Post No 43 Network Security

 Network Security
Most IMP 50
MCQ. Confidentiality with asymmetric-key cryptosystem has its own
A. Entities
B. Data
C. Problems
D. Translator
Answer C
MCQ. SHA-l has a message digest of
A. 160 bits
B. 512 bits
C. 628 bits
D. 820 bits
Answer A
MCQ. Message authentication is a service beyond
A. Message Confidentiality
B. Message Integrity
C. Message Splashing
D. Message Sending
Answer B
MCQ. In Message Confidentiality, transmitted message must make sense to only intended
A. Receiver
B. Sender
C. Modulor
D. Translator
Answer A
MCQ. A hash function guarantees integrity of a message. It guarantees that message has not be
A. Replaced
B. Over view
C. Changed
D. Violated
Answer C
MCQ. To check integrity of a message, or document, receiver creates the
A. Hash-Table
B. Hash Tag
C. Hyper Text
D. Finger Print
Answer B
MCQ. A digital signature needs a
A. Private-key system
B. Shared-key system
C. Public-key system
D. All of them
Answer C
MCQ. One way to preserve integrity of a document is through use of a
A. Eye-Rays
B. Finger Print
C. Biometric
D. X-Rays
Answer B
MCQ. A session symmetric key between two parties is used
A. Only once
B. Twice
C. Multiple times
D. Conditions dependant
Answer A
MCQ. Encryption and decryption provide secrecy, or confidentiality, but not
A. Authentication
B. Integrity
C. Privacy
D. All of above
Answer B
MCQ. MAC stands for
A. Message authentication code
B. Message arbitrary connection
C. Message authentication control
D. Message authentication cipher
Answer A
MCQ. Digest created by a hash function is normally called a
A. Modification detection code (MDC)
B. Modify authentication connection
C. Message authentication control
D. Message authentication cipher
Answer A
MCQ. Message confidentiality is using
A. Cipher Text
B. Cipher
C. Symmetric-Key
D. Asymmetric-Key
Answer D
MCQ. A sender must not be able to deny sending a message that was sent, is known as
A. Message Nonrepudiation
B. Message Integrity
C. Message Confidentiality
D. Message Sending
Answer A
MCQ. To preserve integrity of a document, both document and fingerprint are
A. Not Used
B. Unimportant
C. Needed
D. Not needed
Answer C
MCQ. When data must arrive at receiver exactly as they were sent, its called
A. Message Confidentiality
B. Message Integrity
C. Message Splashing
D. Message Sending
Answer B
MCQ. Message digest needs to be
A. public
B. private
C. kept secret
D. None
Answer C
MCQ. In Message Integrity, message digest needs to be kept
A. Secret
B. Low
C. High
D. Constant 0
Answer A
MCQ. In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
A. 512 Bit Blocks
B. 1001 Bit Blocks
C. 1510 Bit Blocks
D. 2020 Bit Blocks
Answer A
MCQ. Message confidentiality or privacy means that sender and receiver expect
A. Integrity
B. Confidentiality
C. Authentication
D. Nonrepudiation
Answer B
MCQ. Message must be encrypted at sender site and decrypted at the
A. Sender Site
B. Site
C. Receiver site
D. Conferencing
Answer C 

Related Posts:

  • Difference between Matplotllib and Seaborn Libraries of Python Difference between matplotllib and seaborn:- 1. Functionality: Matplotlib: Matplotlib is mainly deployed for basic plotting. Visualization using Matplotlib generally consists of bars, pies, lines, scatter plot. Seaborn:… Read More
  • Post No. 54 Computer Networking Note Answer key at Bottom of the page. Question:1 Number of bits per symbol used in Baudot code is a. 7 b. 5 c. 8 d. 9 Question 2: What is the main difference between DDCMP and SDLC? a. DDCMP does not need specia… Read More
  • Python Programming ebooks Download ebooks of pythonFrom following telegram group @ibpsitofficer https://t.me/joinchat/AAAAAEHXVoqNyt0kkE4eBw … Read More
  • Post No.53 Computer Networking   Question 1:In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above Show/Hide… Read More
  • Post No 55 Advances Java MCQAdvance Java MCQ  Q . _______ generates action events when an item is double-clicked, generate action events when an item is selected or deselected. a.       List b.    … Read More

1 comment: