Forouzan: MCQ in Network Security

Print Friendly, PDF & Email
(Last Updated On: December 3, 2019)

Forouzan: MCQ in Network Security

This is the MCQ in Network Security from book the Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in datacom, topic in Electronics Systems and Technologies (Communications Engineering) this will definitely help you before taking the Board Exam.

Begin and Good luck!

Choose the letter of the best answer in each questions.

1. Message_____ means that the data must arrive at the receiver exactly as sent.

A) confidentiality

B) integrity

C) authentication

D) none of the above

View Answer:

Answer: Option B

Solution:

2. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A) confidentiality

B) integrity

C) authentication

D) none of the above

View Answer:

Answer: Option C

Solution:

3. A(n) ________function creates a message digest out of a message.

A) encryption

B) decryption

C) hash

D) none of the above

View Answer:

Answer: Option C

Solution:

4. The secret key between members needs to be created as a ______ key when two members contact KDC.

A) public

B) session

C) complimentary

D) none of the above

View Answer:

Answer: Option B

Solution:

5. The ________ criterion ensures that a message cannot easily be forged.

A) one-wayness

B) weak-collision-resistance

C) strong-collision-resistance

D) none of the above

View Answer:

Answer: Option B

Solution:

6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A) KDC

B) CA

C) KDD

D) none of the above

View Answer:

Answer: Option A

Solution:

7. A witness used in entity authentication is ____________.

A) something known

B) something possessed

C) something inherent

D) all of the above

View Answer:

Answer: Option D

Solution:

8. A _______ message digest is used as an MDC.

A) keyless

B) keyed

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

9. A(n)______ creates a secret key only between a member and the center.

A) CA

B) KDC

C) KDD

D) none of the above

View Answer:

Answer: Option B

Solution:

10. ________ means to prove the identity of the entity that tries to access the system’s resources.

A) Message authentication

B) Entity authentication

C) Message confidentiality

D) none of the above

View Answer:

Answer: Option B

Solution:

11. A ________ signature is included in the document; a _______ signature is a separate entity.

A) conventional; digital

B) digital; digital

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

12. If _________ is needed, a cryptosystem must be applied over the scheme.

A) integrity

B) confidentiality

C) nonrepudiation

D) authentication

View Answer:

Answer: Option B

Solution:

13. Digital signature provides ________.

A) authentication

B) nonrepudiation

C) both (a) and (b)

D) neither (a) nor (b)

View Answer:

Answer: Option C

Solution:

14. Digital signature cannot provide ________ for the message.

A) integrity

B) confidentiality

C) nonrepudiation

D) authentication

View Answer:

Answer: Option B

Solution:

15. To authenticate the data origin, one needs a(n) _______.

A) MDC

B) MAC

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

16. A(n) _________ can be used to preserve the integrity of a document or a message.

A) message digest

B) message summary

C) encrypted message

D) none of the above

View Answer:

Answer: Option A

Solution:

17. Challenge-response authentication can be done using ________.

A) symmetric-key ciphers

B) asymmetric-key ciphers

C) keyed-hash functions

D) all of the above

View Answer:

Answer: Option D

Solution:

18. The _______criterion ensures that we cannot find two messages that hash to the same digest.

A) one-wayness

B) weak-collision-resistance

C) strong-collision-resistance

D) none of the above

View Answer:

Answer: Option C

Solution:

19. A digital signature needs a(n)_________ system.

A) symmetric-key

B) asymmetric-key

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

20. A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.

A) KDC

B) Kerberos

C) CA

D) none of the above

View Answer:

Answer: Option C

Solution:

21. Message ________ means that the sender and the receiver expect privacy.

A) confidentiality

B) integrity

C) authentication

D) none of the above

View Answer:

Answer: Option A

Solution:

22. In ________ authentication, the claimant proves that she knows a secret without actually sending it.

A) password-based

B) challenge-response

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

23. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

A) message authentication

B) entity authentication

C) message confidentiality

D) message integrity

View Answer:

Answer: Option B

Solution:

24. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.

