Practice Quiz in Network Security Part 1

(Last Updated On: December 21, 2017)

Practice Quiz in Network Security

This is the Online Practice Quiz in Network Security part 1 from the book, Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in Electronics Systems and Technologies (Communications Engineering) this will definitely help you test your knowledge and skill before taking the Board Exam.

Start Part I of the Online Practice Quiz

Quiz in Network Security

Question 1. Digital signature cannot provide ________ for the message.

A. integrity

B. confidentiality

C. nonrepudiation

D. authentication


Question 2. The secret key between members needs to be created as a ______ key when two members contact KDC.

A. public

B. session

C. complimentary

D. None of these


Question 3. A(n)______ creates a secret key only between a member and the center.

A. CA

B. KDC

C. KDD

D. None of these


Question 4. Message ________ means that the sender and the receiver expect privacy.

A. confidentiality

B. integrity

C. authentication

D. None of these


Question 5. In ________ authentication, the claimant proves that she knows a secret without actually sending it.

A. password-based

B. challenge-response

C. either (a) or (b)

D. neither (a) nor (b)


Question 6. A(n) _________ can be used to preserve the integrity of a document or a message.

A. message digest

B. message summary

C. encrypted message

D. None of these


Question 7. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

A. message authentication

B. entity authentication

C. message confidentiality

D. message integrity


Question 8. Challenge-response authentication can be done using ________.

A. symmetric-key ciphers

B. asymmetric-key ciphers

C. keyed-hash functions

D. All of these


Question 9. Password-based authentication can be divided into two broad categories: _______ and _______.

A. fixed; variable

B. time-stamped; fixed

C. fixed; one-time

D. None of these


Question 10. If _________ is needed, a cryptosystem must be applied over the scheme.

A. integrity

B. confidentiality

C. nonrepudiation

D. authentication

More Practice Quiz in Network Security

Practice Quiz Part 1

Practice Quiz Part 2

Practice Quiz Part 3

Complete Practice Quiz in Data Communications and Networking

Note: After taking this particular quiz, you can proceed to check all the topics.


Practice Quiz in Network Security Part 1
Rate this:

Add Comment

© 2014 PinoyBIX Engineering. © 2018 All Rights Reserved | How to Donate?
mcq in computer fundamentals
➡️ MCQ in Computer Fundamentals Series | ECE Board Exam
mcq in industrial electronics
➡️ MCQ in Industrial Electronics Series | ECE Board Exam
MCQ in Power Generators (Cells and Batteries) Part 5 | ECE Board Exam
➡️ MCQ in Power Generators, Sources, Principles, Applications Series | ECE Board Exam
mcq in electrical circuit
➡️ MCQ in Electrical Circuit Series | ECE Board Exam
Online Tool: Color Code Conversions
Online Tool: Color Code Conversions
Online Tool: Weight Measurement Conversions
Online Tool: Weight Measurement Conversions
Online Tool: Temperature Measurement Conversions
Online Tool: Temperature Measurement Conversions
Online Tool: Length Measurement Conversions
Online Tool: Length Measurement Conversions

Get FREE Review Course
in your inbox

Subscribe to our mailing list and get reviewers and updates to your email inbox.

Thank you for subscribing.

Something went wrong.