CNS BITS
1 MAC is a
a) one-to-one mapping b) many-to-one mapping c) onto mapping d) none of the mentioned
2 For an n-bit tag and a k-bit key, the level of effort required for brute force attack on a MAC algorithm is
a) 2k b) 2n c) min(2k,2n) d) 2k/2n
3 When a hash function is used to provide message authentication, the hash function value is referred to as [ ]
a) Message Field b) Message Digest c) Message Score d) Message Leap
4 ___________attacks include eavesdropping on network traffic [ ]
(a) Active (b) passive (c) both (d) none
5 SHA-1 produces a hash value of [ ]
a) 256 bits b) 160 bits c) 180 bits d) 128 bits
6 ______________ Is failed if data is forged [ ]
a) Authentication (b) confidentiality (c) key management (d) None of these
7 ____ is used as a tool in network management system to examine the conditions of network attached devices. [ ]
(a) SSL (b) UDP (c)SNMP (d) IP
8 IP – Level Security encompasses ___ functional areas [ ]
(a)one (b) two (c) three (d) four
9 In wireless ad-hoc network [ ]
a) access point is not required b) access point is must c) nodes are not required d) none of the mentioned
10 The _______enables the source node and the destination node to transfer the data between them [ ]
(a) Authentication (b) confidentiality (c) key management (d) None of these
11 Which of the following is not an element/field of the X.509 certificates? [ ]
a) Issuer Name b) Serial Modifier c) Issuer unique Identifier d) Signature
12 __________ is mediator between the internet & outside world . [ ]
(a) Internet (b) confidentiality (c) Integrity (d) Firewall
13 IP Security is present in ______________ Layer. [ ]
(a) Internet Layer (b) Application Layer (c) Transport Layer (d) Data layer
14 Which one of the following is a cryptographic protocol used to secure HTTP connection? [ ]
a) Stream control transmission protocol (SCTP) b) transport layer security (TSL)
c) explicit congestion notification (ECN) d) resource reservation protocol
15 _____________ is challenge for web security. [ ]
(a) High Visibility (b) complex software (c) vulnerability point (d) all the above
16 Secure shell (SSH) network protocol is used for ____ [ ]
a) secure data communication b) remote command-line login c) remote command execution
d) all of the mentioned
17 ____________ SNMP Messages are broadcasted from SNMP Management station [ ]
(a) Get Request (b) Get Response (c) Get Next Request (d) All the above
18 The __________is a specialized function performed by an application gateway. [ ]
(a)Packet level gateway (b) circuit level gateway c) frame level gateway (d) SNMP
19 WPA2 is used for security in [ ]
a) Ethernet b) Bluetooth c) Wi-Fi d) None of the mentioned
20 An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL. [ ]
a) 40; 80 b) 60; 620 c) 80; 443 d) 620; 80
21 Pretty good privacy (PGP) is used in____________
22 ____________ is used to confirm whether the incoming packet is from the authenticated
user or not.
23 IP header consists of ____________
24 IPsec is designed to provide the security at the___________
25 __________ operates in the transport mode or the tunnel mode
26 IPSec uses a set of SAs called the ___________
27 IP Security is mainly used in ____________
28 IPSec avail the network services such as ____________
29 Web Security Threats are classified into ___________.
30 What is WPA?
31 The device that allows wireless devices to connect to a wired network in wireless networks
is_________________
32 Which standard TCP port is assigned for contacting SSH servers?____________
33 The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is
encrypted with a user’s __________________key
34 Integrity of data is affected by ____________web threat.
35 SSL stands for ____________
36 CRL stands for___________
37 ____________field specifies the SNMP version that is used.
38 ____________is substitute for SNMP agents.
39 Firewall cannot protect against the transfer of ____________
40 Which cryptographic algorithm is used in CMAC?________