Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

A _______network is used inside an organization.

A. private
B. public
C. semi-private
D. semi-public
Answer» B. public
2.

______ is the protocol designed to create security associations, both inbound and outbound.

A. sa
B. ca
C. kdc
D. ike
Answer» E.
3.

In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. tunnel
4.

IPSec defines two protocols: _______ and ________.

A. ah; ssl
B. pgp; esp
C. ah; esp
D. all of the above
Answer» B. pgp; esp
5.

IKE is a complex protocol based on ______ other protocols.

A. two
B. three
C. four
D. five
Answer» C. four
6.

One security protocol for the e-mail system is _________.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» D. none of the above
7.

______ provides either authentication or encryption, or both, for packets at the IP level.

A. ah
B. esp
C. pgp
D. ssl
Answer» C. pgp
8.

_________ operates in the transport mode or the tunnel mode.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» B. ssl
9.

Password-based authentication can be divided into two broad categories: _______ and _______.

A. fixed; variable
B. time-stamped; fixed
C. fixed; one-time
D. none of the above
Answer» D. none of the above
10.

__________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.

A. kdc
B. kerberos
C. ca
D. none of the above
Answer» C. ca
11.

A hash function must meet ________ criteria.

A. two
B. three
C. four
D. none of the above
Answer» C. four
12.

_________ means that a sender must not be able to deny sending a message that he sent.

A. confidentiality
B. integrity
C. authentication
D. nonrepudiation
Answer» E.
13.

A(n) ______ is a hierarchical system that answers queries about key certification.

A. kdc
B. pki
C. ca
D. none of the above
Answer» D. none of the above
14.

The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer» B. weak-collision-resistance
15.

In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

A. message authentication
B. entity authentication
C. message confidentiality
D. message integrity
Answer» C. message confidentiality
16.

In ________ authentication, the claimant proves that she knows a secret without actually sending it.

A. password-based
B. challenge-response
C. either (a) or (b)
D. neither (a) nor (b)
Answer» C. either (a) or (b)
17.

Message ________ means that the sender and the receiver expect privacy.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» B. integrity
18.

A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.

A. kdc
B. kerberos
C. ca
D. none of the above
Answer» D. none of the above
19.

A digital signature needs a(n)_________ system.

A. symmetric-key
B. asymmetric-key
C. either (a) or (b)
D. neither (a) nor (b)
Answer» C. either (a) or (b)
20.

The _______criterion ensures that we cannot find two messages that hash to the same digest.

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer» D. none of the above
21.

Challenge-response authentication can be done using ________.

A. symmetric-key ciphers
B. asymmetric-key ciphers
C. keyed-hash functions
D. all of the above
Answer» E.
22.

A(n) _________ can be used to preserve the integrity of a document or a message.

A. message digest
B. message summary
C. encrypted message
D. none of the above
Answer» B. message summary
23.

To authenticate the data origin, one needs a(n) _______.

A. mdc
B. mac
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. mac
24.

Digital signature cannot provide ________ for the message.

A. integrity
B. confidentiality
C. non-repudiation
D. authentication
Answer» C. non-repudiation
25.

Digital signature provides ________.

A. authentication
B. non-repudiation
C. both (a) and (b)
D. neither (a) nor (b)
Answer» D. neither (a) nor (b)
26.

If _________ is needed, a cryptosystem must be applied over the scheme.

A. integrity
B. confidentiality
C. nonrepudiation
D. authentication
Answer» C. nonrepudiation
27.

A ________ signature is included in the document; a _______ signature is a separate entity.

A. conventional; digital
B. digital; digital
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. digital; digital
28.

________ means to prove the identity of the entity that tries to access the system's resources.

A. message authentication
B. entity authentication
C. message confidentiality
D. none of the above
Answer» C. message confidentiality
29.

A(n)______ creates a secret key only between a member and the center.

A. ca
B. kdc
C. kdd
D. none of the above
Answer» C. kdd
30.

A _______ message digest is used as an MDC.

A. keyless
B. keyed
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. keyed
31.

A witness used in entity authentication is ____________.

A. something known
B. something possessed
C. something inherent
D. all of the above
Answer» E.
32.

A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A. kdc
B. ca
C. kdd
D. none of the above
Answer» B. ca
33.

The ________ criterion ensures that a message cannot easily be forged.

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer» C. strong-collision-resistance
34.

The secret key between members needs to be created as a ______ key when two members contact KDC.

A. public
B. session
C. complimentary
D. none of the above
Answer» C. complimentary
35.

A(n) ________function creates a message digest out of a message.

A. encryption
B. decryption
C. hash
D. none of the above
Answer» D. none of the above
36.

Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» D. none of the above
37.

Message_____ means that the data must arrive at the receiver exactly as sent.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» C. authentication