Network Security Final Test

0%
0 votes, 0 avg
6

Network Security MCQs Tests

Network Security Final Test

1 / 19

The RSA algorithm for confidentiality uses _______ cryptography.

2 / 19

In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.

3 / 19

In the asymmetric-key method used for confidentiality, which key is publicly known?

4 / 19

Digital signature does not provide _________.

5 / 19

___________ means that the data must arrive at the receiver exactly as they were sent.

6 / 19

___________ cryptography is often used for short messages.

7 / 19

_________ cryptography is often used for long messages.

8 / 19

In _________ cryptography, the same key is used in both directions.

9 / 19

Which of the following attacks is threatening availability?

10 / 19

A proxy firewall filters at the __________ layer.

11 / 19

A packet-filter firewall filters at the ________ or ___________ layer.

12 / 19

The _______ protocol provides message authentication, integrity, and privacy.

13 / 19

The _______ protocol provides message authentication and integrity, but not privacy.

14 / 19

IPSec defines two protocols: _________ and __________.

15 / 19

In the ________ mode, the IPSec header is placed in front of the original IP header.

16 / 19

In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.

17 / 19

IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.

18 / 19

A _______ is a trusted third party that solves the problem of symmetric-key distribution.

19 / 19

In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.

Leave a Comment