Network Security Final Test

0%
0 votes, 0 avg
6

Network Security MCQs Tests

Network Security Final Test

1 / 19

In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.

2 / 19

In the asymmetric-key method used for confidentiality, which key is publicly known?

3 / 19

In __________ cryptography, everyone has access to everyone's public key.

4 / 19

___________ means that the data must arrive at the receiver exactly as they were sent.

5 / 19

__________ means that the sender and the receiver expect confidentiality.

6 / 19

_________ cryptography is often used for long messages.

7 / 19

______________ means concealing the message by covering it with something else.

8 / 19

Which of the following attacks is threatening availability?

9 / 19

Three security goals are _______________________________________.

10 / 19

A proxy firewall filters at the __________ layer.

11 / 19

A packet-filter firewall filters at the ________ or ___________ layer.

12 / 19

The _______ was designed to provide security at the transport layer.

13 / 19

The _______ protocol provides message authentication and integrity, but not privacy.

14 / 19

In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.

15 / 19

IPSec operates at two different modes: _________ mode and _________ mode.

16 / 19

IPSec requires a logical connection between two hosts using a signaling protocol called ____________.

17 / 19

IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.

18 / 19

A _______ is a trusted third party that solves the problem of symmetric-key distribution.

19 / 19

In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.

Leave a Comment