Netw4009 Lecture 7 Exam

8 Questions | Attempts: 36
Share
SettingsSettings
Please wait...
  • 1/8 Questions

    Non-repudiation refers to ______________

    • Detect modified messages
    • Sender cannot later falsely deny sending a message. Receiver cannot falsely deny receiving it.
    • Keep information secret.
    • Receiver can verify who sender was.
Please wait...

Quiz Preview

  • 2. 

    Making sure that the data has not been changed unintentionally, due to an accident or malice, is:

    • Integrity

    • Confidentiality

    • Availability

    • Auditability

    Correct Answer
    A. Integrity
  • 3. 

    Network security aims to provide several key services, which are?

    • Data integrity, data strategy, data mining

    • Data and system availability, data storage, data confidentiality

    • Data integrity, data and system availability, data confidentiality

    • Data strategy, data integrity, data center.

    Correct Answer
    A. Data integrity, data and system availability, data confidentiality
  • 4. 

    When an email user accesses his account, he fills the password field. This is required for

    • Identification

    • Authentication

    • Hashing

    • None of the above

    Correct Answer
    A. Authentication
  • 5. 

    MD5 is _______ algorithm

    • An encryption

    • A decryption

    • A hash

    • A public key

    Correct Answer
    A. A hash
  • 6. 

    Which of the following is responsible for MOST of the security incidents?

    • Equipment failure

    • Software failure

    • Personnel

    • Hackers

    Correct Answer
    A. Personnel
  • 7. 

    Which option is a desirable feature of using symmetric encryption algorithms?

    • They are often used for wire-speed encryption in data networks

    • They are based on complex mathematical operations and can easily be accelerated by hardware

    • They offer simple key management properties

    • They are best used for one-time encryption needs.

    Correct Answer
    A. They are often used for wire-speed encryption in data networks
  • 8. 

    RSA encryption is _____________ ; whereas RSA decryption is ______________

    • Slow, fast

    • Slow, slow

    • Fast, fast

    • Fast, slow

    Correct Answer
    A. Slow, fast

Quiz Review Timeline (Updated): Mar 22, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 27, 2014
    Quiz Created by
    Gdeisat1
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.