Top 80+ Solved Internet Security MCQ Questions Answer
Q. Message_____ means that the data must arrive at the receiver exactly as sent.
a. confidentiality
b. integrity
c. authentication
d. none of the above
Q. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
a. confidentiality
b. integrity
c. authentication
d. none of the above
Q. A(n) ________function creates a message digest out of a message.
a. encryption
b. decryption
c. hash
d. none of the above
Q. The secret key between members needs to be created as a ______ key when two members contact KDC.
a. public
b. session
c. complimentary
d. none of the above
Q. The ________ criterion ensures that a message cannot easily be forged.
a. one-wayness
b. weak-collision-resistance
c. strong-collision-resistance
d. none of the above
Q. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
a. kdc
b. ca
c. kdd
d. none of the above
Q. A witness used in entity authentication is ____________.
a. something known
b. something possessed
c. something inherent
d. all of the above
Q. A _______ message digest is used as an MDC.
a. keyless
b. keyed
c. either (a) or (b)
d. neither (a) nor (b)
Q. A(n)______ creates a secret key only between a member and the center.
a. ca
b. kdc
c. kdd
d. none of the above
Q. ________ means to prove the identity of the entity that tries to access the system's resources.
a. message authentication
b. entity authentication
c. message confidentiality
d. none of the above
Q. A ________ signature is included in the document; a _______ signature is a separate entity.
a. conventional; digital
b. digital; digital
c. either (a) or (b)
d. neither (a) nor (b)
Q. If _________ is needed, a cryptosystem must be applied over the scheme.
a. integrity
b. confidentiality
c. nonrepudiation
d. authentication
Q. Digital signature provides ________.
a. authentication
b. non-repudiation
c. both (a) and (b)
d. neither (a) nor (b)
Q. Digital signature cannot provide ________ for the message.
a. integrity
b. confidentiality
c. non-repudiation
d. authentication
Q. To authenticate the data origin, one needs a(n) _______.
a. mdc
b. mac
c. either (a) or (b)
d. neither (a) nor (b)