Multiple Choice Question & Answer:-
MCQ.1 Confidentiality with asymmetric-key cryptosystem has its own
A.System.
B.Data.
C.Problems.
D.Issues.
Answer C
MCQ.2 SHA-l has a message digest of
A.160 bits.
B.512 bits.
C.628 bits.
D.820 bits.
Answer A
MCQ.3 Message authentication is a service beyond
A.Message Confidentiality.
B.Message Integrity.
C.Message Splashing.
D.Message Sending.
Answer B
MCQ.4 In Message Confidentiality, transmitted message must make sense to only intended
A.Receiver.
B.Sender.
C.Third Party.
D.Translator.
Answer A
MCQ.5 A hash function guarantees integrity of a message. It guarantees that message has not be
A.Replaced.
B.Over view.
C.Changed.
D.Left.
Answer C
MCQ.6 To check integrity of a message, or document, receiver creates the
A.Tag.
B.Hash Tag.
C.Hyper Text.
D.Finger Print.
Answer B
MCQ.7 A digital signature needs a
A.private-key system.
B.shared-key system.
C.public-key system.
D.All of them.
Answer C
MCQ.8 One way to preserve integrity of a document is through use of a
A.Thumb Impression.
B.Finger Print.
C.Biometric.
D.X-Rays.
Answer B
MCQ.9 A session symmetric key between two parties is used
A.only once.
B.twice.
C.multiple times.
D.depends on situation.
Answer A
MCQ.10 Encryption and decryption provide secrecy, or confidentiality, but not
A.Authentication.
B.Integrity.
C.Keys.
D.Frames.
Answer B
MCQ.11 MAC stands for
A.message authentication code.
B.message authentication connection.
C.message authentication control.
D.message authentication cipher.
Answer A
MCQ.12 Digest created by a hash function is normally called a
A.modification detection code (MDC).
B.message authentication connection.
C.message authentication control.
D.message authentication cipher.
Answer A
MCQ.13 Message confidentiality is using
A.Cipher Text.
B.Cipher.
C.Symmetric-Key.
D.Asymmetric-Key.
Answer D
MCQ.14 A sender must not be able to deny sending a message that he or she, in fact, did send, is known as
A.Message Nonrepudiation.
B.Message Integrity.
C.Message Confidentiality.
D.Message Sending.
Answer A
MCQ.15 To preserve integrity of a document, both document and fingerprint are
A.Important.
B.System.
C.Needed.
D.Not needed.
Answer C
MCQ.16 When data must arrive at receiver exactly as they were sent, its called
A.Message Confidentiality.
B.Message Integrity.
C.Message Splashing.
D.Message Sending.
Answer B
MCQ.17 Message digest needs to be
A.public.
B.private.
C.kept secret.
D.None.
Answer C
MCQ.18 In Message Integrity, message digest needs to be kept
A.Secret.
B.Low.
C.High.
D.Down.
Answer A
MCQ.19 In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of
A.512 Bit Blocks.
B.1001 Bit Blocks.
C.1510 Bit Blocks.
D.2020 Bit Blocks.
Answer A
MCQ.20 Message confidentiality or privacy means that sender and receiver expect
A.Integrity.
B.Confidentiality.
C.Authentication.
D.Nonrepudiation.
Answer B
MCQ.21 Message must be encrypted at sender site and decrypted at the
A.Sender Site.
B.Site.
C.Receiver site.
D.Conferencing.
Answer C
MCQ.22 Encrypted security payload extension header is new in
A.Ipv4.
B.IPv5.
C.IPv6.
D.None.
Answer C
MCQ.23 Performance, reliability, and security are criteria of
A.Efficient network.
B.intranet.
C.protocols.
D.None of Above.
Answer A
MCQ.24 Data Encryption Standard (DES) was designed by
A.Microsoft.
B.Apple.
C.IBM.
D.None.
Answer C
MCQ.25 One of protocols to provide security at application layer is
A.Pretty Good Privacy.
B.Handshake Protocol.
C.Alert Protocol.
D.Record Protocol.
Answer A