Internet Security.
Click here to Download this file
Multiple Choice Question & Answer:-

1. Message_____ means that the data must arrive at the receiver exactly as sent.
    A)confidentiality
    B)integrity
    C)authentication
    D)none of the above

Answer:B

2. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
    A)confidentiality
    B)integrity
    C)authentication
    D)none of the above

Answer:C

3. A(n) ________function creates a message digest out of a message.
    A)encryption
    B)decryption
    C)hash
    D)none of the above

Answer:C

4. The secret key between members needs to be created as a ______ key when two members contact KDC.
    A)public
    B)session
    C)complimentary
    D)none of the above

Answer:B

5. The ________ criterion ensures that a message cannot easily be forged.
    A)one-wayness
    B)weak-collision-resistance
    C)strong-collision-resistance
    D)none of the above

Answer:B

6. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
    A)KDC
    B)CA
    C)KDD
    D)none of the above

Answer:A

7. A witness used in entity authentication is ____________.
    A)something known
    B)something possessed
    C)something inherent
    D)all of the above


Answer:D

8. A _______ message digest is used as an MDC.
    A)keyless
    B)keyed
    C)either (a) or (b)
    D)neither (a) nor (b)

Answer:A

9. A(n)______ creates a secret key only between a member and the center.
    A)CA
    B)KDC
    C)KDD
    D)none of the above

Answer:B

10. ________ means to prove the identity of the entity that tries to access the system's resources.
    A)Message authentication
    B)Entity authentication
    C)Message confidentiality
    D)none of the above

Answer:B

11. A ________ signature is included in the document; a _______ signature is a separate entity.
    A)             conventional; digital
    B)             digital; digital
    C)             either (a) or (b)
    D)             neither (a) nor (b)

Answer:A

12. If _________ is needed, a cryptosystem must be applied over the scheme.
    A)integrity
    B)confidentiality
    C)nonrepudiation
    D)authentication

Answer:B

13. Digital signature provides ________.
    A)authentication
    B)non-repudiation
    C)both (a) and (b)
    D)neither (a) nor (b)

Answer:C

14. Digital signature cannot provide ________ for the message.
    A)integrity
    B)confidentiality
    C)non-repudiation
    D)authentication

Answer:B

15. To authenticate the data origin, one needs a(n) _______.
    A)MDC
    B)MAC
    C)either (a) or (b)
    D)neither (a) nor (b)

Answer:A

16. A(n) _________ can be used to preserve the integrity of a document or a message.
    A)message digest
    B)message summary
    C)encrypted message
    D)none of the above

Answer:A

17. Challenge-response authentication can be done using ________.
    A)symmetric-key ciphers
    B)asymmetric-key ciphers
    C)keyed-hash functions
    D)all of the above

Answer:D

18. The _______criterion ensures that we cannot find two messages that hash to the same digest.
    A)one-wayness
    B)weak-collision-resistance
    C)strong-collision-resistance
    D)none of the above

Answer:C

19. A digital signature needs a(n)_________ system.
    A)symmetric-key
    B)asymmetric-key
    C)either (a) or (b)
    D)neither (a) nor (b)

Answer:B

20. A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.
    A)KDC
    B)Kerberos
    C)CA
    D)none of the above

Answer:C

21. Message ________ means that the sender and the receiver expect privacy.
    A)confidentiality
    B)integrity
    C)authentication
    D)none of the above

Answer:A

22. In ________ authentication, the claimant proves that she knows a secret without actually sending it.
    A)password-based
    B)challenge-response
    C)either (a) or (b)
    D)neither (a) nor (b)

Answer:B

23. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.
    A)message authentication
    B)entity authentication
    C)message confidentiality
    D)message integrity

Answer:B

24. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
    A)one-wayness
    B)weak-collision-resistance
    C)strong-collision-resistance
    D)none of the above

Answer:A

25. A(n) ______ is a hierarchical system that answers queries about key certification.
    A)KDC
    B)PKI
    C)CA
    D)none of the above

Answer:C

26. _________ means that a sender must not be able to deny sending a message that he sent.
    A)Confidentiality
    B)Integrity
    C)Authentication
    D)Nonrepudiation

Answer:D

27. A hash function must meet ________ criteria.
    A)two
    B)three
    C)four
    D)none of the above

Answer:B

28. __________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.
    A)KDC
    B)Kerberos
    C)CA
    D)none of the above

Answer:B

29. Password-based authentication can be divided into two broad categories: _______ and _______.
    A)fixed; variable
    B)time-stamped; fixed
    C)fixed; one-time
    D)none of the above

