Netw4009 Lecture 7 Exam

8 Questions | Total Attempts: 36

SettingsSettingsSettings
Please wait...
Network Quizzes & Trivia

Questions and Answers
  • 1. 
    Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
    • A. 

      Integrity

    • B. 

      Confidentiality

    • C. 

      Availability

    • D. 

      Auditability

  • 2. 
    Which of the following is responsible for MOST of the security incidents?
    • A. 

      Equipment failure

    • B. 

      Software failure

    • C. 

      Personnel

    • D. 

      Hackers

  • 3. 
    Network security aims to provide several key services, which are?
    • A. 

      Data integrity, data strategy, data mining

    • B. 

      Data and system availability, data storage, data confidentiality

    • C. 

      Data integrity, data and system availability, data confidentiality

    • D. 

      Data strategy, data integrity, data center.

  • 4. 
    Which option is a desirable feature of using symmetric encryption algorithms?
    • A. 

      They are often used for wire-speed encryption in data networks

    • B. 

      They are based on complex mathematical operations and can easily be accelerated by hardware

    • C. 

      They offer simple key management properties

    • D. 

      They are best used for one-time encryption needs.

  • 5. 
    MD5 is _______ algorithm
    • A. 

      An encryption

    • B. 

      A decryption

    • C. 

      A hash

    • D. 

      A public key

  • 6. 
    When an email user accesses his account, he fills the password field. This is required for
    • A. 

      Identification

    • B. 

      Authentication

    • C. 

      Hashing

    • D. 

      None of the above

  • 7. 
    Non-repudiation refers to ______________
    • A. 

      Detect modified messages

    • B. 

      Sender cannot later falsely deny sending a message. Receiver cannot falsely deny receiving it.

    • C. 

      Keep information secret.

    • D. 

      Receiver can verify who sender was.

  • 8. 
    RSA encryption is _____________ ; whereas RSA decryption is ______________
    • A. 

      Slow, fast

    • B. 

      Slow, slow

    • C. 

      Fast, fast

    • D. 

      Fast, slow

Back to Top Back to top