Network Security Final Test

0%
0 votes, 0 avg
6

Network Security MCQs Tests

Network Security Final Test

1 / 19

In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.

2 / 19

In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.

3 / 19

In __________ cryptography, everyone has access to everyone's public key.

4 / 19

______________ can provide authentication, integrity, and nonrepudiation for a message.

5 / 19

__________ means that the sender and the receiver expect confidentiality.

6 / 19

___________ cryptography is often used for short messages.

7 / 19

_________ cryptography is often used for long messages.

8 / 19

_____________ means concealing the contents of a message by enciphering.

9 / 19

Which of the following attacks is threatening availability?

10 / 19

A proxy firewall filters at the __________ layer.

11 / 19

A packet-filter firewall filters at the ________ or ___________ layer.

12 / 19

The _______ protocol provides message authentication, integrity, and privacy.

13 / 19

The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.

14 / 19

IPSec defines two protocols: _________ and __________.

15 / 19

In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.

16 / 19

IPSec operates at two different modes: _________ mode and _________ mode.

17 / 19

IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.

18 / 19

A _______ certifies the binding between a public key and its owner.

19 / 19

In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.

Leave a Comment