Network Security multiple choice que and ans.
1. A(n) _____ trusted trusted third party that assigns a symmetric key
to two parties.
A. KDC
B. CA
C.KDD
D.none of the above
2. A(n)__ creates a secret key only between a member and the
center.
A. CA
B. KDC
C.KDD
D.none of the above
3. The secret key between members needs to be created as a ____
key when two members contact KDC.
A. public
B. session
C. complimentary
D.none of the above
4. ____ is a popular session key creator protocol that
requires an authentication server and a ticket-granting server.
A. KDC
B. Kerberos
C.CA
D.none of the above
5. A digital signature needs a(n)_______system.
A. symmetric-key
B. asymmetric-key
C.either (a) or (b)
D.neither (a) nor (b)
A. symmetric-key
B. asymmetric-key
C.either (a) or (b)
D.neither (a) nor (b)
6. A witness used in entity authentication is_______
A. something known
B. something possessed
C. something inherent
D.all of the above
7. In ___, a claimant proves her identity to the verifier by using one of the three kinds of witness
A. message authentication
B. entity authentication
C.message confidentiality
D.message integrity
8. Password-based authentication can be divided into two broad categories: _____ and _____
A. fixed; variable
B. time-stamped; fixed
C.fixed; one-time
D.none of the above
9. In ____ authentication,the claimant proves that she knows a secret without actually sending it
A. password-based
B. challenge-response
C.either (a) or (b)
D.neither (a) nor (b)
10. Challenge-response authentication can be done using_____
A. symmetric-key ciphers
B. asymmetric-key ciphers
C. keyed-hash functions
D.all of the above
11. A(n) ____is a federal or state organization that binds a
public key to an entity and issues a certificate.
A. KDC
B. Kerberos
C.CA
D.none of the above
12. A(n) __ is a hierarchical system that answers queries about
key certification.
A. KDC
B. PKI
C.CA
D.none of the above
13. The ___ criterion states that it must be extremely difficult or
impossible to create the message if the message digest is given.
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D.none of the above
14. The ____ criterion ensures that a message cannot easily be
forged.
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D.none of the above
15. The ___criterion ensures that we cannot find two
that hash to the same digest
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D.none of the above
B. weak-collision-resistance
C. strong-collision-resistance
D.none of the above
0 Comments