MCQ Cns

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

Computer Network Security

Unit-1 MCQ’s

1. A(n) ______ algorithm transforms ciphertext to plaintext.

A) encryption

B) decryption

C) either (a) or (b)

D) neither (a) nor (b)

Ans: B

2. The ________ is the message after transformation.

A) ciphertext

B) plaintext

C) secret-text

D) none of the above

Ans: A

3. A(n) _______ algorithm transforms plaintext to ciphertext.

A) encryption

B) decryption

C) either (a) or (b)

D) neither (a) nor (b)

Ans: A

4. A ________ cipher replaces one character with another character.

A) substitution

B) transposition

C) either (a) or (b)


D) neither (a) nor (b)

Ans: A

5 . The ________is the original message before transformation.

A) ciphertext

B) plaintext

C) secret-text

D) none of the above

Ans: B

6. In an asymmetric-key cipher, the receiver uses the ______ key.

A) private

B) public

C) either a or b

D) neither (a) nor (b)

Ans: A

7.  In a(n) ________ cipher, the same key is used by both the sender and receiver.

A) symmetric-key

B) asymmetric-key

C) either (a) or (b)

D) neither (a) nor (b)

Ans: A

8. _________ ciphers can be categorized into two broad categories: monoalphabetic and
polyalphabetic.

A) Substitution

B) Transposition

C) either (a) or (b)


D) neither (a) nor (b)

Ans: A

9.  In an asymmetric-key cipher, the sender uses the__________ key.

A) private

B) public

C) either (a) or (b)

D) neither (a) nor (b)

Ans: B

10. In a(n) ________ cipher, a pair of keys is used.

A) symmetric-key

B) asymmetric-key

C) either (a) or (b)

D) neither (a) nor (b)

Ans: B

11: The _______ is a number or a set of numbers on which the cipher operates.

A) cipher

B) secret

C) key

D) none of the above

Ans: C

12: In a(n) ________, the key is called the secret key.

A) symmetric-key

B) asymmetric-key

C) either (a) or (b)


D) neither (a) nor (b)

Ans: A

13. Message _______Means that the sender and the receiver expect privacy

A. confidentiality

B. integrity

C. authentication

D. none of the above

Ans: A

14. Message _________means that the data must arrive at the receiver exactly as sent

A. confidentiality

B. integrity

C. authentication

D. none of the above

Ans: B

15. _________means that a sender must not be able to deny sending a message that
he sent.

A. Confidentiality

B. Integrity

C. Authentication

D. Non repudiation

Ans: D

16. A(n)______can be used to preserve the integrity of a document or a message.

A. message digest

B. message summary

C. encrypted message
D. none of the above

Ans: A

17. A(n)_______function creates a message digest out of a message.

A. encryption

B. decryption

C. hash

D. none of the above

Ans: C

18: A hash function must meet______criteria.

A. two

B. three

C. four

D. none of the above

Ans: B

19: A _____signature is included in the document; a ______signature is a separate


entity.

A. conventional; digital

B. digital; digital

C. either (a) or (b)

D. neither (a) nor (b)

Ans:A

20: Digital signature provides

A. authentication

B. nonrepudiation

C. both (a) and (b)


D. neither (a) nor (b)

Ans: C

21: Digital signature cannot provide___for the message

A. integrity

B. confidentiality

C. non repudiation

D. authentication

Ans: B

22: If____is needed, a cryptosystem must be application scheme over the scheme.

A. integrity

B. confidentiality

C. nonrepudiation

D. authentication

Ans:B

23: A digital signature needs a(n)_______system

A. symmetric-key

B. asymmetric-key

C. either (a) or (b)

D. neither (a) nor (b)

Ans: B

24: A witness used in entity authentication is________

A. something know

B. something possessed

C. something inherent
D. all of the above

Ans: D

25: MAC stands for

A.message authentication code.

B.message authentication connection.

C.message authentication control.

D.message authentication cipher.

Answer A

26. A sender must not be able to deny sending a message that he or she, in fact, did
send, is known as

A.Message Nonrepudiation.

B.Message Integrity.

C.Message Confidentiality.

D.Message Sending.

Answer A

27. When data must arrive at receiver exactly as they were sent, its called

A.Message Confidentiality.

B.Message Integrity.

C.Message Splashing.

D.Message Sending.

Answer B
28. Message must be encrypted at sender site and decrypted at the

A.Sender Site.

B.Site.

C.Receiver site.

D.Conferencing.

Answer C

29. Performance, reliability, and security are criteria of

A.Efficient network.

B.intranet.

C.protocols.

D.None of Above.

Answer A

30. The process of professionally or ethically hacking a message is called as _______

A. Cryptography

B. Encryption

C. Cryptanalysis

D. Digital Signature

ANSWER: C

31. Which of the following is NOT a typical component of a security program?

A. The consequences for the person breaking the security policies


B. The policies and protective measures that will be used

C. The responsibilities of individuals involved in maintaining security

D. The responsibilities of those who abide by established security policies

ANSWER: A

32: A Denial Of Service(DOS) attack ___________.

A. can erase an entire Web site.

B. does not have to occur over a network.

C. is an intentional attempt to overload a Web server or Web site.

D. all of the above.

ANSWER: C

33: A Hidden Software which enters unauthorized manner and modifies the data is referred as ___

A. Computer Virus

B. Message Digest

C. Firewall

D. HMAC

ANSWER: A

34: Which of the following is/are methods of providing secure communication between two entities through the
use of mathematical coding?

A. Digital signature encryption

B. Public key encryption

C. Private key encryption

D. All of the above

ANSWER: B

35: Which is the largest disadvantage of the symmetric Encryption?

A. more complex and therefore more time-consuming calculations.

B. Problem of the secure transmission of the Secret Key.


C. Less secure encryption function.

D. Isn't used any more.

ANSWER: B

36: . ____________ increases the redundancy of plain text.

A. confusion

B. diffusion

C. both confusion and diffusion

D. neither confusion nor diffusion

ANSWER: B

37. A digital signature is _____.

A. scanned signature

B. signature in binary form

C. encrypting information

D. handwritten signature

ANSWER: C

38. Which of the following is not a property of Hash Function?

a. Pre-Image Resistance
b. Compression
c. Fixed Length Output
d. None of the above

Answer: d. None of the above

39. Which of the following security services cannot be achieved using the Hash
functions?
OR
Which of the following is not possible through hash value?

a. Password Check
b. Data Integrity check
c. Digital Signatures
d. Data retrieval in its original form

Answer: d. Data retrieval in its original form

40.  "The Hash Function takes an input of arbitrary length and converts it into a fixed
length output."
Which of the following names can we use for denoting the output of the hash function?

a. Hash value
b. Hash Code
c. Message Digest
d. All of the above

Answer: d. All of the above


Unit-2

Q1. Which of the following is a feature of Kerberos?


A. It does not require time synchronization
B. It provides centralized authentication for remote access servers
C. It uses tickets
D. It uses SAML for SSO
Ans: B

Q2. Which of the following is a feature of Kerberos?


A. It does not require time synchronization
B. It provides centralized authentication for remote access servers
C. It uses tickets
D. It uses SAML for SSO
Answer C

Q3.

You might also like