Quiznetik

Network Security | Set 1

1. Message ________ means privacy that the sender and reciever expect privacy.

Correct : A. confidentiality

2. Message_____ means that the data must arrive at the reciever exactly as sent

Correct : B. integrity

3. Message _______ means that the receiver is ensured that the message message is coming from the indended sender not an imposter.

Correct : C. authentication

4. __________means that a sender must not be able to deny sending a message that he sent.

Correct : D. Nonrepudiation

5. A(n) can be used to preserve the integrity of a document or a message.

Correct : A. message digest

6. A(n) function creates a message digest out of a message.

Correct : C. hash

7. A hash function must meet criteria.

Correct : B. three

8. Password-based authentication can be divided into two broad categories: and _____

Correct : C. fixed; one-time

9. _ creates a secret key only between a member and the center.

Correct : B. KDC

10. The secret key between members needs to be created as a ________ key when two members contact KDC.

Correct : B. session

11. is a popular session key creator protocol that requires an authentica

Correct : A. KDC

12. A(n) is a hierarchical system that answers queries about key certification.

Correct : C. CA

13. Firewalls are to protect against

Correct : D. Unauthorized Attacks

14. The ________criterion ensures that we cannot find two messages that hash to the same digest

Correct : B. weak-collision-resistance

15. _______________________ is a term used in cryptography that refers to a message before encryption or after decryption.

Correct : A. Cipher text

16. The ________ is encrypted text

Correct : C. secret text

17. _______________________ ensures that information are in a format that is true and correct to its original purposes.

Correct : A. Availability

18. _____________________ ensures that information and resources are available to those who need them.

Correct : D. Integrity

19. _______________________ is the process of identifying an individual, usually based on a username and password.

Correct : A. Authentication

20. ___________________ is the process of giving individuals access to system objects based on their identity.

Correct : B. Authorization

21. In symmetric-key cryptography, the key locks and unlocks the box is

Correct : A. Same

22. The ciphers of today are called round ciphers because they involve

Correct : C. Multiple Round

23. Symmetric-key cryptography started thousands of years ago when people needed to exchange

Correct : A. Files

24. The Advanced Encryption Standard (AES) was designed

Correct : A. National Institute of Standards and Technology

25. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?

Correct : C. SS7 (Signalling System 7)

26. If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment.

Correct : A. First

27. The design issue of Datalink Layer in OSI Reference Model is

Correct : A. Framing

28. Data Encryption Techniques are particularly used for _______.

Correct : A. protecting data in Data Communication System

29. An example of a layer that is absent in broadcast networks is:

Correct : C. Network layer Application layer

30. Encryption and Decryption is the responsibility of ___ Layer.

Correct : C. Application

31. The VLF and LF bauds use propagation for communication

Correct : A. Ground

32. The start and stop bits are used in serial communication for

Correct : C. Synchronization

33. ___________ is a type of transmission impairment in which the Signal looses strength due to The resistance of the transmission medium.

Correct : A. Attenuation

34. ________________ is a bit-oriented protocol for communication over point-to-point and multi-point links .

Correct : A. Stop-and-wait

35. In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.

Correct : B. mono alphabetic

36. Which of the following is not associated with the session layer ?

Correct : C. Semantics of the information transmitted

37. What is the size of the 'total length' field in IPv4 datagram ?

Correct : C. 16 bits

38. The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called :

Correct : D. Quantization

39. Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender.

Correct : D. Circuit switching

40. Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit?

Correct : A. FIN

41. Which are the two modes of IP security?

Correct : A. Transport and certificate