Explore topic-wise MCQs in Bachelor of Sc in Information Technology.

This section includes 87 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Sc in Information Technology knowledge and support exam preparation. Choose a topic below to get started.

51.

A _______network is used inside an organization.

A. private
B. public
C. semi-private
D. semi-public
Answer» B. public
52.

______ is the protocol designed to create security associations, both inbound and outbound.

A. sa
B. ca
C. kdc
D. ike
Answer» E.
53.

In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. tunnel
54.

IPSec defines two protocols: _______ and ________.

A. ah; ssl
B. pgp; esp
C. ah; esp
D. all of the above
Answer» B. pgp; esp
55.

IKE is a complex protocol based on ______ other protocols.

A. two
B. three
C. four
D. five
Answer» C. four
56.

One security protocol for the e-mail system is _________.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» D. none of the above
57.

______ provides either authentication or encryption, or both, for packets at the IP level.

A. ah
B. esp
C. pgp
D. ssl
Answer» C. pgp
58.

_________ operates in the transport mode or the tunnel mode.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» B. ssl
59.

Password-based authentication can be divided into two broad categories: _______ and _______.

A. fixed; variable
B. time-stamped; fixed
C. fixed; one-time
D. none of the above
Answer» D. none of the above
60.

__________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.

A. kdc
B. kerberos
C. ca
D. none of the above
Answer» C. ca
61.

A hash function must meet ________ criteria.

A. two
B. three
C. four
D. none of the above
Answer» C. four
62.

_________ means that a sender must not be able to deny sending a message that he sent.

A. confidentiality
B. integrity
C. authentication
D. nonrepudiation
Answer» E.
63.

A(n) ______ is a hierarchical system that answers queries about key certification.

A. kdc
B. pki
C. ca
D. none of the above
Answer» D. none of the above
64.

The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer» B. weak-collision-resistance
65.

In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

A. message authentication
B. entity authentication
C. message confidentiality
D. message integrity
Answer» C. message confidentiality
66.

In ________ authentication, the claimant proves that she knows a secret without actually sending it.

A. password-based
B. challenge-response
C. either (a) or (b)
D. neither (a) nor (b)
Answer» C. either (a) or (b)
67.

Message ________ means that the sender and the receiver expect privacy.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» B. integrity
68.

A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.

A. kdc
B. kerberos
C. ca
D. none of the above
Answer» D. none of the above
69.

A digital signature needs a(n)_________ system.

A. symmetric-key
B. asymmetric-key
C. either (a) or (b)
D. neither (a) nor (b)
Answer» C. either (a) or (b)
70.

The _______criterion ensures that we cannot find two messages that hash to the same digest.

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer» D. none of the above
71.

Challenge-response authentication can be done using ________.

A. symmetric-key ciphers
B. asymmetric-key ciphers
C. keyed-hash functions
D. all of the above
Answer» E.
72.

A(n) _________ can be used to preserve the integrity of a document or a message.

A. message digest
B. message summary
C. encrypted message
D. none of the above
Answer» B. message summary
73.

To authenticate the data origin, one needs a(n) _______.

A. mdc
B. mac
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. mac
74.

Digital signature cannot provide ________ for the message.

A. integrity
B. confidentiality
C. non-repudiation
D. authentication
Answer» C. non-repudiation
75.

Digital signature provides ________.

A. authentication
B. non-repudiation
C. both (a) and (b)
D. neither (a) nor (b)
Answer» D. neither (a) nor (b)
76.

If _________ is needed, a cryptosystem must be applied over the scheme.

A. integrity
B. confidentiality
C. nonrepudiation
D. authentication
Answer» C. nonrepudiation
77.

A ________ signature is included in the document; a _______ signature is a separate entity.

A. conventional; digital
B. digital; digital
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. digital; digital
78.

________ means to prove the identity of the entity that tries to access the system's resources.

A. message authentication
B. entity authentication
C. message confidentiality
D. none of the above
Answer» C. message confidentiality
79.

A(n)______ creates a secret key only between a member and the center.

A. ca
B. kdc
C. kdd
D. none of the above
Answer» C. kdd
80.

A _______ message digest is used as an MDC.

A. keyless
B. keyed
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. keyed
81.

A witness used in entity authentication is ____________.

A. something known
B. something possessed
C. something inherent
D. all of the above
Answer» E.
82.

A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A. kdc
B. ca
C. kdd
D. none of the above
Answer» B. ca
83.

The ________ criterion ensures that a message cannot easily be forged.

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer» C. strong-collision-resistance
84.

The secret key between members needs to be created as a ______ key when two members contact KDC.

A. public
B. session
C. complimentary
D. none of the above
Answer» C. complimentary
85.

A(n) ________function creates a message digest out of a message.

A. encryption
B. decryption
C. hash
D. none of the above
Answer» D. none of the above
86.

Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» D. none of the above
87.

Message_____ means that the data must arrive at the receiver exactly as sent.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» C. authentication