Network Security MCQ-1

image_pdfimage_print

1)Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned

2)An……….is a trusted third party that assigns a symmetric key to two parties
a) KDC
b)CA
c)KDD
d)None of the above

3)………means to prove the identity of the entity that tries to access the system’s resources.
a)Message authentication
b)Entity authentication
c)Message confidentially
d)None of the above

4)The secret key between members needs to be created as a …….key when two members contact KDC.
a)public
b)session
c)complimentary
d)none of the above

5)An……..can be used to reserve the integrity of a document or a message
a)message digest
b)message summary
c)encrypted message
d)none of the above

6)Message……..means that the data must arrive at the receiver exactly as sent.
a)confidentially
b)integrity
c)authentication
d)none of the above

7)A digital signature needs an ………system
a)symmetric key
b)asymmetric key
c)either a or b
d)neither a or b

8)The……..criterion ensures that a message cannot easily be forged.
a)one-wayness
b)weak-collision resistance
c)strong-collision resistance
d)none of the above

9)The…….criterion ensures that we cannot find two messages that hash to the same digest.
a)one-wayness
b)weak-collision resistance
c)strong-collision resistance
e)none of the above

10)To authenticate the data origin, one needs an………..
a)MAC
b)MDC
c)either a or b
d)neither a or b

 

Answers:
1)a
2)a
3)b
4)a
5)a
6)b
7)b
8)b
9)c
10)a