Top 80+ Solved Internet Security MCQ Questions Answer

From 1 to 15 of 90

Q. Message_____ means that the data must arrive at the receiver exactly as sent.

a. confidentiality

b. integrity

c. authentication

d. none of the above

  • b. integrity

Q. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

a. confidentiality

b. integrity

c. authentication

d. none of the above

  • c. authentication

Q. A(n) ________function creates a message digest out of a message.

a. encryption

b. decryption

c. hash

d. none of the above

  • c. hash

Q. The secret key between members needs to be created as a ______ key when two members contact KDC.

a. public

b. session

c. complimentary

d. none of the above

  • b. session

Q. The ________ criterion ensures that a message cannot easily be forged.

a. one-wayness

b. weak-collision-resistance

c. strong-collision-resistance

d. none of the above

  • b. weak-collision-resistance

Q. A witness used in entity authentication is ____________.

a. something known

b. something possessed

c. something inherent

d. all of the above

  • d. all of the above

Q. A _______ message digest is used as an MDC.

a. keyless

b. keyed

c. either (a) or (b)

d. neither (a) nor (b)

  • a. keyless

Q. A(n)______ creates a secret key only between a member and the center.

a. ca

b. kdc

c. kdd

d. none of the above

  • b. kdc

Q. ________ means to prove the identity of the entity that tries to access the system's resources.

a. message authentication

b. entity authentication

c. message confidentiality

d. none of the above

  • b. entity authentication

Q. A ________ signature is included in the document; a _______ signature is a separate entity.

a. conventional; digital

b. digital; digital

c. either (a) or (b)

d. neither (a) nor (b)

  • a. conventional; digital

Q. If _________ is needed, a cryptosystem must be applied over the scheme.

a. integrity

b. confidentiality

c. nonrepudiation

d. authentication

  • b. confidentiality

Q. Digital signature provides ________.

a. authentication

b. non-repudiation

c. both (a) and (b)

d. neither (a) nor (b)

  • c. both (a) and (b)

Q. Digital signature cannot provide ________ for the message.

a. integrity

b. confidentiality

c. non-repudiation

d. authentication

  • b. confidentiality

Q. To authenticate the data origin, one needs a(n) _______.

a. mdc

b. mac

c. either (a) or (b)

d. neither (a) nor (b)

  • a. mdc
Subscribe Now

Get All Updates & News