Network Security multiple choice que and ans.

 1. A(n) _____ trusted trusted third party that assigns a symmetric key
to two parties.
A. KDC
B. CA
C.KDD
D.none of the above

2. A(n)__ creates a secret key only between a member and the 
center.
A. CA
B. KDC
C.KDD
D.none of the above

3. The secret key between members needs to be created as a ____
key when two members contact KDC.
A. public
B. session
C. complimentary
D.none of the above

4. ____ is a popular session key creator protocol that
requires an authentication server and a ticket-granting server.
A. KDC
B. Kerberos
C.CA
D.none of the above

5. A digital signature needs a(n)_______system.
A. symmetric-key
B. asymmetric-key
C.either (a) or (b)
D.neither (a) nor (b)

6. A witness used in entity authentication is_______
A. something known
B. something possessed
C. something inherent
D.all of the above

7. In ___, a claimant proves her identity to the verifier by using one of the three kinds of witness
A. message authentication
B. entity authentication
C.message confidentiality
D.message integrity

8. Password-based authentication can be divided into two broad categories: _____ and _____
A. fixed; variable
B. time-stamped; fixed
C.fixed; one-time
D.none of the above

9. In ____ authentication,the claimant proves that she knows a secret without actually sending it 
A. password-based
B. challenge-response
C.either (a) or (b)
D.neither (a) nor (b)

10. Challenge-response  authentication can be done using_____
A. symmetric-key ciphers
B. asymmetric-key ciphers
C. keyed-hash functions
D.all of the above

11. A(n) ____is a federal or state organization that binds a
public key to an entity and issues a certificate.
A. KDC
B. Kerberos
C.CA
D.none of the above

12. A(n) __ is a hierarchical system that answers queries about
key certification.
A. KDC
B. PKI
C.CA
D.none of the above

13. The ___ criterion states that it must be extremely difficult or
impossible to create the message if the message digest is given.
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D.none of the above

14. The ____ criterion ensures that a message cannot easily be 
forged.
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D.none of the above

15. The ___criterion ensures that we cannot find two
that hash to the same digest
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D.none of the above