Quiznetik

Internet Security | Set 1

1. Message_____ means that the data must arrive at the receiver exactly as sent.

Correct : B. integrity

2. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

Correct : C. authentication

3. A(n) ________function creates a message digest out of a message.

Correct : C. hash

4. The secret key between members needs to be created as a ______ key when two members contact KDC.

Correct : B. session

5. The ________ criterion ensures that a message cannot easily be forged.

Correct : B. weak-collision-resistance

6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

Correct : A. kdc

7. A witness used in entity authentication is ____________.

Correct : D. all of the above

8. A _______ message digest is used as an MDC.

Correct : A. keyless

9. A(n)______ creates a secret key only between a member and the center.

Correct : B. kdc

10. ________ means to prove the identity of the entity that tries to access the system's resources.

Correct : B. entity authentication

11. A ________ signature is included in the document; a _______ signature is a separate entity.

Correct : A. conventional; digital

12. If _________ is needed, a cryptosystem must be applied over the scheme.

Correct : B. confidentiality

13. Digital signature provides ________.

Correct : C. both (a) and (b)

14. Digital signature cannot provide ________ for the message.

Correct : B. confidentiality

15. To authenticate the data origin, one needs a(n) _______.

Correct : A. mdc

16. A(n) _________ can be used to preserve the integrity of a document or a message.

Correct : A. message digest

17. Challenge-response authentication can be done using ________.

Correct : D. all of the above

18. The _______criterion ensures that we cannot find two messages that hash to the same digest.

Correct : C. strong-collision-resistance

19. A digital signature needs a(n)_________ system.

Correct : B. asymmetric-key

20. A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.

Correct : C. ca

21. Message ________ means that the sender and the receiver expect privacy.

Correct : A. confidentiality

22. In ________ authentication, the claimant proves that she knows a secret without actually sending it.

Correct : B. challenge-response

23. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

Correct : B. entity authentication

24. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.

Correct : A. one-wayness

25. A(n) ______ is a hierarchical system that answers queries about key certification.

Correct : C. ca

26. _________ means that a sender must not be able to deny sending a message that he sent.

Correct : D. nonrepudiation

27. A hash function must meet ________ criteria.

Correct : B. three

28. __________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.

Correct : B. kerberos

29. Password-based authentication can be divided into two broad categories: _______ and _______.

Correct : C. fixed; one-time

30. _________ operates in the transport mode or the tunnel mode.

Correct : A. ipsec

31. IKE creates SAs for _____.

Correct : C. ipsec

32. ______ provides either authentication or encryption, or both, for packets at the IP level.

Correct : B. esp

33. One security protocol for the e-mail system is _________.

Correct : C. pgp

34. IKE is a complex protocol based on ______ other protocols.

Correct : B. three

35. IPSec defines two protocols: _______ and ________.

Correct : A. ah; ssl

36. In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

Correct : A. transport

37. ______ is the protocol designed to create security associations, both inbound and outbound.

Correct : D. ike

38. A _______network is used inside an organization.

Correct : A. private

39. SSL provides _________.

Correct : D. all of the above

40. The Internet authorities have reserved addresses for _______.

Correct : D. none of the above

41. An _________ is a network that allows authorized access from outside users.

Correct : C. extranet

42. _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.

Correct : A. ipsec

43. IKE uses _______.

Correct : D. all of the above

44. IPSec uses a set of SAs called the ________.

Correct : C. sadb

45. An ________ is a private network that uses the Internet model.

Correct : A. intranet

46. ______ is actually an IETF version of _____.

Correct : C. tls; ssl

47. In ______, there is a single path from the fully trusted authority to any certificate.

Correct : A. x509

48. The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.

Correct : B. cipher suite

49. A ______ provides privacy for LANs that must communicate through the global Internet.

Correct : D. vpn

50. _______ uses the idea of certificate trust levels.

Correct : B. pgp

51. IPSec in the ______ mode does not protect the IP header.

Correct : A. transport

52. ________ provides privacy, integrity, and authentication in e-mail.

Correct : C. pgp

53. In _____, there can be multiple paths from fully or partially trusted authorities.

Correct : B. pgp

54. ______ provides authentication at the IP level.

Correct : A. ah

55. In _______, the cryptographic algorithms and secrets are sent with the message.

Correct : D. pgp

56. ______ is designed to provide security and compression services to data generated from the application layer.

Correct : D. both (a) and (b)

57. _______ provide security at the transport layer.

Correct : D. both (a) and (b)

58. ______ was invented by Phil Zimmerman.

Correct : C. pgp

59. A _______ layer security protocol provides end-to-end security services for applications.

Correct : C. transport

60. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

Correct : B. public

61. A user needs to send the server some information. The request line method is _______.

Correct : C. post

62. In a URL, the _______ is the client-server program used to retrieve the document.

Correct : B. protocol

63. A _______ document is created by a Web server whenever a browser requests the document.

Correct : B. dynamic

64. One way to create an active document is to use __________.

Correct : C. java applets

65. A cookie is made by the ________ and eaten by the _________.

Correct : C. server; server

66. A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.

Correct : A. static

67. The _________ is a standard for specifying any kind of information on the Internet.

Correct : A. url

68. _________ is a repository of information linked together from points all over the world.

Correct : A. the www

69. Which of the following is present in both an HTTP request line and a status line?

Correct : A. http version number

70. Active documents are sometimes referred to as _________ dynamic documents.

Correct : A. client-site

71. HTTP uses the services of _________ on well-known port 80.

Correct : C. tcp

72. Dynamic documents are sometimes referred to as _________ dynamic documents.

Correct : B. server-site

73. For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.

Correct : C. active

74. In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.

Correct : B. proxy

75. The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.

Correct : A. head

76. A response message always contains _______.

Correct : C. a status line and a header

77. In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon.

Correct : D. none of the above

78. An applet is _______ document application program.

Correct : B. an active

79. The documents in the WWW can be grouped into ______ broad categories.

Correct : B. three

80. _____________ is a language for creating Web pages.

Correct : B. html

81. ___________ is a technology that creates and handles dynamic documents.

Correct : B. cgi

82. The HTTP request line contains a _______ method to request a document from the server.

Correct : A. get

83. In a ___________connection, the server leaves the connection open for more requests after sending a response.

Correct : A. persistent

84. An HTTP request message always contains _______.

Correct : B. a request line and a header

85. In a ___________ connection, one TCP connection is made for each request/response.

Correct : B. nonpersistent

86. In a URL, the _______ is the full name of the file where the information is located.

Correct : A. path

87. In a URL, the ______ is the computer on which the information is located.

Correct : C. host

88. HTTP version 1.1 specifies a _________connection by default.

Correct : A. persistent

89. In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.

Correct : D. none of the above

90. The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server.

Correct : C. distributed