1. Message ________ means privacy that the sender and reciever expect privacy.
Correct : A. confidentiality
2. Message_____ means that the data must arrive at the reciever exactly as sent
Correct : B. integrity
3. Message _______ means that the receiver is ensured that the message message is coming from
the indended sender not an imposter.
Correct : C. authentication
4. __________means that a sender must not be able to deny sending a message that he sent.
Correct : D. Nonrepudiation
5. A(n) can be used to preserve the integrity of a document or a
message.
Correct : A. message digest
6. A(n) function creates a message digest out of a message.
Correct : C. hash
7. A hash function must meet criteria.
Correct : B. three
8. Password-based authentication can be divided into two broad categories: and
_____
Correct : C. fixed; one-time
9. _ creates a secret key only between a member and the center.
Correct : B. KDC
10. The secret key between members needs to be created as a ________
key when two members contact KDC.
Correct : B. session
11. is a popular session key creator protocol that requires an authentica
Correct : A. KDC
12. A(n) is a hierarchical system that answers queries about key
certification.
Correct : C. CA
13. Firewalls are to protect against
Correct : D. Unauthorized Attacks
14. The ________criterion ensures that we cannot find two messages that hash to the
same digest
Correct : B. weak-collision-resistance
15. _______________________ is a term used in cryptography that refers to a message before
encryption or after decryption.
Correct : A. Cipher text
16. The ________ is encrypted text
Correct : C. secret text
17. _______________________ ensures that information are in a format that is true and
correct to its original purposes.
Correct : A. Availability
18. _____________________ ensures that information and resources are available to those
who need them.
Correct : D. Integrity
19. _______________________ is the process of identifying an individual, usually based on
a username and password.
Correct : A. Authentication
20. ___________________ is the process of giving individuals access to system objects
based on their identity.
Correct : B. Authorization
21. In symmetric-key cryptography, the key locks and unlocks the box is
Correct : A. Same
22. The ciphers of today are called round ciphers because they involve
Correct : C. Multiple Round
23. Symmetric-key cryptography started thousands of years ago when people needed to
exchange
Correct : A. Files
24. The Advanced Encryption Standard (AES) was designed
Correct : A. National Institute of Standards and Technology
25. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
Correct : C. SS7 (Signalling System 7)
26. If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is
______ fragment.
Correct : A. First
27. The design issue of Datalink Layer in OSI Reference Model is
Correct : A. Framing
28. Data Encryption Techniques are particularly used for _______.
Correct : A. protecting data in Data Communication System
29. An example of a layer that is absent in broadcast networks is:
Correct : C. Network layer Application layer
30. Encryption and Decryption is the responsibility of ___ Layer.
Correct : C. Application
31. The VLF and LF bauds use propagation for communication
Correct : A. Ground
32. The start and stop bits are used in serial communication for
Correct : C. Synchronization
33. ___________ is a type of transmission impairment in which the Signal looses strength
due to The resistance of the transmission medium.
Correct : A. Attenuation
34. ________________ is a bit-oriented protocol for communication over point-to-point and
multi-point links .
Correct : A. Stop-and-wait
35. In substitution, a character in the plaintext is always changed to the same character in
the ciphertext, regardless of its position in the text.
Correct : B. mono alphabetic
36. Which of the following is not associated with the session layer ?
Correct : C. Semantics of the information transmitted
37. What is the size of the 'total length' field in IPv4 datagram ?
Correct : C. 16 bits
38. The process of dividing an analog signal into a string of discrete outputs, each of
constant amplitude, is called :
Correct : D. Quantization
39. Which transmission technique guarantees that data packets will be received by the
receiver in the same order in which they were sent by the sender.
Correct : D. Circuit switching
40. Which of the following control fields in TCP header is used to specify whether the sender
has no more data to transmit?