Introduction to Network Security MCQs
1) ___________ is a combination of cryptography & cryptanalysis.
A) Cryptology B) readable message C) cipher text D) plain text
Correct ans: Cryptology
2) ___________ have strong security checks as to what they can do, and what they cannot.
A) signed applets B) java applets C) ActiveX D) client pull
Correct ans: java applets
3) __________ verifier ensures that java class files obey the rules of the java programming language.
A)bitcode B) source code C) bytecode D) java compiler
Correct ans: bytecode
4) Key database is a set of keys used by security manager and access controller to validate ___________.
A) java classes B) loading classes C) authentication D) digital signature
Correct ans: digital signature
5) __________ is a passive attack on an ongoing conversation.
A) packet sniffing B) IP Spoofing C) packet spoofing D) IP sniffing
Correct ans: packet sniffing
6) ___________ technique, rather than replacing one plain text alphabet with one cipher text alphabet at a time.
A) Polygram substitution cipher B) Polyalphabetic substitution cipher
C) Rail Fence technique D) Basic Technique
Correct ans: Polygram substitution cipher
7) __________ works on block mode.
A) CFB B) OFB C) CBC D) CCB
Correct ans:CFB
8) The __________ is an open encryption and security specification that is designed for protecting credit card transactions on the internet.
A) TSA B) SET C) LDAP D) ECC
Correct ans: SET
9) ___________ is the first step in any cryptographic solution.
A) Authentication B) id C) password D) login
Correct ans: Authentication
10) ___________ allows users and applications to access X.500 directories, depending on their privileges.
A) LDAP B) ECC C) CBC D) TSA
Correct ans: LDAP
Remarkable post, the information you have mentioned is really knowledgeable and engaging for us, I really enjoyed reading it. Thanks for sharing. What is a information security auditor
ReplyDelete