1. Message_____ means that the data must arrive at the receiver exactly as sent.
Correct : B. integrity
2. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
Correct : C. authentication
3. A(n) ________function creates a message digest out of a message.
Correct : C. hash
4. The secret key between members needs to be created as a ______ key when two members contact KDC.
Correct : B. session
5. The ________ criterion ensures that a message cannot easily be forged.
Correct : B. weak-collision-resistance
6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
Correct : A. kdc
7. A witness used in entity authentication is ____________.
Correct : D. all of the above
8. A _______ message digest is used as an MDC.
Correct : A. keyless
9. A(n)______ creates a secret key only between a member and the center.
Correct : B. kdc
10. ________ means to prove the identity of the entity that tries to access the system's resources.
Correct : B. entity authentication
11. A ________ signature is included in the document; a _______ signature is a separate entity.
Correct : A. conventional; digital
12. If _________ is needed, a cryptosystem must be applied over the scheme.
Correct : B. confidentiality
13. Digital signature provides ________.
Correct : C. both (a) and (b)
14. Digital signature cannot provide ________ for the message.
Correct : B. confidentiality
15. To authenticate the data origin, one needs a(n) _______.
Correct : A. mdc
16. A(n) _________ can be used to preserve the integrity of a document or a message.
Correct : A. message digest
17. Challenge-response authentication can be done using ________.
Correct : D. all of the above
18. The _______criterion ensures that we cannot find two messages that hash to the same digest.
Correct : C. strong-collision-resistance
19. A digital signature needs a(n)_________ system.
Correct : B. asymmetric-key
20. A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.
Correct : C. ca
21. Message ________ means that the sender and the receiver expect privacy.
Correct : A. confidentiality
22. In ________ authentication, the claimant proves that she knows a secret without actually sending it.
Correct : B. challenge-response
23. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.
Correct : B. entity authentication
24. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
Correct : A. one-wayness
25. A(n) ______ is a hierarchical system that answers queries about key certification.
Correct : C. ca
26. _________ means that a sender must not be able to deny sending a message that he sent.
Correct : D. nonrepudiation
27. A hash function must meet ________ criteria.
Correct : B. three
28. __________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.
Correct : B. kerberos
29. Password-based authentication can be divided into two broad categories: _______ and _______.
Correct : C. fixed; one-time
30. _________ operates in the transport mode or the tunnel mode.
Correct : A. ipsec
31. IKE creates SAs for _____.
Correct : C. ipsec
32. ______ provides either authentication or encryption, or both, for packets at the IP level.
Correct : B. esp
33. One security protocol for the e-mail system is _________.
Correct : C. pgp
34. IKE is a complex protocol based on ______ other protocols.
Correct : B. three
35. IPSec defines two protocols: _______ and ________.
Correct : A. ah; ssl
36. In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.
Correct : A. transport
37. ______ is the protocol designed to create security associations, both inbound and outbound.
Correct : D. ike
38. A _______network is used inside an organization.
Correct : A. private
39. SSL provides _________.
Correct : D. all of the above
40. The Internet authorities have reserved addresses for _______.
Correct : D. none of the above
41. An _________ is a network that allows authorized access from outside users.
Correct : C. extranet
42. _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.
Correct : A. ipsec
43. IKE uses _______.
Correct : D. all of the above
44. IPSec uses a set of SAs called the ________.
Correct : C. sadb
45. An ________ is a private network that uses the Internet model.
Correct : A. intranet
46. ______ is actually an IETF version of _____.
Correct : C. tls; ssl
47. In ______, there is a single path from the fully trusted authority to any certificate.
Correct : A. x509
48. The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
Correct : B. cipher suite
49. A ______ provides privacy for LANs that must communicate through the global Internet.
Correct : D. vpn
50. _______ uses the idea of certificate trust levels.
Correct : B. pgp
51. IPSec in the ______ mode does not protect the IP header.
Correct : A. transport
52. ________ provides privacy, integrity, and authentication in e-mail.
Correct : C. pgp
53. In _____, there can be multiple paths from fully or partially trusted authorities.
Correct : B. pgp
54. ______ provides authentication at the IP level.
Correct : A. ah
55. In _______, the cryptographic algorithms and secrets are sent with the message.
Correct : D. pgp
56. ______ is designed to provide security and compression services to data generated from the application layer.
Correct : D. both (a) and (b)
57. _______ provide security at the transport layer.
Correct : D. both (a) and (b)
58. ______ was invented by Phil Zimmerman.
Correct : C. pgp
59. A _______ layer security protocol provides end-to-end security services for applications.
Correct : C. transport
60. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
Correct : B. public
61. A user needs to send the server some information. The request line method is _______.
Correct : C. post
62. In a URL, the _______ is the client-server program used to retrieve the document.
Correct : B. protocol
63. A _______ document is created by a Web server whenever a browser requests the document.
Correct : B. dynamic
64. One way to create an active document is to use __________.
Correct : C. java applets
65. A cookie is made by the ________ and eaten by the _________.
Correct : C. server; server
66. A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.
Correct : A. static
67. The _________ is a standard for specifying any kind of information on the Internet.
Correct : A. url
68. _________ is a repository of information linked together from points all over the world.
Correct : A. the www
69. Which of the following is present in both an HTTP request line and a status line?
Correct : A. http version number
70. Active documents are sometimes referred to as _________ dynamic documents.
Correct : A. client-site
71. HTTP uses the services of _________ on well-known port 80.
Correct : C. tcp
72. Dynamic documents are sometimes referred to as _________ dynamic documents.
Correct : B. server-site
73. For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.
Correct : C. active
74. In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.
Correct : B. proxy
75. The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.
Correct : A. head
76. A response message always contains _______.
Correct : C. a status line and a header
77. In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon.
Correct : D. none of the above
78. An applet is _______ document application program.
Correct : B. an active
79. The documents in the WWW can be grouped into ______ broad categories.
Correct : B. three
80. _____________ is a language for creating Web pages.
Correct : B. html
81. ___________ is a technology that creates and handles dynamic documents.
Correct : B. cgi
82. The HTTP request line contains a _______ method to request a document from the server.
Correct : A. get
83. In a ___________connection, the server leaves the connection open for more requests after sending a response.
Correct : A. persistent
84. An HTTP request message always contains _______.
Correct : B. a request line and a header
85. In a ___________ connection, one TCP connection is made for each request/response.
Correct : B. nonpersistent
86. In a URL, the _______ is the full name of the file where the information is located.
Correct : A. path
87. In a URL, the ______ is the computer on which the information is located.
Correct : C. host
88. HTTP version 1.1 specifies a _________connection by default.
Correct : A. persistent
89. In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.
Correct : D. none of the above
90. The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server.