Introduction to Network Security MCQs

 1) ___________ is a combination of cryptography & cryptanalysis.

A) Cryptology     B) readable message C) cipher text     D) plain text

Correct ans: Cryptology


2) ___________ have strong security checks as to what they can do, and what they cannot.

A) signed applets B) java applets C) ActiveX D) client pull

Correct ans: java applets


3) __________ verifier ensures that java class files obey the rules of the java programming language.

A)bitcode B) source code C) bytecode D) java compiler

Correct ans: bytecode


4) Key database is a set of keys used by security manager and access controller to validate ___________.

A) java classes B) loading classes C) authentication D) digital signature

Correct ans: digital signature


5) __________ is a passive attack on an ongoing conversation.

A) packet sniffing B) IP Spoofing C) packet spoofing D) IP sniffing

Correct ans: packet sniffing


6) ___________ technique, rather than replacing one plain text alphabet with one cipher text alphabet at a time.

A) Polygram substitution cipher B) Polyalphabetic substitution cipher

C) Rail Fence technique D) Basic Technique

Correct ans: Polygram substitution cipher


7) __________ works on block mode.

A) CFB B) OFB C) CBC D) CCB

Correct ans:CFB 


8) The __________ is an open encryption and security specification that is designed for protecting credit card transactions on the internet.

A) TSA B) SET C) LDAP D) ECC

Correct ans: SET


9) ___________ is the first step in any cryptographic solution.

A) Authentication B) id C) password D) login

Correct ans: Authentication


10) ___________ allows users and applications to access X.500 directories, depending on their privileges.

A) LDAP B) ECC C) CBC D) TSA

Correct ans: LDAP


Comments

  1. Remarkable post, the information you have mentioned is really knowledgeable and engaging for us, I really enjoyed reading it. Thanks for sharing. What is a information security auditor

    ReplyDelete

Post a Comment