Sei sulla pagina 1di 4

A Complete Chapter Quiz

Network Security

Compilation of all the quizzes (MCQs) for each and every chapters in the book of Data
Communications and Networking 4th Edition by Behrouz A. Forouzan.

1|P age
MCQs in Network Security
www.PinoyBIX.com
1. Message_____ means that the data C) KDD
must arrive at the receiver exactly as D) none of the above
sent. 7. A witness used in entity authentication
A) confidentiality is ____________.
B) integrity A) something known
C) authentication B) something possessed
D) none of the above C) something inherent
2. Message _______ means that the D) all of the above
receiver is ensured that the message is 8. A _______ message digest is used as
coming from the intended sender, not an an MDC.
imposter. A) keyless
A) confidentiality B) keyed
B) integrity C) either (a) or (b)
C) authentication D) neither (a) nor (b)
D) none of the above 9. A(n)______ creates a secret key only
3. A(n) ________function creates a between a member and the center.
message digest out of a message. A) CA
A) encryption B) KDC Key distribution crypto graphy
B) decryption C) KDD
C) hash D) none of the above
D) none of the above 10. ________ means to prove the identity
4. The secret key between members of the entity that tries to access the
needs to be created as a ______ key system's resources.
when two members contact KDC. A) Message authentication
A) public B) Entity authentication
B) session C) Message confidentiality
C) complimentary D) none of the above
D) none of the above 11. A ________ signature is included in
5. The ________ criterion ensures that a the document; a _______ signature is a
message cannot easily be forged. separate entity.
A) one-wayness A) conventional; digital
B) weak-collision-resistance B) digital; digital
C) strong-collision-resistance C) either (a) or (b)
D) none of the above D) neither (a) nor (b)
6. A(n) _____ is a trusted third party that 12. If _________ is needed, a
assigns a symmetric key to two parties. cryptosystem must be applied over the
A) KDC scheme.
B) CA A) integrity

2|P age
MCQs in Network Security
www.PinoyBIX.com
B) confidentiality C) strong-collision-resistance
C) nonrepudiation D) none of the above
D) authentication 19. A digital signature needs
13. Digital signature provides ________. a(n)_________ system.
A) authentication A) symmetric-key
B) nonrepudiation B) asymmetric-key
C) both (a) and (b) C) either (a) or (b)
D) neither (a) nor (b) D) neither (a) nor (b)
14. Digital signature cannot provide 20. A(n) ________is a federal or state
________ for the message. organization that binds a public key to an
A) integrity entity and issues a certificate.
B) confidentiality A) KDC
C) nonrepudiation B) Kerberos
D) authentication C) CA
15. To authenticate the data origin, one D) none of the above
needs a(n) _______. 21. Message ________ means that the
A) MDC sender and the receiver expect privacy.
B) MAC A) confidentiality
C) either (a) or (b) B) integrity
D) neither (a) nor (b) C) authentication
16. A(n) _________ can be used to D) none of the above
preserve the integrity of a document or a 22. In ________ authentication, the
message. claimant proves that she knows a secret
A) message digest without actually sending it.
B) message summary A) password-based
C) encrypted message B) challenge-response
D) none of the above C) either (a) or (b)
17. Challenge-response authentication D) neither (a) nor (b)
can be done using ________. 23. In _______, a claimant proves her
A) symmetric-key ciphers identity to the verifier by using one of the
B) asymmetric-key ciphers three kinds of witnesses.
C) keyed-hash functions A) message authentication
D) all of the above B) entity authentication
18. The _______criterion ensures that C) message confidentiality
we cannot find two messages that hash D) message integrity
to the same digest. 24. The _______ criterion states that it
A) one-wayness must be extremely difficult or impossible
B) weak-collision-resistance

3|P age
MCQs in Network Security
www.PinoyBIX.com
to create the message if the message B) time-stamped; fixed
digest is given. C) fixed; one-time
A) one-wayness D) none of the above
B) weak-collision-resistance
C) strong-collision-resistance
D) none of the above
25. A(n) ______ is a hierarchical system
that answers queries about key
certification.
A) KDC
B) PKI
C) CA
D) none of the above
26. _________ means that a sender
must not be able to deny sending a
message that he sent.
A) Confidentiality
B) Integrity
C) Authentication
D) Nonrepudiation
27. A hash function must meet ________
criteria.
A) two
B) three
C) four
D) none of the above
28. __________ is a popular session key
creator protocol that requires an
authentication server and a ticket-
granting server.
A) KDC
B) Kerberos
C) CA
D) none of the above
29. Password-based authentication can
be divided into two broad categories:
_______ and _______.
A) fixed; variable

4|P age
MCQs in Network Security
www.PinoyBIX.com

Potrebbero piacerti anche