Top 80+ Solved Internet Security MCQ Questions Answer

From 16 to 30 of 90

Q. A(n) _________ can be used to preserve the integrity of a document or a message.

a. message digest

b. message summary

c. encrypted message

d. none of the above

  • a. message digest

Q. Challenge-response authentication can be done using ________.

a. symmetric-key ciphers

b. asymmetric-key ciphers

c. keyed-hash functions

d. all of the above

  • d. all of the above

Q. The _______criterion ensures that we cannot find two messages that hash to the same digest.

a. one-wayness

b. weak-collision-resistance

c. strong-collision-resistance

d. none of the above

  • c. strong-collision-resistance

Q. A digital signature needs a(n)_________ system.

a. symmetric-key

b. asymmetric-key

c. either (a) or (b)

d. neither (a) nor (b)

  • b. asymmetric-key

Q. Message ________ means that the sender and the receiver expect privacy.

a. confidentiality

b. integrity

c. authentication

d. none of the above

  • a. confidentiality

Q. In ________ authentication, the claimant proves that she knows a secret without actually sending it.

a. password-based

b. challenge-response

c. either (a) or (b)

d. neither (a) nor (b)

  • b. challenge-response

Q. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

a. message authentication

b. entity authentication

c. message confidentiality

d. message integrity

  • b. entity authentication

Q. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.

a. one-wayness

b. weak-collision-resistance

c. strong-collision-resistance

d. none of the above

  • a. one-wayness

Q. _________ means that a sender must not be able to deny sending a message that he sent.

a. confidentiality

b. integrity

c. authentication

d. nonrepudiation

  • d. nonrepudiation

Q. A hash function must meet ________ criteria.

a. two

b. three

c. four

d. none of the above

  • b. three

Q. Password-based authentication can be divided into two broad categories: _______ and _______.

a. fixed; variable

b. time-stamped; fixed

c. fixed; one-time

d. none of the above

  • c. fixed; one-time

Q. _________ operates in the transport mode or the tunnel mode.

a. ipsec

b. ssl

c. pgp

d. none of the above

  • a. ipsec
Subscribe Now

Get All Updates & News