Internet Security Solved MCQs (Set-1)
Internet Security Solved MCQs (Set-1)
1. Message_____ means that the data must arrive at the receiver exactly as sent.
A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer: B
2. Message _______ means that the receiver is ensured that the message is coming
from the intended sender, not an imposter.
A. confidentiality
B. integrity
o m
C. authentication
. c
D. none of the above te
Answer: C a
q M
c
3. A(n) ________function creates a message digest out of a message.
A. encryption
B. decryption
M
C. hash
D. none of the above
Answer: C
4. The secret key between members needs to be created as a ______ key when two
members contact KDC.
A. public
B. session
C. complimentary
D. none of the above
Answer: B
6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
A. kdc
B. ca
C. kdd
D. none of the above
Answer: A
9. A(n)______ creates a secret key only between a member and the center.
A. ca
B. kdc
C. kdd
D. none of the above
Answer: B
10. ________ means to prove the identity of the entity that tries to access the
system's resources.
A. message authentication
B. entity authentication
18. The _______criterion ensures that we cannot find two messages that hash to the
same digest.
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer: C
20. A(n) ________is a federal or state organization that binds a public key to an
entity and issues a certificate.
A. kdc
B. kerberos
21. Message ________ means that the sender and the receiver expect privacy.
A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer: A
22. In ________ authentication, the claimant proves that she knows a secret
without actually sending it.
A. password-based
B. challenge-response
C. either (a) or (b)
D. neither (a) nor (b)
Answer: B
23. In _______, a claimant proves her identity to the verifier by using one of the
three kinds of witnesses.
A. message authentication
B. entity authentication
C. message confidentiality
D. message integrity
Answer: B
24. The _______ criterion states that it must be extremely difficult or impossible to
create the message if the message digest is given.
A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. none of the above
Answer: A
25. A(n) ______ is a hierarchical system that answers queries about key
certification.
A. kdc