Home / Engineering / Network Security MCQs / Page 2

Network Security MCQs | Page - 2

Dear candidates you will find MCQ questions of Network Security here. Learn these questions and prepare yourself for coming examinations and interviews. You can check the right answer of any question by clicking on any option or by clicking view answer button.

M

Mr. Dubey • 51.43K Points
Coach

Q. 11) is a popular session key creator protocol that requires an authentica

(A) KDC
(B) Kerberos
(C) CA ion server and a ticket-granting server.
(D) CD
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 12) A(n) is a hierarchical system that answers queries about key certification.

(A) KDC
(B) PKI
(C) CA
(D) CD
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 13) Firewalls are to protect against

(A) Virus Attacks
(B) Fire Attacks
(C) Data Driven Attacks
(D) Unauthorized Attacks
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 14) The ________criterion ensures that we cannot find two messages that hash to the same digest

(A) one-wayness
(B) weak-collision-resistance
(C) strong-collision-resistance
(D) Keyless
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 15) _______________________ is a term used in cryptography that refers to a message before encryption or after decryption.

(A) Cipher text
(B) Plain text
(C) Plain script
(D) Original text
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 16) The ________ is encrypted text

(A) cipher text
(B) cipher scricpt
(C) secret text
(D) secret script
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 17) _______________________ ensures that information are in a format that is true and correct to its original purposes.

(A) Availability
(B) Confidentiality
(C) Cryptography
(D) Integrity
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 18) _____________________ ensures that information and resources are available to those who need them.

(A) Availability
(B) Confidentiality
(C) Cryptography
(D) Integrity
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 19) _______________________ is the process of identifying an individual, usually based on a username and password.

(A) Authentication
(B) Authorization
(C) integrity
(D) crytography
View Answer Discuss Share

M

Mr. Dubey • 51.43K Points
Coach

Q. 20) ___________________ is the process of giving individuals access to system objects based on their identity.

(A) Authentication
(B) Authorization
(C) key
(D) Confidentiality
View Answer Discuss Share