0% found this document useful (0 votes)
410 views6 pages

Internet Security Solved MCQs (Set-1)

This document contains 25 multiple choice questions about internet security concepts. The questions cover topics like message integrity, authentication, hashing, digital signatures, symmetric and asymmetric key cryptography, key distribution centers (KDC), public key infrastructure (PKI), certificates authorities (CA), and challenge-response authentication. Correct answers are provided for each question.

Uploaded by

Ankit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
410 views6 pages

Internet Security Solved MCQs (Set-1)

This document contains 25 multiple choice questions about internet security concepts. The questions cover topics like message integrity, authentication, hashing, digital signatures, symmetric and asymmetric key cryptography, key distribution centers (KDC), public key infrastructure (PKI), certificates authorities (CA), and challenge-response authentication. Correct answers are provided for each question.

Uploaded by

Ankit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Internet Security MCQs [set-1]

1. Message_____ means that the data must arrive at the receiver exactly as sent.
A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer: B

2. Message _______ means that the receiver is ensured that the message is coming
from the intended sender, not an imposter.
A. confidentiality
B. integrity
o m
C. authentication
. c
D. none of the above te
Answer: C a
q M
c
3. A(n) ________function creates a message digest out of a message.
A. encryption
B. decryption
M
C. hash
D. none of the above
Answer: C

4. The secret key between members needs to be created as a ______ key when two
members contact KDC.
A. public
B. session
C. complimentary
D. none of the above
Answer: B

5. The ________ criterion ensures that a message cannot easily be forged.


A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer: B

6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
A. kdc
B. ca
C. kdd
D. none of the above
Answer: A

7. A witness used in entity authentication is ____________.


A. something known
B. something possessed
C. something inherent
D. all of the above
Answer: D

8. A _______ message digest is used as an MDC.


A. keyless
B. keyed
C. either (a) or (b)
D. neither (a) nor (b)
Answer: A

9. A(n)______ creates a secret key only between a member and the center.
A. ca
B. kdc
C. kdd
D. none of the above
Answer: B

10. ________ means to prove the identity of the entity that tries to access the
system's resources.
A. message authentication
B. entity authentication

Download more sets at McqMate.com


C. message confidentiality
D. none of the above
Answer: B

11. A ________ signature is included in the document; a _______ signature is a


separate entity.
A. conventional; digital
B. digital; digital
C. either (a) or (b)
D. neither (a) nor (b)
Answer: A

12. If _________ is needed, a cryptosystem must be applied over the scheme.


A. integrity
B. confidentiality
C. nonrepudiation
D. authentication
Answer: B

13. Digital signature provides ________.


A. authentication
B. non-repudiation
C. both (a) and (b)
D. neither (a) nor (b)
Answer: C

14. Digital signature cannot provide ________ for the message.


A. integrity
B. confidentiality
C. non-repudiation
D. authentication
Answer: B

15. To authenticate the data origin, one needs a(n) _______.


A. mdc
B. mac
C. either (a) or (b)

Download more sets at McqMate.com


D. neither (a) nor (b)
Answer: A

16. A(n) _________ can be used to preserve the integrity of a document or a


message.
A. message digest
B. message summary
C. encrypted message
D. none of the above
Answer: A

17. Challenge-response authentication can be done using ________.


A. symmetric-key ciphers
B. asymmetric-key ciphers
C. keyed-hash functions
D. all of the above
Answer: D

18. The _______criterion ensures that we cannot find two messages that hash to the
same digest.
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer: C

19. A digital signature needs a(n)_________ system.


A. symmetric-key
B. asymmetric-key
C. either (a) or (b)
D. neither (a) nor (b)
Answer: B

20. A(n) ________is a federal or state organization that binds a public key to an
entity and issues a certificate.
A. kdc
B. kerberos

Download more sets at McqMate.com


C. ca
D. none of the above
Answer: C

21. Message ________ means that the sender and the receiver expect privacy.
A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer: A

22. In ________ authentication, the claimant proves that she knows a secret
without actually sending it.
A. password-based
B. challenge-response
C. either (a) or (b)
D. neither (a) nor (b)
Answer: B

23. In _______, a claimant proves her identity to the verifier by using one of the
three kinds of witnesses.
A. message authentication
B. entity authentication
C. message confidentiality
D. message integrity
Answer: B

24. The _______ criterion states that it must be extremely difficult or impossible to
create the message if the message digest is given.
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer: A

25. A(n) ______ is a hierarchical system that answers queries about key
certification.
A. kdc

Download more sets at McqMate.com


B. pki
C. ca
D. none of the above
Answer: C

Download more sets at McqMate.com

You might also like