Post No 43 Network Security

 Network Security
Most IMP 50
MCQ. Confidentiality with asymmetric-key cryptosystem has its own
A. Entities
B. Data
C. Problems
D. Translator
Answer C
MCQ. SHA-l has a message digest of
A. 160 bits
B. 512 bits
C. 628 bits
D. 820 bits
Answer A
MCQ. Message authentication is a service beyond
A. Message Confidentiality
B. Message Integrity
C. Message Splashing
D. Message Sending
Answer B
MCQ. In Message Confidentiality, transmitted message must make sense to only intended
A. Receiver
B. Sender
C. Modulor
D. Translator
Answer A
MCQ. A hash function guarantees integrity of a message. It guarantees that message has not be
A. Replaced
B. Over view
C. Changed
D. Violated
Answer C
MCQ. To check integrity of a message, or document, receiver creates the
A. Hash-Table
B. Hash Tag
C. Hyper Text
D. Finger Print
Answer B
MCQ. A digital signature needs a
A. Private-key system
B. Shared-key system
C. Public-key system
D. All of them
Answer C
MCQ. One way to preserve integrity of a document is through use of a
A. Eye-Rays
B. Finger Print
C. Biometric
D. X-Rays
Answer B
MCQ. A session symmetric key between two parties is used
A. Only once
B. Twice
C. Multiple times
D. Conditions dependant
Answer A
MCQ. Encryption and decryption provide secrecy, or confidentiality, but not
A. Authentication
B. Integrity
C. Privacy
D. All of above
Answer B
MCQ. MAC stands for
A. Message authentication code
B. Message arbitrary connection
C. Message authentication control
D. Message authentication cipher
Answer A
MCQ. Digest created by a hash function is normally called a
A. Modification detection code (MDC)
B. Modify authentication connection
C. Message authentication control
D. Message authentication cipher
Answer A
MCQ. Message confidentiality is using
A. Cipher Text
B. Cipher
C. Symmetric-Key
D. Asymmetric-Key
Answer D
MCQ. A sender must not be able to deny sending a message that was sent, is known as
A. Message Nonrepudiation
B. Message Integrity
C. Message Confidentiality
D. Message Sending
Answer A
MCQ. To preserve integrity of a document, both document and fingerprint are
A. Not Used
B. Unimportant
C. Needed
D. Not needed
Answer C
MCQ. When data must arrive at receiver exactly as they were sent, its called
A. Message Confidentiality
B. Message Integrity
C. Message Splashing
D. Message Sending
Answer B
MCQ. Message digest needs to be
A. public
B. private
C. kept secret
D. None
Answer C
MCQ. In Message Integrity, message digest needs to be kept
A. Secret
B. Low
C. High
D. Constant 0
Answer A
MCQ. In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
A. 512 Bit Blocks
B. 1001 Bit Blocks
C. 1510 Bit Blocks
D. 2020 Bit Blocks
Answer A
MCQ. Message confidentiality or privacy means that sender and receiver expect
A. Integrity
B. Confidentiality
C. Authentication
D. Nonrepudiation
Answer B
MCQ. Message must be encrypted at sender site and decrypted at the
A. Sender Site
B. Site
C. Receiver site
D. Conferencing
Answer C 

Related Posts:

  • Post No 36 1. A ………………… specifies the actions needed to remove the drawbacks in the current design of database. A) 1 NF B) 2 NF C) 3 NF D) Normal form 2. A relation is in ……………………… if an attribute of a composite key is dependent on… Read More
  • Post Id 38 1. DML is provided for A) Description of logical structure of database B) Addition of new structure in the database system. C) Manipulation & processing of database D) Definition of physical structure of database sy… Read More
  • Post Id 39 1. The normal form which satisfies multivalued dependencies and which is in BCNF is a) 4 NF b) 3 NF c) 2 NF d) All of the mentioned Answer: a Explanation: Fourth normal form is more restrictive than BCNF. 2. Which of the f… Read More
  • Post Id 37 1. DML is provided for A) Description of logical structure of database B) Addition of new structure in the database system. C) Manipulation & processing of database D) Definition of physical structure of database sy… Read More
  • post no 35 Algorithms for Decomposition Database Questions and Answers – Algorithms for Decomposition 1. A relation is in ____________ if an attribute of a composite key is dependent on an attribute of other composite key. a) 2NF b) 3NF c) BCNF d) 1NF … Read More

1 comment: