πŸ“Š Network Security
Q. is a popular session key creator protocol that requires an authentica
  • (A) KDC
  • (B) Kerberos
  • (C) CA ion server and a ticket-granting server.
  • (D) CD
πŸ’¬ Discuss
βœ… Correct Answer: (A) KDC
πŸ“Š Network Security
Q. A(n) is a hierarchical system that answers queries about key certification.
  • (A) KDC
  • (B) PKI
  • (C) CA
  • (D) CD
πŸ’¬ Discuss
βœ… Correct Answer: (C) CA
πŸ“Š Network Security
Q. Firewalls are to protect against
  • (A) Virus Attacks
  • (B) Fire Attacks
  • (C) Data Driven Attacks
  • (D) Unauthorized Attacks
πŸ’¬ Discuss
βœ… Correct Answer: (D) Unauthorized Attacks
πŸ“Š Network Security
Q. The ________criterion ensures that we cannot find two messages that hash to the same digest
  • (A) one-wayness
  • (B) weak-collision-resistance
  • (C) strong-collision-resistance
  • (D) Keyless
πŸ’¬ Discuss
βœ… Correct Answer: (B) weak-collision-resistance
πŸ“Š Network Security
Q. _______________________ is a term used in cryptography that refers to a message before encryption or after decryption.
  • (A) Cipher text
  • (B) Plain text
  • (C) Plain script
  • (D) Original text
πŸ’¬ Discuss
βœ… Correct Answer: (A) Cipher text
πŸ“Š Network Security
Q. The ________ is encrypted text
  • (A) cipher text
  • (B) cipher scricpt
  • (C) secret text
  • (D) secret script
πŸ’¬ Discuss
βœ… Correct Answer: (C) secret text
πŸ“Š Network Security
Q. _______________________ ensures that information are in a format that is true and correct to its original purposes.
  • (A) Availability
  • (B) Confidentiality
  • (C) Cryptography
  • (D) Integrity
πŸ’¬ Discuss
βœ… Correct Answer: (A) Availability
πŸ“Š Network Security
Q. _____________________ ensures that information and resources are available to those who need them.
  • (A) Availability
  • (B) Confidentiality
  • (C) Cryptography
  • (D) Integrity
πŸ’¬ Discuss
βœ… Correct Answer: (D) Integrity
πŸ“Š Network Security
Q. _______________________ is the process of identifying an individual, usually based on a username and password.
  • (A) Authentication
  • (B) Authorization
  • (C) integrity
  • (D) crytography
πŸ’¬ Discuss
βœ… Correct Answer: (A) Authentication
πŸ“Š Network Security
Q. ___________________ is the process of giving individuals access to system objects based on their identity.
  • (A) Authentication
  • (B) Authorization
  • (C) key
  • (D) Confidentiality
πŸ’¬ Discuss
βœ… Correct Answer: (B) Authorization

Jump to