Data Communication And Database Quiz!

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by Cce2015a
C
Cce2015a
Community Contributor
Total Contribution - 1 | Total attempts - 82
Questions: 12 | Attempts: 82

SettingsSettingsSettings
Data Communication And Database Quiz! - Quiz

.


Questions and Answers
  • 1. 

    Message _______ means that the receiver is ensured that the message is coming from the expected source, not from impersonator.

    • A. 

      Authentication

    • B. 

      Integrity

    • C. 

      Confidentiality

    • D. 

      None

    Correct Answer
    A. Authentication
    Explanation
    Authentication is the correct answer because it refers to the process of verifying the identity of a sender or the integrity of a message. When a message is authenticated, the receiver can trust that it is indeed coming from the expected source and not from an impersonator. This ensures that the communication is secure and reliable.

    Rate this question:

  • 2. 

    The secret key between members needs to be created as a ______ key when two members contact KDC.

    • A. 

      Public

    • B. 

      Session

    • C. 

      Subkey

    • D. 

      IV

    Correct Answer
    B. Session
    Explanation
    When two members contact the Key Distribution Center (KDC), they need to create a session key. This session key is used for encrypting and decrypting the communication between the members during their session. The session key is unique to each session and is generated specifically for that session. It provides a secure and efficient way for the members to communicate with each other.

    Rate this question:

  • 3. 

    The ________ criterion ensures that a message cannot easily be forged.

    • A. 

      One-wayness

    • B. 

      Weak-collision-resistance

    • C. 

      Strong-collision-resistance

    • D. 

      None of the above

    Correct Answer
    B. Weak-collision-resistance
    Explanation
    Weak collision resistance ensures that it is difficult to find two different inputs that produce the same hash output. This criterion helps to prevent the forging of messages because even a small change in the input will result in a significantly different hash value. Therefore, it becomes challenging for an attacker to create a forged message with the same hash value as the original message.

    Rate this question:

  • 4. 

    _____ is a trusted third party that assigns a symmetric key to two parties.

    • A. 

      KDD

    • B. 

      KDC

    • C. 

      CA

    • D. 

      IKE

    Correct Answer
    B. KDC
    Explanation
    A Key Distribution Center (KDC) is a trusted third party that assigns a symmetric key to two parties. The KDC acts as a central authority that generates and distributes the symmetric key to both parties involved in the communication. This ensures that the key is securely shared between the parties, allowing them to establish a secure and encrypted communication channel. The KDC plays a crucial role in facilitating secure communication between the two parties by securely distributing the symmetric key.

    Rate this question:

  • 5. 

    Digital signature cannot provide ________ for the message

    • A. 

      Integrity

    • B. 

      Confidentiality

    • C. 

      Non-repudiation

    • D. 

      Authentication

    Correct Answer
    B. Confidentiality
    Explanation
    A digital signature is a cryptographic technique used to ensure the authenticity and integrity of a message. It provides a way to verify that the message has not been tampered with and that it was indeed sent by the claimed sender. However, it does not provide confidentiality, which means that it does not protect the message from being accessed or read by unauthorized parties. Therefore, the correct answer is confidentiality.

    Rate this question:

  • 6. 

    IPSec defines two protocols: _______ and ________.

    • A. 

      AH , EPS

    • B. 

      AH, PGP

    • C. 

      AH, ESP

    • D. 

      None

    Correct Answer
    C. AH, ESP
    Explanation
    IPSec (Internet Protocol Security) is a protocol suite that provides secure communication over IP networks. It defines two protocols: AH (Authentication Header) and ESP (Encapsulating Security Payload). AH provides integrity and authentication of IP packets, while ESP provides confidentiality, integrity, and authentication. Together, AH and ESP ensure secure and protected communication between network devices.

    Rate this question:

  • 7. 

    A ______ provides privacy for LANs that must communicate through the global Internet.

    • A. 

      VLAN

    • B. 

      Proxey

    • C. 

      VPN

    • D. 

      Tunnel

    Correct Answer
    C. VPN
    Explanation
    A VPN (Virtual Private Network) provides privacy for LANs that must communicate through the global Internet. It creates a secure and encrypted connection between the LANs, allowing data to be transmitted securely over public networks. This ensures that the communication remains private and protected from unauthorized access or interception. VPNs are commonly used by businesses to securely connect remote offices or remote workers to the corporate network.

    Rate this question:

  • 8. 

    IPSec in the ______ mode does not protect the IP header.

    • A. 

      ESP

    • B. 

      AH

    • C. 

      Tunnel

    • D. 

      Transport

    Correct Answer
    D. Transport
    Explanation
    In Transport mode, IPSec only protects the payload of the IP packet and not the IP header itself. This means that the original IP header is not encrypted or authenticated, leaving it vulnerable to potential attacks. In contrast, in Tunnel mode, both the IP header and the payload are protected by IPSec. Therefore, the correct answer is Transport.

    Rate this question:

  • 9. 

    IP Security operates in which layer of the OSI mode

    • A. 

      Network

    • B. 

      Transport

    • C. 

      Data Link

    • D. 

      Session

    Correct Answer
    A. Network
    Explanation
    IP Security operates in the Network layer of the OSI model. This layer is responsible for routing and forwarding data packets between different networks. IP Security (IPSec) provides secure communication over IP networks by encrypting and authenticating IP packets. It ensures the confidentiality, integrity, and authenticity of data transmitted over IP networks. By operating at the Network layer, IPSec can protect all traffic passing through the network, regardless of the higher-layer protocols being used.

    Rate this question:

  • 10. 

    Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

    • A. 

      Kerberos V5

    • B. 

      SHA

    • C. 

      MD5

    • D. 

      Both SHA and MD5

    Correct Answer
    A. Kerberos V5
    Explanation
    Kerberos V5 is the correct answer because it is an authentication protocol that can be used with IPsec to secure the authentication of computers. It provides strong mutual authentication between clients and servers, ensuring that only authorized entities can access the network resources. SHA and MD5, on the other hand, are cryptographic hash functions and not encryption protocols. They are used for data integrity and message authentication, but not for securing the authentication of computers using IPsec.

    Rate this question:

  • 11. 

    For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principals’ associated “secret keys”.

    • A. 

      Realm

    • B. 

      Key

    • C. 

      Document

    • D. 

      None

    Correct Answer
    A. Realm
    Explanation
    The correct answer is "realm". In the context of Kerberos, a realm refers to a specific domain or administrative boundary. The Kerberos Key Distribution Center (KDC) maintains a database of the realm's principal, which represents a user or service, and their associated "secret keys". These secret keys are used for authentication and encryption purposes within the realm.

    Rate this question:

  • 12. 

    Which type of authentication should a company that has all computers in one domain use to ensure authentication of all clients and servers with the least administrative effort? Assume that all client computers run Windows XP Professional and all servers run Windows Server 2003.

    • A. 

      Certificates

    • B. 

      Preshared keys Preshared keys Preshared keys Preshared Keys

    • C. 

      Kerberos V5

    • D. 

      MD5

    Correct Answer
    C. Kerberos V5
    Explanation
    Kerberos V5 is the recommended type of authentication for a company that has all computers in one domain. It ensures authentication of all clients and servers with the least administrative effort. Kerberos V5 is a network authentication protocol that uses tickets to authenticate users and encrypts the communication between clients and servers. It provides a centralized authentication system, simplifying the management of user accounts and passwords. Additionally, Kerberos V5 is integrated into Windows XP Professional and Windows Server 2003, making it the most suitable choice for this scenario.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.