Network Security Multiple Choice Questions And Answers:


1. Message ________ means that the sender and the receiver expect  privacy 
A.confidentiality 
B. integrity 
C.authentication
D.none of the above

2. Message_____ means that the data must arrive at the receiver exactly as sent
A. confidentiality
B. integrity
C.authentication
D.none of the above

3. Message _______ means that the receiver is ensure that the message is coming from the intended sender , not an imposter
A. confidentiality
B. integrity
C.authentication
D.none of the above

4. ____ means that a sender must not be able to deny sending a  message that he sent.
A. Confidentiality
B. Integrity
C.Authentication
D.Nonrepudiation

5. ___ means to prove the identity of the entity that tries to access the system's resources.
A. Message authentication
B. Entity authentication
C.Message confidentiality
D.none of the above

6. A(n) ___ can be used to preserve the integrity of a document or a message.
A. message digest
B. message summary
C.encrypted message
D.none of the above

7. A(n) ____function creates a msg digest out of a msg.
A. encryption
B. decryption
C.hash
D.none of the above

8. A hash function must meet_____criteria.
A. two
B. three
C.four
D.none of the above

9. A ___ message digest is used as an MDC.
A. keyless
B. keyed
C.either (a) or (b)
D.neither (a) nor (b)

10. To authenticate the data origin,one needs a(n)  ______ .
A. MDC
B. MAC
C.either (a) or (b)
D.neither (a) nor (b)

11. A ____ signature is included in the document; a______ signature is a separate entity.
A. conventional,digital
B. digital; digital
C.either (a) or (b)
D.neither (a) nor (b)

12. Digital signature provides_____
A. authentication
B. nonrepudiation
C.both (a) and (b)
D.neither (a) nor (b)

13. Digital signature cannot provide ______ for the msg.
A. integrity
B. confidentiality
C.nonrepudiation
D.authentication

14. If ___ is needed,a cryptosystem must be applied over the scheme.
A. integrity
B. confidentiality
C.nonrepudiation
D.authentication