Network Security Multiple Choice Questions And Answers:
1. Message ________ means that the sender and the receiver expect privacy
A.confidentiality
B. integrity
C.authentication
D.none of the above
A.confidentiality
B. integrity
C.authentication
D.none of the above
2. Message_____ means that the data must arrive at the receiver exactly as sent
A. confidentiality
B. integrity
C.authentication
D.none of the above
3. Message _______ means that the receiver is ensure that the message is coming from the intended sender , not an imposter
A. confidentiality
B. integrity
C.authentication
D.none of the above
B. integrity
C.authentication
D.none of the above
4. ____ means that a sender must not be able to deny sending a message that he sent.
A. Confidentiality
B. Integrity
C.Authentication
D.Nonrepudiation
5. ___ means to prove the identity of the entity that tries to access the system's resources.
A. Message authentication
B. Entity authentication
C.Message confidentiality
D.none of the above
B. Entity authentication
C.Message confidentiality
D.none of the above
6. A(n) ___ can be used to preserve the integrity of a document or a message.
A. message digest
B. message summary
C.encrypted message
D.none of the above
B. message summary
C.encrypted message
D.none of the above
7. A(n) ____function creates a msg digest out of a msg.
A. encryption
B. decryption
C.hash
D.none of the above
8. A hash function must meet_____criteria.
A. two
B. three
C.four
D.none of the above
9. A ___ message digest is used as an MDC.
A. keyless
B. keyed
C.either (a) or (b)
D.neither (a) nor (b)
10. To authenticate the data origin,one needs a(n) ______ .
A. MDC
B. MAC
C.either (a) or (b)
D.neither (a) nor (b)
11. A ____ signature is included in the document; a______ signature is a separate entity.
A. conventional,digital
B. digital; digital
C.either (a) or (b)
D.neither (a) nor (b)
12. Digital signature provides_____
A. authentication
B. nonrepudiation
C.both (a) and (b)
D.neither (a) nor (b)
13. Digital signature cannot provide ______ for the msg.
A. integrity
B. confidentiality
C.nonrepudiation
D.authentication
14. If ___ is needed,a cryptosystem must be applied over the scheme.
A. integrity
B. confidentiality
C.nonrepudiation
D.authentication
0 Comments