This Portion of Computer Networking contains Computer Networking Network Security MCQs (Multiple Choice Questions and Answers).
This Section covers below lists of topics.
1 INTRODUCTION
• Security Goals
• Attacks
• Services and Techniques
2 CONFIDENTIALITY
• Symmetric-Key Ciphers
• Asymmetric-Key Ciphers
3 OTHER ASPECTS OF SECURITY
• Message Integrity
• Message Authentication
• Digital Signature
• Entity Authentication
• Key Management
4 INTERNET SECURITY
• Application-Layer Security
• Transport-Layer Security
• Network-Layer Security
5 FIREWALLS
• Packet-Filter Firewall
• Proxy Firewall
1. In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
- her or his own public key
- her or his own private key
- the sender's public key
- None of the choices are correct.
2. A _______ is a trusted third party that solves the problem of symmetric-key distribution.
- CA
- KDC
- TLS
- firewall
3. A _______ certifies the binding between a public key and its owner.
- CA
- KDC
- TLS
- None of the choices are correct.
4. VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
- SSL; tunneling
- IPSec; SSL
- IPSec; tunneling
- None of the choices are correct.
5. IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.
- data link
- network
- transport
- None of the choices are correct.
6. IPSec requires a logical connection between two hosts using a signaling protocol called ____________.
- AS
- SA
- AS
- None of the choices are correct.
7. IPSec operates at two different modes: _________ mode and _________ mode.
- transport; network
- transport; tunnel
- tunnel; surface
- None of the choices are correct.
8. In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.
- transport
- tunnel
- transition
- None of the choices are correct.
9. In the ________ mode, the IPSec header is placed in front of the original IP header.
- transport
- tunnel
- transition
- None of the choices are correct.
10. IPSec defines two protocols: _________ and __________.
- AH: SSP
- ESP; SSP
- AH: EH
- None of the choices are correct.
11. The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.
- AH
- ESP
- SPE
- None of the choices are correct.
12. The _______ protocol provides message authentication and integrity, but not privacy.
- AH
- ESP
- SPE
- None of the choices are correct.
13. The _______ protocol provides message authentication, integrity, and privacy.
- AH
- ESP
- SPE
- None of the choices are correct.
14. The _______ was designed to provide security at the transport layer.
- AH
- ESP
- TLS
- None of the choices are correct.
15. _______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
- AH
- ESP
- TLS
- None of the choices are correct.
16. A packet-filter firewall filters at the ________ or ___________ layer.
- network; application
- transport; application
- network; transport
- None of the choices are correct
17. A proxy firewall filters at the __________ layer.
- transport
- network
- application
- None of the choices are correct.
18. Three security goals are _______________________________________.
- confidentiality, cryptography, and nonrepudiation
- confidentiality, encryption, and decryption
- confidentiality, integrity, and availability
- None of the choices are correct.
19. Which of the following attacks is threatening integrity?
- Masquerading
- Traffic Analysis
- Denial of service
- None of the choices are correct.
20. Which of the following attacks is threatening availability?
- Replaying
- Modification
- Denial of service
- None of the choices are correct.
21. _____________ means concealing the contents of a message by enciphering.
- Steganography
- Cryptography
- Compressing
- None of the choices are correct.
22. ______________ means concealing the message by covering it with something else.
- Cryptography
- Steganography
- Compressing
- None of the choices are correct.
23. In __________ cryptography, the same key is used by the sender and the receiver.
- symmetric-key
- asymmetric-key
- public-key
- None of the choices are correct.
24. In _________ cryptography, the same key is used in both directions.
- symmetric-key
- asymmetric-key
- public-key
- None of the choices are correct.
25. _________ cryptography is often used for long messages.
- Symmetric-key
- Asymmetric-key
- public-key
- None of the choices are correct.
26. ___________ cryptography is often used for short messages.
- Symmetric-key
- Asymmetric-key
- Secret-key
- None of the choices are correct
27. __________ means that the sender and the receiver expect confidentiality.
- Nonrepudiation
- Integrity
- Authentication
- None of the choices are correct.
28. ___________ means that the data must arrive at the receiver exactly as they were sent.
- Nonrepudiation
- Message integrity
- Authentication
- None of the choices are correct.
29. ______________ can provide authentication, integrity, and nonrepudiation for a message.
- Encryption/decryption
- Digital signature
- Compression
- None of the choices are correct.
30. Digital signature does not provide _________.
- nonrepudiation
- privacy
- authentication
- Provides all of the choices.
31. In ___________, the identity of a party is verified once for the entire duration of system access.
- entity authentication
- message integrity
- message authentication
- None of the choices are correct.
32. In __________ cryptography, everyone has access to everyone's public key.
- symmetric-key
- asymmetric-key
- secret-key
- None of the choices are correct.
33. After a message is encrypted, it is called _______.
- plaintext
- ciphertext
- cryptotext
- None of the choices are correct.
34. In the asymmetric-key method used for confidentiality, which key is publicly known?
- encryption key only
- decryption key only
- both keys
- None of the choices are correct.
35. In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.
- private key
- public key
- no key
- None of the choices are correct.
36. The RSA algorithm for confidentiality uses _______ cryptography.
- asymmetric-key
- symmetric-key
- substitution
- None of the choices are correct.
37. In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.
- user A
- user B
- the network
- None of the choices are correct.
38. In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.
- his or her own symmetric key
- his or her own private key
- his or her own public key
- None of the choices are correct.