Netw4009 Lecture 7 Exam

8 Questions | Attempts: 36
Share

SettingsSettingsSettings
Network Quizzes & Trivia

Questions and Answers
  • 1. 

    Making sure that the data has not been changed unintentionally, due to an accident or malice, is:

    • A.

      Integrity

    • B.

      Confidentiality

    • C.

      Availability

    • D.

      Auditability

    Correct Answer
    A. Integrity
  • 2. 

    Which of the following is responsible for MOST of the security incidents?

    • A.

      Equipment failure

    • B.

      Software failure

    • C.

      Personnel

    • D.

      Hackers

    Correct Answer
    C. Personnel
  • 3. 

    Network security aims to provide several key services, which are?

    • A.

      Data integrity, data strategy, data mining

    • B.

      Data and system availability, data storage, data confidentiality

    • C.

      Data integrity, data and system availability, data confidentiality

    • D.

      Data strategy, data integrity, data center.

    Correct Answer
    C. Data integrity, data and system availability, data confidentiality
  • 4. 

    Which option is a desirable feature of using symmetric encryption algorithms?

    • A.

      They are often used for wire-speed encryption in data networks

    • B.

      They are based on complex mathematical operations and can easily be accelerated by hardware

    • C.

      They offer simple key management properties

    • D.

      They are best used for one-time encryption needs.

    Correct Answer
    A. They are often used for wire-speed encryption in data networks
  • 5. 

    MD5 is _______ algorithm

    • A.

      An encryption

    • B.

      A decryption

    • C.

      A hash

    • D.

      A public key

    Correct Answer
    C. A hash
  • 6. 

    When an email user accesses his account, he fills the password field. This is required for

    • A.

      Identification

    • B.

      Authentication

    • C.

      Hashing

    • D.

      None of the above

    Correct Answer
    B. Authentication
  • 7. 

    Non-repudiation refers to ______________

    • A.

      Detect modified messages

    • B.

      Sender cannot later falsely deny sending a message. Receiver cannot falsely deny receiving it.

    • C.

      Keep information secret.

    • D.

      Receiver can verify who sender was.

    Correct Answer
    B. Sender cannot later falsely deny sending a message. Receiver cannot falsely deny receiving it.
  • 8. 

    RSA encryption is _____________ ; whereas RSA decryption is ______________

    • A.

      Slow, fast

    • B.

      Slow, slow

    • C.

      Fast, fast

    • D.

      Fast, slow

    Correct Answer
    A. Slow, fast

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 27, 2014
    Quiz Created by
    Gdeisat1
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.