0% found this document useful (0 votes)
465 views3 pages

CNS Bits

1. MAC is a many-to-one mapping. The level of effort for a brute force attack on a MAC algorithm with an n-bit tag and k-bit key is min(2k, 2n). 2. When a hash function is used for message authentication, the hash function value is referred to as the message digest. Passive attacks include eavesdropping on network traffic. 3. SHA-1 produces a 160-bit hash value. Authentication is failed if data is forged.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
465 views3 pages

CNS Bits

1. MAC is a many-to-one mapping. The level of effort for a brute force attack on a MAC algorithm with an n-bit tag and k-bit key is min(2k, 2n). 2. When a hash function is used for message authentication, the hash function value is referred to as the message digest. Passive attacks include eavesdropping on network traffic. 3. SHA-1 produces a 160-bit hash value. Authentication is failed if data is forged.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CNS BITS

1 MAC is a
a) one-to-one mapping b) many-to-one mapping c) onto mapping d) none of the mentioned

2 For an n-bit tag and a k-bit key, the level of effort required for brute force attack on a MAC algorithm is
a) 2k b) 2n c) min(2k,2n) d) 2k/2n

3 When a hash function is used to provide message authentication, the hash function value is referred to as [ ]
a) Message Field b) Message Digest c) Message Score d) Message Leap

4 ___________attacks include eavesdropping on network traffic [ ]


(a) Active (b) passive (c) both (d) none

5 SHA-1 produces a hash value of [ ]


a) 256 bits b) 160 bits c) 180 bits d) 128 bits

6 ______________ Is failed if data is forged [ ]


a) Authentication (b) confidentiality (c) key management (d) None of these

7 ____ is used as a tool in network management system to examine the conditions of network attached devices. [ ]
(a) SSL (b) UDP (c)SNMP (d) IP

8 IP – Level Security encompasses ___ functional areas [ ]


(a)one (b) two (c) three (d) four

9 In wireless ad-hoc network [ ]


a) access point is not required b) access point is must c) nodes are not required d) none of the mentioned

10 The _______enables the source node and the destination node to transfer the data between them [ ]
(a) Authentication (b) confidentiality (c) key management (d) None of these

11 Which of the following is not an element/field of the X.509 certificates? [ ]


a) Issuer Name b) Serial Modifier c) Issuer unique Identifier d) Signature

12 __________ is mediator between the internet & outside world . [ ]

(a) Internet (b) confidentiality (c) Integrity (d) Firewall

13 IP Security is present in ______________ Layer. [ ]


(a) Internet Layer (b) Application Layer (c) Transport Layer (d) Data layer

14 Which one of the following is a cryptographic protocol used to secure HTTP connection? [ ]
a) Stream control transmission protocol (SCTP) b) transport layer security (TSL)
c) explicit congestion notification (ECN) d) resource reservation protocol

15 _____________ is challenge for web security. [ ]


(a) High Visibility (b) complex software (c) vulnerability point (d) all the above
16 Secure shell (SSH) network protocol is used for ____ [ ]
a) secure data communication b) remote command-line login c) remote command execution
d) all of the mentioned

17 ____________ SNMP Messages are broadcasted from SNMP Management station [ ]


(a) Get Request (b) Get Response (c) Get Next Request (d) All the above
18 The __________is a specialized function performed by an application gateway. [ ]
(a)Packet level gateway (b) circuit level gateway c) frame level gateway (d) SNMP

19 WPA2 is used for security in [ ]


a) Ethernet b) Bluetooth c) Wi-Fi d) None of the mentioned

20 An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL. [ ]
a) 40; 80 b) 60; 620 c) 80; 443 d) 620; 80

21 Pretty good privacy (PGP) is used in____________

22 ____________ is used to confirm whether the incoming packet is from the authenticated
user or not.

23 IP header consists of ____________

24 IPsec is designed to provide the security at the___________

25 __________ operates in the transport mode or the tunnel mode

26 IPSec uses a set of SAs called the ___________

27 IP Security is mainly used in ____________

28 IPSec avail the network services such as ____________

29 Web Security Threats are classified into ___________.

30 What is WPA?

31 The device that allows wireless devices to connect to a wired network in wireless networks
is_________________

32 Which standard TCP port is assigned for contacting SSH servers?____________

33 The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is
encrypted with a user’s __________________key

34 Integrity of data is affected by ____________web threat.

35 SSL stands for ____________

36 CRL stands for___________

37 ____________field specifies the SNMP version that is used.


38 ____________is substitute for SNMP agents.

39 Firewall cannot protect against the transfer of ____________

40 Which cryptographic algorithm is used in CMAC?________

You might also like