Top 80+ Solved Internet Security MCQ Questions Answer
Q. A(n) _________ can be used to preserve the integrity of a document or a message.
a. message digest
b. message summary
c. encrypted message
d. none of the above
Q. Challenge-response authentication can be done using ________.
a. symmetric-key ciphers
b. asymmetric-key ciphers
c. keyed-hash functions
d. all of the above
Q. The _______criterion ensures that we cannot find two messages that hash to the same digest.
a. one-wayness
b. weak-collision-resistance
c. strong-collision-resistance
d. none of the above
Q. A digital signature needs a(n)_________ system.
a. symmetric-key
b. asymmetric-key
c. either (a) or (b)
d. neither (a) nor (b)
Q. A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.
a. kdc
b. kerberos
c. ca
d. none of the above
Q. Message ________ means that the sender and the receiver expect privacy.
a. confidentiality
b. integrity
c. authentication
d. none of the above
Q. In ________ authentication, the claimant proves that she knows a secret without actually sending it.
a. password-based
b. challenge-response
c. either (a) or (b)
d. neither (a) nor (b)
Q. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.
a. message authentication
b. entity authentication
c. message confidentiality
d. message integrity
Q. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
a. one-wayness
b. weak-collision-resistance
c. strong-collision-resistance
d. none of the above
Q. A(n) ______ is a hierarchical system that answers queries about key certification.
a. kdc
b. pki
c. ca
d. none of the above
Q. _________ means that a sender must not be able to deny sending a message that he sent.
a. confidentiality
b. integrity
c. authentication
d. nonrepudiation
Q. __________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.
a. kdc
b. kerberos
c. ca
d. none of the above
Q. Password-based authentication can be divided into two broad categories: _______ and _______.
a. fixed; variable
b. time-stamped; fixed
c. fixed; one-time
d. none of the above
Q. _________ operates in the transport mode or the tunnel mode.
a. ipsec
b. ssl
c. pgp
d. none of the above