Data Communication and Networking – Network Security MCQs

In this section of Data Communication and Networking – Network Security MCQ (Multiple Choice) Based Questions and Answers,it cover the below lists of topics.All the Multiple Choice Questions and Answers (MCQs) have been compiled from the book of Data Communication and Networking by The well known author behrouz forouzan.
 
This Section covers below lists of topics.

  1. Network Security MCQ.

 

Network Security multiple choice questions and answers MCQs

 

1
. Message ________ means that the sender and the receiver expect privacy
  • confidentiality
  • integrity
  • authentication
  • none of the above
2
. Message_____ means that the data must arrive at the receiver exactly as sent
  • confidentiality
  • integrity
  • authentication
  • none of the above
3
. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter
  • confidentiality
  • integrity
  • authentication
  • none of the above
4
. ________ means that a sender must not be able to deny sending a message that he sent.
  • Confidentiality
  • Integrity
  • Authentication
  • Nonrepudiation
5
. _______ means to prove the identity of the entity that tries to access the system's resources.
  • Message authentication
  • Entity authentication
  • Message confidentiality
  • none of the above
6
. A(n) _________ can be used to preserve the integrity of a document or a message.
  • message digest
  • message summary
  • encrypted message
  • none of the above
7
. A(n) ________function creates a message digest out of a message.
  • encryption
  • decryption
  • hash
  • none of the above
8
. A hash function must meet ________ criteria.
  • two
  • three
  • four
  • none of the above
9
. A _______ message digest is used as an MDC.
  • keyless
  • keyed
  • either (a) or (b)
  • neither (a) nor (b)
10
. A ________ signature is included in the document; a _______ signature is a separate entity.
  • conventional; digital
  • digital; digital
  • either (a) or (b)
  • neither (a) nor (b)
11
. To authenticate the data origin, one needs a(n) _______.
  • MDC
  • MAC
  • either (a) or (b)
  • neither (a) nor (b)
12
. Digital signature provides ________
  • authentication
  • nonrepudiation
  • both (a) and (b)
  • neither (a) nor (b)
13
. Digital signature cannot provide ________ for the message
  • integrity
  • confidentiality
  • nonrepudiation
  • authentication
14
. If _________ is needed, a cryptosystem must be applied over the scheme
  • integrity
  • confidentiality
  • nonrepudiation
  • authentication
15
. A digital signature needs a(n)_________ system
  • symmetric-key
  • asymmetric-key
  • either (a) or (b)
  • neither (a) nor (b)
16
. A witness used in entity authentication is ____________
  • something known
  • something possessed
  • something inherent
  • all of the above
17
. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses
  • message authentication
  • entity authentication
  • message confidentiality
  • message integrity
18
. Password-based authentication can be divided into two broad categories: _______ and _______
  • fixed; variable
  • time-stamped; fixed
  • fixed; one-time
  • none of the above
19
. In ________ authentication, the claimant proves that she knows a secret without actually sending it
  • password-based
  • challenge-response
  • either (a) or (b)
  • neither (a) nor (b)
20
. Challenge-response authentication can be done using ________
  • symmetric-key ciphers
  • asymmetric-key ciphers
  • keyed-hash functions
  • all of the above
21
. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
  • KDC
  • CA
  • KDD
  • none of the above
22
. A(n)______ creates a secret key only between a member and the center.
  • CA
  • KDC
  • KDD
  • none of the above
23
. The secret key between members needs to be created as a ______ key when two members contact KDC.
  • public
  • session
  • complimentary
  • none of the above
24
. __________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.
  • KDC
  • Kerberos
  • CA
  • none of the above
25
. A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.
  • KDC
  • Kerberos
  • CA
  • none of the above
26
. A(n) ______ is a hierarchical system that answers queries about key certification.
  • KDC
  • PKI
  • CA
  • none of the above
27
. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
  • one-wayness
  • weak-collision-resistance
  • strong-collision-resistance
  • none of the above
28
. The ________ criterion ensures that a message cannot easily be forged.
  • one-wayness
  • weak-collision-resistance
  • strong-collision-resistance
  • none of the above
29
. The _______criterion ensures that we cannot find two messages that hash to the same digest
  • one-wayness
  • weak-collision-resistance
  • strong-collision-resistance
  • none of the above

 
 
You may be interested in:
Data Communication and Networking Randomly Picked MCQs
Computer Networking MCQs
Fundamental of Networking Online Tests
Data Communication and Networking Online Tests
Data Communication and Networking Short Questions Answers
Data Communication and Networking Tutorials and Study Notes
Download Network Security Multiple Choice Questions and Answers pdf file