Forouzan: MCQ in Network Security

(Last Updated On: December 29, 2017)
MCQ for Network Security

This is the MCQ in Network Security from book the Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in datacom, topic in Electronics Systems and Technologies (Communications Engineering) this will definitely help you before taking the Board Exam.

Begin and Good luck!

Choose the letter of the best answer in each questions.

1. Message_____ means that the data must arrive at the receiver exactly as sent.

A) confidentiality

B) integrity

C) authentication

D) none of the above

View Answer:

Answer: Option B

Solution:

2. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A) confidentiality

B) integrity

C) authentication

D) none of the above

View Answer:

Answer: Option C

Solution:

3. A(n) ________function creates a message digest out of a message.

A) encryption

B) decryption

C) hash

D) none of the above

View Answer:

Answer: Option C

Solution:

4. The secret key between members needs to be created as a ______ key when two members contact KDC.

A) public

B) session

C) complimentary

D) none of the above

View Answer:

Answer: Option B

Solution:

5. The ________ criterion ensures that a message cannot easily be forged.

A) one-wayness

B) weak-collision-resistance

C) strong-collision-resistance

D) none of the above

View Answer:

Answer: Option B

Solution:

6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A) KDC

B) CA

C) KDD

D) none of the above

View Answer:

Answer: Option A

Solution:

7. A witness used in entity authentication is ____________.

A) something known

B) something possessed

C) something inherent

D) all of the above

View Answer:

Answer: Option D

Solution:

8. A _______ message digest is used as an MDC.

A) keyless

B) keyed

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

9. A(n)______ creates a secret key only between a member and the center.

A) CA

B) KDC

C) KDD

D) none of the above

View Answer:

Answer: Option B

Solution:

10. ________ means to prove the identity of the entity that tries to access the system’s resources.

A) Message authentication

B) Entity authentication

C) Message confidentiality

D) none of the above

View Answer:

Answer: Option B

Solution:

11. A ________ signature is included in the document; a _______ signature is a separate entity.

A) conventional; digital

B) digital; digital

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option A

Solution:

12. If _________ is needed, a cryptosystem must be applied over the scheme.

A) integrity

B) confidentiality

C) nonrepudiation

D) authentication

View Answer:

Answer: Option B

Solution:

13. Digital signature provides ________.

A) authentication

B) nonrepudiation

C) both (a) and (b)

D) neither (a) nor (b)

View Answer:

Answer: Option C

Solution:

14. Digital signature cannot provide ________ for the message.

A) integrity

B) confidentiality

C) nonrepudiation

D) authentication

View Answer:

Answer: Option B

Solution:

15. To authenticate the data origin, one needs a(n) _______.

A) MDC

B) MAC

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

16. A(n) _________ can be used to preserve the integrity of a document or a message.

A) message digest

B) message summary

C) encrypted message

D) none of the above

View Answer:

Answer: Option A

Solution:

17. Challenge-response authentication can be done using ________.

A) symmetric-key ciphers

B) asymmetric-key ciphers

C) keyed-hash functions

D) all of the above

View Answer:

Answer: Option D

Solution:

18. The _______criterion ensures that we cannot find two messages that hash to the same digest.

A) one-wayness

B) weak-collision-resistance

C) strong-collision-resistance

D) none of the above

View Answer:

Answer: Option C

Solution:

19. A digital signature needs a(n)_________ system.

A) symmetric-key

B) asymmetric-key

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

20. A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.

A) KDC

B) Kerberos

C) CA

D) none of the above

View Answer:

Answer: Option C

Solution:

21. Message ________ means that the sender and the receiver expect privacy.

A) confidentiality

B) integrity

C) authentication

D) none of the above

View Answer:

Answer: Option A

Solution:

22. In ________ authentication, the claimant proves that she knows a secret without actually sending it.

A) password-based

B) challenge-response

C) either (a) or (b)

D) neither (a) nor (b)

View Answer:

Answer: Option B

Solution:

23. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

A) message authentication

B) entity authentication

C) message confidentiality

D) message integrity

View Answer:

Answer: Option B

Solution:

24. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.

A) one-wayness

B) weak-collision-resistance

C) strong-collision-resistance

D) none of the above

View Answer:

Answer: Option A

Solution:

25. A(n) ______ is a hierarchical system that answers queries about key certification.

A) KDC

B) PKI

C) CA

D) none of the above

View Answer:

Answer: Option C

Solution:

26. _________ means that a sender must not be able to deny sending a message that he sent.

A) Confidentiality

B) Integrity

C) Authentication

D) Nonrepudiation

View Answer:

Answer: Option D

Solution:

27. A hash function must meet ________ criteria.

A) two

B) three

C) four

D) none of the above

View Answer:

Answer: Option B

Solution:

28. __________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.

A) KDC

B) Kerberos

C) CA

D) none of the above

View Answer:

Answer: Option B

Solution:

29. Password-based authentication can be divided into two broad categories: _______ and _______.

A) fixed; variable

B) time-stamped; fixed

C) fixed; one-time

D) none of the above

View Answer:

Answer: Option C

Solution:

Complete List of Chapter Quiz in Data Communications and Networking

Check your work.

Download File in PDF

Forouzan: MCQ in Network Security
Rate this:

Add Comment

© 2017 PinoyBIX Engineering. © 2017 All Rights Reserved | Donate
Basic Television – Grob TV Chapter Exercises
Series of Multiple Choice Questions in Engineering Mathematics
Complete Practice Quiz in Electronic Devices and Circuit Theory
Complete Practice Quiz in Data Communications and Networking
Online Tool: Color Code Conversions
Online Tool: Weight Measurement Conversions
Online Tool: Temperature Measurement Conversions
Online Tool: Length Measurement Conversions

Get FREE Review Course
in your inbox

Subscribe to our mailing list and get reviewers and updates to your email inbox.

Thank you for subscribing.

Something went wrong.