You dont have javascript enabled! Please enable it! Forouzan: MCQ in Network Security

Forouzan: MCQ in Network Security

Forouzan: MCQ in Network Security

This is the MCQ in Network Security from the book Data Communications and Networking by Behrouz A. Forouzan. If you are looking for a reviewer in datacom, topic in Electronics Systems and Technologies (Communications Engineering) this will definitely help you before taking the Board Exam.
Watch Audio MCQ in Network Security

Practice Exam Test Questions

Choose the letter of the best answer in each questions.

1. Message_____ means that the data must arrive at the receiver exactly as sent.

A) confidentiality

B) integrity

C) authentication

D) none of the above

View Answer:

Answer: Option B

Solution:

2. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A) confidentiality

B) integrity

C) authentication

D) none of the above

View Answer:

Answer: Option C

Solution:

3. A(n) ________function creates a message digest out of a message.

A) encryption

B) decryption

C) hash

D) none of the above

View Answer:

Answer: Option C

Solution:

4. The secret key between members needs to be created as a ______ key when two members contact KDC.

A) public

B) session

C) complimentary

D) none of the above

View Answer:

Answer: Option B

Solution:

5. The ________ criterion ensures that a message cannot easily be forged.

A) one-wayness

B) weak-collision-resistance

C) strong-collision-resistance

D) none of the above

View Answer:

Answer: Option B

Solution:

6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A) KDC

B) CA

C) KDD

D) none of the above

View Answer:

Answer: Option A

Solution:

7. A witness used in entity authentication is ____________.

A) something known

B) something possessed

C) something inherent

D) all of the above

View Answer:

Answer: Option D

Solution:

8. A _______ message digest is used as an MDC.

A) keyless

B) keyed

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

9. A(n)______ creates a secret key only between a member and the center.

A) CA

B) KDC

C) KDD

D) none of the above

View Answer:

Answer: Option B

Solution:

10. ________ means to prove the identity of the entity that tries to access the system’s resources.

A) Message authentication

B) Entity authentication

C) Message confidentiality

D) none of the above

View Answer:

Answer: Option B

Solution:

11. A ________ signature is included in the document; a _______ signature is a separate entity.

A) conventional; digital

B) digital; digital

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

12. If _________ is needed, a cryptosystem must be applied over the scheme.

A) integrity

B) confidentiality

C) nonrepudiation

D) authentication

View Answer:

Answer: Option B

Solution:

13. Digital signature provides ________.

A) authentication

B) nonrepudiation

C) both (a) and (b)

D) neither (a) nor (b)

View Answer:

Answer: Option C

Solution:

14. Digital signature cannot provide ________ for the message.

A) integrity

B) confidentiality

C) nonrepudiation

D) authentication

View Answer:

Answer: Option B

Solution:

15. To authenticate the data origin, one needs a(n) _______.

A) MDC

B) MAC

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

16. A(n) _________ can be used to preserve the integrity of a document or a message.

A) message digest

B) message summary

C) encrypted message

D) none of the above

View Answer:

Answer: Option A

Solution:

17. Challenge-response authentication can be done using ________.

A) symmetric-key ciphers

B) asymmetric-key ciphers

C) keyed-hash functions

D) all of the above

View Answer:

Answer: Option D

Solution:

18. The _______criterion ensures that we cannot find two messages that hash to the same digest.

A) one-wayness

B) weak-collision-resistance

C) strong-collision-resistance

D) none of the above

View Answer:

Answer: Option C

Solution:

19. A digital signature needs a(n)_________ system.

A) symmetric-key

B) asymmetric-key

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

20. A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.

A) KDC

B) Kerberos

C) CA

D) none of the above

View Answer:

Answer: Option C

Solution:

21. Message ________ means that the sender and the receiver expect privacy.

A) confidentiality

B) integrity

C) authentication

D) none of the above

View Answer:

Answer: Option A

Solution:

22. In ________ authentication, the claimant proves that she knows a secret without actually sending it.

A) password-based

B) challenge-response

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

23. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

A) message authentication

B) entity authentication

C) message confidentiality

D) message integrity

View Answer:

Answer: Option B

Solution:

24. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.

A) one-wayness

B) weak-collision-resistance

C) strong-collision-resistance

D) none of the above

View Answer:

Answer: Option A

Solution:

25. A(n) ______ is a hierarchical system that answers queries about key certification.

A) KDC

B) PKI

C) CA

D) none of the above

View Answer:

Answer: Option C

Solution:

26. _________ means that a sender must not be able to deny sending a message that he sent.

A) Confidentiality

B) Integrity

C) Authentication

D) Nonrepudiation

View Answer:

Answer: Option D

Solution:

27. A hash function must meet ________ criteria.

A) two

B) three

C) four

D) none of the above

View Answer:

Answer: Option B

Solution:

28. __________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.

A) KDC

B) Kerberos

C) CA

D) none of the above

View Answer:

Answer: Option B

Solution:

29. Password-based authentication can be divided into two broad categories: _______ and _______.

A) fixed; variable

B) time-stamped; fixed

C) fixed; one-time

D) none of the above

View Answer:

Answer: Option C

Solution:

Complete List of Chapter Quiz in Data Communications and Networking

Check your work.

Download File in PDF (Premium Users)

MCQ Network Security (pdf)

MCQ Network Security (pdf)
Please do Subscribe on YouTube!

P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you subscribe today via YOUTUBE?”

Subscribe

What You Also Get: FREE ACCESS & DOWNLOAD via GDRIVE

TIRED OF ADS?

  • Become Premium Member and experienced fewer ads to ads-free browsing.
  • Full Content Access Exclusive to Premium members
  • Access to PINOYBIX FREEBIES folder
  • Download Reviewers and Learning Materials Free
  • Download Content: You can see download/print button at the bottom of each post.

PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:

  • CIVIL ENGINEERING REVIEWER
  • CIVIL SERVICE EXAM REVIEWER
  • CRIMINOLOGY REVIEWER
  • ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
  • ELECTRICAL ENGINEERING & RME REVIEWER
  • FIRE OFFICER EXAMINATION REVIEWER
  • LET REVIEWER
  • MASTER PLUMBER REVIEWER
  • MECHANICAL ENGINEERING REVIEWER
  • NAPOLCOM REVIEWER
  • Additional upload reviewers and learning materials are also FREE

FOR A LIMITED TIME

If you subscribe for PREMIUM today!

You will receive an additional 1 month of Premium Membership FREE.

For Bronze Membership an additional 2 months of Premium Membership FREE.

For Silver Membership an additional 3 months of Premium Membership FREE.

For Gold Membership an additional 5 months of Premium Membership FREE.

Join the PinoyBIX community.

DaysHoursMinSec
This offer has expired!

Add Comment

THE ULTIMATE ONLINE REVIEW HUB: PINOYBIX . © 2014-2024 All Rights Reserved | | Follow me on Blogarama DMCA.com Protection Status