A) one-wayness

B) weak-collision-resistance

C) strong-collision-resistance

D) none of the above

View Answer:

Answer: Option A

Solution:

25. A(n) ______ is a hierarchical system that answers queries about key certification.

A) KDC

B) PKI

C) CA

D) none of the above

View Answer:

Answer: Option C

Solution:

26. _________ means that a sender must not be able to deny sending a message that he sent.

A) Confidentiality

B) Integrity

C) Authentication

D) Nonrepudiation

View Answer:

Answer: Option D

Solution:

27. A hash function must meet ________ criteria.

A) two

B) three

C) four

D) none of the above

View Answer:

Answer: Option B

Solution:

28. __________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.

A) KDC

B) Kerberos

C) CA

D) none of the above

View Answer:

Answer: Option B

Solution:

29. Password-based authentication can be divided into two broad categories: _______ and _______.

A) fixed; variable

B) time-stamped; fixed

C) fixed; one-time

D) none of the above

View Answer:

Answer: Option C

Solution:

Complete List of Chapter Quiz in Data Communications and Networking

Check your work.

Download File in PDF

DOWNLOAD PDF / PRINT
Print Friendly, PDF & Email
Help Me Makes a Difference!

P inoyBIX educates thousands of reviewers/students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you make a small $5 gift today?”

Add Comment

© 2014 PinoyBIX Engineering. © 2019 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
Do NOT follow this link or you will be banned from the site!

Math Solution

Advanced Math problem age work mixture digit motion Analytic Geometry 01 problem Analytic Geometry 02 problem clock variation progression misc Combination problem Differential Calculus 01 Problem Differential Calculus 02 Problem Differential Equations Problem Fundamentals in Algebra Fundamentals in Algebra Problem Integral Calculus problem Permutation problem Plane Geometry problem Plane Trigonometry problem Probability problem quadratic equation binomial theorem logarithms Solid Geometry problem Spherical Trigonometry problem System of Numbers Problem Venn Diagram Problem

Questions and Answers in Mathematics

Advanced Math Age Work Mixture Digit Motion Algebra and General Mathematics Analytic Geometry 01 Analytic Geometry 02 Calculus Clock Variation Progression Misc Differential Calculus 01 Differential Calculus 02 Differential Equations Engineering Mathematics Geometry Integral Calculus Plane Geometry Plane Trigonometry Probability and Statistics Quadratic Equation Binomial Theorem Logarithms Solid Geometry Spherical Trigonometry System of Numbers Trigonometry

video

Pre-board in Electronics Engineering

Pre-board in Electronics Engineering - Answers

Questions and Answers

Basic Television - Grob TV Boylestad Questions and Answers Computer Principles Electrical Circuit Electricity and Magnetism Fundamentals Electronic Circuits Floyd Questions and Answers Floyd Self-test Grob Questions and Answers Industrial Electronics Principles and Applications Malvino Questions and Answers Microelectronics Power Generators / Sources / Principles and Applications Solid State Devices Tests and Measurements Vacuum Tubes

Pre-board in Communications Engineering

Pre-board in Communications Engineering Pre-board in Communications Engineering - Answers

Questions and Answers

Acoustics Antennas Blake Questions and Answers Broadcasting and Cable TV System Digital Communication Networks Forouzan Frenzel Self-test Kennedy Questions and Answers Microwave Communications Miscellaneous Questions in Communications Modulation Navigational Aids and Radar Systems Noise Optical Fiber Communications Radiation and Wave Propagation Satellite Communications Transmission Fundamentals Wire and Wireless Communications

GEAS Solution

Dynamics problem Economics problem Physics problem Statics problem Strength problem Thermodynamics problem

Pre-board in GEAS

Questions and Answers in GEAS

Engineering Economics Engineering Laws and Ethics Engineering Management Engineering Materials Engineering Mechanics General Chemistry Physics Strength of Materials Thermodynamics
Online Tool: Electrical Charge Conversions
Online Tool: Electrical Charge Conversions
Online Tool: Color Code Conversions
Online Tool: Color Code Conversions
Online Tool: Weight Measurement Conversions
Online Tool: Weight Measurement Conversions
Online Tool: Temperature Measurement Conversions
Online Tool: Temperature Measurement Conversions