MCQOPTIONS
Saved Bookmarks
This section includes 87 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Sc in Information Technology knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
A _______network is used inside an organization. |
| A. | private |
| B. | public |
| C. | semi-private |
| D. | semi-public |
| Answer» B. public | |
| 52. |
______ is the protocol designed to create security associations, both inbound and outbound. |
| A. | sa |
| B. | ca |
| C. | kdc |
| D. | ike |
| Answer» E. | |
| 53. |
In the ______ mode, IPSec protects information delivered from the transport layer to the network layer. |
| A. | transport |
| B. | tunnel |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» B. tunnel | |
| 54. |
IPSec defines two protocols: _______ and ________. |
| A. | ah; ssl |
| B. | pgp; esp |
| C. | ah; esp |
| D. | all of the above |
| Answer» B. pgp; esp | |
| 55. |
IKE is a complex protocol based on ______ other protocols. |
| A. | two |
| B. | three |
| C. | four |
| D. | five |
| Answer» C. four | |
| 56. |
One security protocol for the e-mail system is _________. |
| A. | ipsec |
| B. | ssl |
| C. | pgp |
| D. | none of the above |
| Answer» D. none of the above | |
| 57. |
______ provides either authentication or encryption, or both, for packets at the IP level. |
| A. | ah |
| B. | esp |
| C. | pgp |
| D. | ssl |
| Answer» C. pgp | |
| 58. |
_________ operates in the transport mode or the tunnel mode. |
| A. | ipsec |
| B. | ssl |
| C. | pgp |
| D. | none of the above |
| Answer» B. ssl | |
| 59. |
Password-based authentication can be divided into two broad categories: _______ and _______. |
| A. | fixed; variable |
| B. | time-stamped; fixed |
| C. | fixed; one-time |
| D. | none of the above |
| Answer» D. none of the above | |
| 60. |
__________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server. |
| A. | kdc |
| B. | kerberos |
| C. | ca |
| D. | none of the above |
| Answer» C. ca | |
| 61. |
A hash function must meet ________ criteria. |
| A. | two |
| B. | three |
| C. | four |
| D. | none of the above |
| Answer» C. four | |
| 62. |
_________ means that a sender must not be able to deny sending a message that he sent. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | nonrepudiation |
| Answer» E. | |
| 63. |
A(n) ______ is a hierarchical system that answers queries about key certification. |
| A. | kdc |
| B. | pki |
| C. | ca |
| D. | none of the above |
| Answer» D. none of the above | |
| 64. |
The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given. |
| A. | one-wayness |
| B. | weak-collision-resistance |
| C. | strong-collision-resistance |
| D. | none of the above |
| Answer» B. weak-collision-resistance | |
| 65. |
In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses. |
| A. | message authentication |
| B. | entity authentication |
| C. | message confidentiality |
| D. | message integrity |
| Answer» C. message confidentiality | |
| 66. |
In ________ authentication, the claimant proves that she knows a secret without actually sending it. |
| A. | password-based |
| B. | challenge-response |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» C. either (a) or (b) | |
| 67. |
Message ________ means that the sender and the receiver expect privacy. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | none of the above |
| Answer» B. integrity | |
| 68. |
A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate. |
| A. | kdc |
| B. | kerberos |
| C. | ca |
| D. | none of the above |
| Answer» D. none of the above | |
| 69. |
A digital signature needs a(n)_________ system. |
| A. | symmetric-key |
| B. | asymmetric-key |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» C. either (a) or (b) | |
| 70. |
The _______criterion ensures that we cannot find two messages that hash to the same digest. |
| A. | one-wayness |
| B. | weak-collision-resistance |
| C. | strong-collision-resistance |
| D. | none of the above |
| Answer» D. none of the above | |
| 71. |
Challenge-response authentication can be done using ________. |
| A. | symmetric-key ciphers |
| B. | asymmetric-key ciphers |
| C. | keyed-hash functions |
| D. | all of the above |
| Answer» E. | |
| 72. |
A(n) _________ can be used to preserve the integrity of a document or a message. |
| A. | message digest |
| B. | message summary |
| C. | encrypted message |
| D. | none of the above |
| Answer» B. message summary | |
| 73. |
To authenticate the data origin, one needs a(n) _______. |
| A. | mdc |
| B. | mac |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» B. mac | |
| 74. |
Digital signature cannot provide ________ for the message. |
| A. | integrity |
| B. | confidentiality |
| C. | non-repudiation |
| D. | authentication |
| Answer» C. non-repudiation | |
| 75. |
Digital signature provides ________. |
| A. | authentication |
| B. | non-repudiation |
| C. | both (a) and (b) |
| D. | neither (a) nor (b) |
| Answer» D. neither (a) nor (b) | |
| 76. |
If _________ is needed, a cryptosystem must be applied over the scheme. |
| A. | integrity |
| B. | confidentiality |
| C. | nonrepudiation |
| D. | authentication |
| Answer» C. nonrepudiation | |
| 77. |
A ________ signature is included in the document; a _______ signature is a separate entity. |
| A. | conventional; digital |
| B. | digital; digital |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» B. digital; digital | |
| 78. |
________ means to prove the identity of the entity that tries to access the system's resources. |
| A. | message authentication |
| B. | entity authentication |
| C. | message confidentiality |
| D. | none of the above |
| Answer» C. message confidentiality | |
| 79. |
A(n)______ creates a secret key only between a member and the center. |
| A. | ca |
| B. | kdc |
| C. | kdd |
| D. | none of the above |
| Answer» C. kdd | |
| 80. |
A _______ message digest is used as an MDC. |
| A. | keyless |
| B. | keyed |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» B. keyed | |
| 81. |
A witness used in entity authentication is ____________. |
| A. | something known |
| B. | something possessed |
| C. | something inherent |
| D. | all of the above |
| Answer» E. | |
| 82. |
A(n) _____ is a trusted third party that assigns a symmetric key to two parties. |
| A. | kdc |
| B. | ca |
| C. | kdd |
| D. | none of the above |
| Answer» B. ca | |
| 83. |
The ________ criterion ensures that a message cannot easily be forged. |
| A. | one-wayness |
| B. | weak-collision-resistance |
| C. | strong-collision-resistance |
| D. | none of the above |
| Answer» C. strong-collision-resistance | |
| 84. |
The secret key between members needs to be created as a ______ key when two members contact KDC. |
| A. | public |
| B. | session |
| C. | complimentary |
| D. | none of the above |
| Answer» C. complimentary | |
| 85. |
A(n) ________function creates a message digest out of a message. |
| A. | encryption |
| B. | decryption |
| C. | hash |
| D. | none of the above |
| Answer» D. none of the above | |
| 86. |
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | none of the above |
| Answer» D. none of the above | |
| 87. |
Message_____ means that the data must arrive at the receiver exactly as sent. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | none of the above |
| Answer» C. authentication | |