Network Security Final Test 0% 0 votes, 0 avg 6 Network Security MCQs Tests Network Security Final Test 1 / 19 The RSA algorithm for confidentiality uses _______ cryptography. Asymmetric-key Symmetric-key Substitution None of the choices are correct. No Explantion Given 2 / 19 In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message. Private key Public key No key None of the choices are correct. No Explantion Given 3 / 19 In the asymmetric-key method used for confidentiality, which key is publicly known? Encryption key only Decryption key only Both keys None of the choices are correct. No Explantion Given 4 / 19 Digital signature does not provide _________. Nonrepudiation Privacy Authentication Provides all of the choices. No Explantion Given 5 / 19 ___________ means that the data must arrive at the receiver exactly as they were sent. Nonrepudiation Message integrity Authentication None of the choices are correct. No Explantion Given 6 / 19 ___________ cryptography is often used for short messages. Symmetric-key Asymmetric-key Secret-key None of the choices are correct No Explantion Given 7 / 19 _________ cryptography is often used for long messages. Symmetric-key Asymmetric-key public-key None of the choices are correct. No Explantion Given 8 / 19 In _________ cryptography, the same key is used in both directions. Symmetric-key Asymmetric-key Public-key None of the choices are correct. No Explantion Given 9 / 19 Which of the following attacks is threatening availability? Replaying Modification Denial of service None of the choices are correct. No Explantion Given 10 / 19 A proxy firewall filters at the __________ layer. transport network application None of the choices are correct. No Explantion Given 11 / 19 A packet-filter firewall filters at the ________ or ___________ layer. network; application transport; application network; transport None of the choices are correct No Explantion Given 12 / 19 The _______ protocol provides message authentication, integrity, and privacy. AH ESP SPE None of the choices are correct. No Explantion Given 13 / 19 The _______ protocol provides message authentication and integrity, but not privacy. AH ESP SPE None of the choices are correct. No Explantion Given 14 / 19 IPSec defines two protocols: _________ and __________. AH: SSP ESP; SSP AH: EH None of the choices are correct. No Explantion Given 15 / 19 In the ________ mode, the IPSec header is placed in front of the original IP header. transport tunnel transition None of the choices are correct. No Explantion Given 16 / 19 In the _________ mode, the IPSec header is added between the IP header and the rest of the packet. transport tunnel transition None of the choices are correct. No Explantion Given 17 / 19 IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level. data link network transport None of these No Explantion Given 18 / 19 A _______ is a trusted third party that solves the problem of symmetric-key distribution. CA KDC TLS firewall No Explantion Given 19 / 19 In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature. Her or his own public key Her or his own private key The sender's public key None of the choices are correct. No Explantion Given Your score is LinkedIn Facebook Twitter VKontakte