacks |
14. |
The ________criterion ensures that we cannot find two messages that hash to the same digest |
A. | one-wayness |
B. | weak-collision-resistance |
C. | strong-collision-resistance |
D. | Keyless |
Answer» B. weak-collision-resistance |
15. |
_______________________ is a term used in cryptography that refers to a message before encryption or after decryption. |
A. | Cipher text |
B. | Plain text |
C. | Plain script |
D. | Original text |
Answer» A. Cipher text |
16. |
The ________ is encrypted text |
A. | cipher text |
B. | cipher scricpt |
C. | secret text |
D. | secret script |
Answer» C. secret text |
17. |
_______________________ ensures that information are in a format that is true and correct to its original purposes. |
A. | Availability |
B. | Confidentiality |
C. | Cryptography |
D. | Integrity |
Answer» A. Availability |
18. |
_____________________ ensures that information and resources are available to those who need them. |
A. | Availability |
B. | Confidentiality |
C. | Cryptography |
D. | Integrity |
Answer» D. Integrity |
19. |
_______________________ is the process of identifying an individual, usually based on a username and password. |
A. | Authentication |
B. | Authorization |
C. | integrity |
D. | crytography |
Answer» A. Authentication |
20. |
___________________ is the process of giving individuals access to system objects based on their identity. |
A. | Authentication |
B. | Authorization |
C. | key |
D. | Confidentiality |
Answer» B. Authorization |
21. |
In symmetric-key cryptography, the key locks and unlocks the box is |
A. | Same |
B. | shared |
C. | private |
D. | Public |
Answer» A. Same |
22. |
The ciphers of today are called round ciphers because they involve |
A. | Single Round |
B. | Double Rounds |
C. | Multiple Round |
D. | Round about |
Answer» C. Multiple Round |
23. |
Symmetric-key cryptography started thousands of years ago when people needed to exchange |
A. | Files |
B. | Packets |
C. | Secrets |
D. | Tr |
Answer» A. Files |
24. |
The Advanced Encryption Standard (AES) was designed |
A. | National Institute of Standards and Technology |
B. | IBM |
C. | HP |
D. | Intel |
Answer» A. National Institute of Standards and Technology |
25. |
The Mobile Application Protocol (MAP) typically runs on top of which protocol ? |
A. | SNMP (Simple Network Management Protocol) |
B. | SMTP (Simple Mail Transfer Protocol) |
C. | SS7 (Signalling System 7) |
D. | HTTP (Hyper Text Tr |
Answer» C. SS7 (Signalling System 7) |
26. |
If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment. |
A. | First |
B. | Middle |
C. | Last |
D. | Four |
Answer» A. First |
27. |
The design issue of Datalink Layer in OSI Reference Model is |
A. | Framing |
B. | Representation of bits |
C. | Synchronization of bits |
D. | Connection control |
Answer» A. Framing |
28. |
Data Encryption Techniques are particularly used for _______. |
A. | protecting data in Data Communication System |
B. | reduce Storage Space Requirement |
C. | enhances Data Integrity |
D. | decreases Data Integrity |
Answer» A. protecting data in Data Communication System |
29. |
An example of a layer that is absent in broadcast networks is: |
A. | Physical layer |
B. | Presentation layer |
C. | Network layer Application layer |
D. | none |
Answer» C. Network layer Application layer |
30. |
Encryption and Decryption is the responsibility of ___ Layer. |
A. | Physical |
B. | Network |
C. | Application |
D. | Datalink |
Answer» C. Application |
31. |
The VLF and LF bauds use propagation for communication |
A. | Ground |
B. | Sky |
C. | Line of sight |
D. | Space |
Answer» A. Ground |
32. |
The start and stop bits are used in serial communication for |
A. | error detection |
B. | error correction |
C. | Synchronization |
D. | slowing down the communication |
Answer» C. Synchronization |
33. |
___________ is a type of transmission impairment in which the Signal looses strength due to The resistance of the transmission medium. |
A. | Attenuation |
B. | Distortion |
C. | Noise |
D. | Decible |
Answer» A. Attenuation |
34. |
________________ is a bit-oriented protocol for communication over point-to-point and multi-point links . |
A. | Stop-and-wait |
B. | HDLC |
C. | Sliding window |
D. | Go-back-N |
Answer» A. Stop-and-wait |
35. |
In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text. |
A. | polyalphabetic |
B. | mono alphabetic |
C. | Transpositional |
D. | multialphabetic |
Answer» B. mono alphabetic |
36. |
Which of the following is not associated with the session layer ? |
A. | Dialog control |
B. | Token management |
C. | Semantics of the information transmitted |
D. | Synchronization |
Answer» C. Semantics of the information transmitted |
37. |
What is the size of the 'total length' field in IPv4 datagram ? |
A. | 4 bits |
B. | 8 bits |
C. | 16 bits |
D. | 32 bits |
Answer» C. 16 bits |
38. |
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called : |
A. | Strobing |
B. | Amplification |
C. | Conditioning |
D. | Quantization |
Answer» D. Quantization |
39. |
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender. |
A. | Broadcasting |
B. | Unicasting |
C. | Packet switching |
D. | Circuit switching |
Answer» D. Circuit switching |
40. |
Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? |
A. | FIN |
B. | RST |
C. | SYN |
D. | PSH |
Answer» A. FIN |
41. |
Which are the two modes of IP security? |
A. | Transport and certificate |
B. | Transport and tunnel |
C. | Certificate and tunnel |
D. | Preshared and tr |
Answer» A. Transport and certificate |
Done Reading?