Data Communication And Database Quiz!

12 Questions | Total Attempts: 64

SettingsSettingsSettings
Data Communication And Database Quiz! - Quiz

.


Questions and Answers
  • 1. 
    Message _______ means that the receiver is ensured that the message is coming from the expected source, not from impersonator.
    • A. 

      Authentication

    • B. 

      Integrity

    • C. 

      Confidentiality

    • D. 

      None

  • 2. 
    The secret key between members needs to be created as a ______ key when two members contact KDC.
    • A. 

      Public

    • B. 

      Session

    • C. 

      Subkey

    • D. 

      IV

  • 3. 
    The ________ criterion ensures that a message cannot easily be forged.
    • A. 

      One-wayness

    • B. 

      Weak-collision-resistance

    • C. 

      Strong-collision-resistance

    • D. 

      None of the above

  • 4. 
    _____ is a trusted third party that assigns a symmetric key to two parties.
    • A. 

      KDD

    • B. 

      KDC

    • C. 

      CA

    • D. 

      IKE

  • 5. 
    Digital signature cannot provide ________ for the message
    • A. 

      Integrity

    • B. 

      Confidentiality

    • C. 

      Non-repudiation

    • D. 

      Authentication

  • 6. 
    IPSec defines two protocols: _______ and ________.
    • A. 

      AH , EPS

    • B. 

      AH, PGP

    • C. 

      AH, ESP

    • D. 

      None

  • 7. 
    A ______ provides privacy for LANs that must communicate through the global Internet.
    • A. 

      VLAN

    • B. 

      Proxey

    • C. 

      VPN

    • D. 

      Tunnel

  • 8. 
    IPSec in the ______ mode does not protect the IP header.
    • A. 

      ESP

    • B. 

      AH

    • C. 

      Tunnel

    • D. 

      Transport

  • 9. 
    IP Security operates in which layer of the OSI mode
    • A. 

      Network

    • B. 

      Transport

    • C. 

      Data Link

    • D. 

      Session

  • 10. 
    Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
    • A. 

      Kerberos V5

    • B. 

      SHA

    • C. 

      MD5

    • D. 

      Both SHA and MD5

  • 11. 
    For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principals’ associated “secret keys”.
    • A. 

      Realm

    • B. 

      Key

    • C. 

      Document

    • D. 

      None

  • 12. 
    Which type of authentication should a company that has all computers in one domain use to ensure authentication of all clients and servers with the least administrative effort? Assume that all client computers run Windows XP Professional and all servers run Windows Server 2003.
    • A. 

      Certificates

    • B. 

      Preshared keys Preshared keys Preshared keys Preshared Keys

    • C. 

      Kerberos V5

    • D. 

      MD5

Back to Top Back to top