
This is the Online Practice Quiz in Network Security part 2 from the book, Data Communications and Networking 4th Edition by Behrouz A. Forouzan. If you are looking for a reviewer in Electronics Systems and Technologies (Communications Engineering) this will definitely help you test your knowledge and skill before taking the Board Exam.
Continue Part II of the Online Practice Quiz
Quiz in Network Security
Question 11. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
Question 12. ________ means to prove the identity of the entity that tries to access the system's resources.
Question 13. A(n) ________function creates a message digest out of a message.
Question 14. A ________ signature is included in the document; a _______ signature is a separate entity.
Question 15. The _______criterion ensures that we cannot find two messages that hash to the same digest.
Question 16. A digital signature needs a(n)_________ system.
Question 17. A _______ message digest is used as an MDC.
Question 18. A hash function must meet ________ criteria.
Question 19. To authenticate the data origin, one needs a(n) _______.
Question 20. A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate. |
More Practice Quiz in Network Security
Practice Quiz Part 1
Practice Quiz Part 2
Practice Quiz Part 3
Complete Practice Quiz in Data Communications and Networking
Note: After taking this particular quiz, you can proceed to check all the topics.
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.