Answer:C

30. _________ operates in the transport mode or the tunnel mode.
    A)IPSec
    B)SSL
    C)PGP
    D)none of the above

Answer:A

31. IKE creates SAs for _____.
    A)SSL
    B)PGP
    C)IPSec
    D)VP

Answer:C

32. ______ provides either authentication or encryption, or both, for packets at the IP level.
    A)AH
    B)ESP
    C)PGP
    D)SSL

Answer:B

33. One security protocol for the e-mail system is _________.
    A)IPSec
    B)SSL
    C)PGP
    D)none of the above

Answer:C

34.protocol is normally HTTP.
    A)SSL
    B)TLS
    C)either (a) or (b)
    D)both (a) and (b)

Answer:

35. IKE is a complex protocol based on ______ other protocols.
    A)two
    B)three
    C)four
    D)five

Answer:B

36. IPSec defines two protocols: _______ and ________.
    A)AH; SSL
    B)PGP; ESP
    C)AH; ESP
    D)all of the above

Answer:A

37. In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

    A)transport
    B)tunnel
    C)either (a) or (b)
    D)neither (a) nor (b)

Answer:A

38. ______ is the protocol designed to create security associations, both inbound and outbound.
    A)SA
    B)CA
    C)KDC
    D)IKE

Answer:D

39. A _______network is used inside an organization.
    A)private
    B)public
    C)semi-private
    D)semi-public

Answer:A

40. SSL provides _________.
    A)message integrity
    B)confidentiality
    C)compression
    D)all of the above

Answer:D

41. The Internet authorities have reserved addresses for _______.
    A)intranets
    B)internets
    C)extranets
    D)none of the above

Answer:D

42. An _________ is a network that allows authorized access from outside users.
    A)intranet
    B)internet
    C)extranet
    D)none of the above

Answer:C

43. _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.
    A)IPSec
    B)SSL
    C)PGP
    D)none of the above

Answer:A

44. IKE uses _______.
    A)Oakley
    B)SKEME
    C)ISAKMP
    D)all of the above

Answer:D

45. IPSec uses a set of SAs called the ________.
    A)SAD
    B)SAB
    C)SADB
    D)none of the above

Answer:C

46. An ________ is a private network that uses the Internet model.
    A)intranet
    B)internet
    C)extranet
    D)none of the above

Answer:A

47. ______ is actually an IETF version of _____.
    A)TLS; TSS
    B)SSL; TLS
    C)TLS; SSL
    D)SSL; SLT

Answer:C

48. In ______, there is a single path from the fully trusted authority to any certificate.
    A)X509
    B)PGP
    C)KDC
    D)none of the above

Answer:A

49. The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
    A)list of protocols
    B)cipher suite
    C)list of keys
    D)none of the above

Answer:B

50. A ______ provides privacy for LANs that must communicate through the global Internet.
    A)VPP
    B)VNP
    C)VNN
    D)VPN

Answer:D

51. _______ uses the idea of certificate trust levels.
    A)X509
    B)PGP
    C)KDC
    D)none of the above

Answer:B

52. IPSec in the ______ mode does not protect the IP header.
    A)transport
    B)tunnel
    C)either (a) or (b)
    D)neither (a) nor (b)

Answer:A

53. ________ provides privacy, integrity, and authentication in e-mail.
    A)IPSec
    B)SSL
    C)PGP
    D)none of the above

Answer:C

54. In _____, there can be multiple paths from fully or partially trusted authorities.

    A)X509
    B)PGP
    C)KDC
    D)none of the above

Answer:B

55. ______ provides authentication at the IP level.
    A)AH
    B)ESP
    C)PGP
    D)SSL

Answer:A

56. In _______, the cryptographic algorithms and secrets are sent with the message.
    A)IPSec
    B)SSL
    C)TLS
    D)PGP

Answer:D

57. ______ is designed to provide security and compression services to data generated from the application layer.
    A)SSL
    B)TLS
    C)either (a) or (b)
    D)both (a) and (b)

Answer:D

58. _______ provide security at the transport layer.
    A)SSL
    B)TLS
    C)either (a) or (b)
    D)both (a) and (b)

Answer:D

59. The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.
    A)transport
    B)tunnel
    C)either (a) or (b)
    D)neither (a) nor (b)

Answer:A

60. In the _______ mode, IPSec protects the whole IP packet, including the original IP header.
    A)transport
    B)tunnel
    C)either (a) or (b)
    D)neither (a) nor (b)

Answer:B

61. ______ was invented by Phil Zimmerman.
    A)IPSec
    B)SSL
    C)PGP
    D)none of the above

Answer:C

62. A _______ layer security protocol provides end-to-end security services for applications.
    A)data link
    B)network
    C)transport
    D)none of the above

Answer:C

63. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
    A)secret
    B)public
    C)either (a) or (b)
    D)both (a) and (b)

Answer:B


64. A user needs to send the server some information. The request line method is _______.
    A)OPTION
    B)PATCH
    C)POST
    D)none of the above

Answer:C

65. In a URL, the _______ is the client-server program used to retrieve the document.
    A)path
    B)protocol
    C)host
    D)none of the above

Answer:B

66. A _______ document is created by a Web server whenever a browser requests the document.
    A)static
    B)dynamic
    C)active
    D)none of the above

Answer:B

67. One way to create an active document is to use __________.
    A)CGI
    B)Java stand-alone programs
    C)Java applets
    D)none of the above

Answer:C

68. A cookie is made by the ________ and eaten by the _________.
    A)client; client
    B)client; server
    C)server; server
    D)none of the above

Answer:C

69. A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.
    A)static
    B)dynamic
    C)active
    D)none of the above

Answer:A

70. The _________ is a standard for specifying any kind of information on the Internet.
    A)URL
    B)ULR
    C)RLU
    D)none of the above

Answer:A

71. _________ is a repository of information linked together from points all over the world.
    A)The WWW
    B)HTTP
    C)HTML
    D)none of the above

Answer:A

72. Which of the following is present in both an HTTP request line and a status line?
    A)HTTP version number
    B)URL
    C)status code
    D)none of the above

Answer:A

73. Active documents are sometimes referred to as _________ dynamic documents.
    A)client-site
    B)server-site
    C)both a and b
    D)none of the above

Answer:A

74. HTTP uses the services of _________ on well-known port 80.
    A)UDP
    B)IP
    C)TCP
    D)none of the above

Answer:C

75. Dynamic documents are sometimes referred to as _________ dynamic documents.
    A)client-site
    B)server-site
    C)both a and b
    D)none of the above

Answer:B

76. For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.
    A)static
    B)dynamic
    C)active
    D)none of the above

Answer:C

77. In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.
    A)regular
    B)proxy
    C)both a and b
    D)none of the above

Answer:B

78. The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.
    A)HEAD
    B)POST
    C)COPY
    D)none of the above

Answer:A

79. A response message always contains _______.
    A)a header and a body
    B)a request line and a header
    C)a status line and a header
    D)none of the above

Answer:C

80. In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon.
    A)path
    B)protocol
    C)host
    D)none of the above

Answer:D

81. An applet is _______ document application program.
    A)a static
    B)an active
    C)a passive
    D)a dynamic

Answer:B

82. The documents in the WWW can be grouped into ______ broad categories.
    A)two
    B)three
    C)four
    D)none of the above

Answer:B

83. _____________ is a language for creating Web pages.
    A)HTTP
    B)HTML
    C)FTTP
    D)none of the above

Answer:B

84. ___________ is a technology that creates and handles dynamic documents.
    A)GIC
    B)CGI
    C)GCI
    D)none of the above

Answer:B

85. The HTTP request line contains a _______ method to request a document from the server.
    A)GET
    B)POST
    C)COPY
    D)none of the above

Answer:A

86. In a ___________connection, the server leaves the connection open for more requests after sending a response.
    A)persistent
    B)nonpersistent
    C)both a and b
    D)none of the above

Answer:A

87. An HTTP request message always contains _______.
    A)a header and a body
    B)a request line and a header
    C)a status line, a header, and a body
    D)one of the above

Answer:B

88. In a ___________ connection, one TCP connection is made for each request/response.
    A)persistent
    B)nonpersistent
    C)both a and b
    D)none of the above

Answer:B

89. In a URL, the _______ is the full name of the file where the information is located.
    A)path
    B)protocol
    C)host
    D)none of the above

Answer:A

90. In a URL, the ______ is the computer on which the information is located.
    A)path
    B)protocol
    C)host
    D)none of the above

Answer:C

91. HTTP version 1.1 specifies a _________connection by default.
    A)persistent
    B)nonpersistent
    C)both a and b
    D)none of the above

Answer:A

92. In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.
    A)request; response
    B)response; request
    C)response; status
    D)none of the above

Answer:D

93. The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server.
    A)limited
    B)vast
    C)distributed
    D)none of the above

Answer:C