Practice Quiz in Network Security Part 1

Practice Quiz in Network Security

This is the Online Practice Quiz in Network Security part 1 from the book, Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in Electronics Systems and Technologies (Communications Engineering) this will definitely help you test your knowledge and skill before taking the Board Exam.

Start Part I of the Online Practice Quiz

Quiz in Network Security

Question 1. Digital signature cannot provide ________ for the message.

A. integrity

B. confidentiality

C. nonrepudiation

D. authentication


Question 2. The secret key between members needs to be created as a ______ key when two members contact KDC.

A. public

B. session

C. complimentary

D. None of these


Question 3. A(n)______ creates a secret key only between a member and the center.

A. CA

B. KDC

C. KDD

D. None of these


Question 4. Message ________ means that the sender and the receiver expect privacy.

A. confidentiality

B. integrity

C. authentication

D. None of these


Question 5. In ________ authentication, the claimant proves that she knows a secret without actually sending it.

A. password-based

B. challenge-response

C. either (a) or (b)

D. neither (a) nor (b)


Question 6. A(n) _________ can be used to preserve the integrity of a document or a message.

A. message digest

B. message summary

C. encrypted message

D. None of these


Question 7. In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.

A. message authentication

B. entity authentication

C. message confidentiality

D. message integrity


Question 8. Challenge-response authentication can be done using ________.

A. symmetric-key ciphers

B. asymmetric-key ciphers

C. keyed-hash functions

D. All of these


Question 9. Password-based authentication can be divided into two broad categories: _______ and _______.

A. fixed; variable

B. time-stamped; fixed

C. fixed; one-time

D. None of these


Question 10. If _________ is needed, a cryptosystem must be applied over the scheme.

A. integrity

B. confidentiality

C. nonrepudiation

D. authentication

More Practice Quiz in Network Security

Practice Quiz Part 1

Practice Quiz Part 2

Practice Quiz Part 3

Complete Practice Quiz in Data Communications and Networking

Note: After taking this particular quiz, you can proceed to check all the topics.


Search! Type it and Hit Enter


We educate thousands of students a week in preparation for their licensure examinations. We provide professionals with materials for their lectures and practice exams. To help us go forward with the same spirit, contribution from your side will highly appreciated. Thank you in advance.


Labels:

Post a Comment

Emoticon
:) :)) ;(( :-) =)) ;( ;-( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ $-) (b) (f) x-) (k) (h) (c) cheer
Click to see the code!
To insert emoticon you must added at least one space before the code.

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget