0% found this document useful (0 votes)
5 views

CNS MCQ 4

Computer network security mcqs

Uploaded by

adnan ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

CNS MCQ 4

Computer network security mcqs

Uploaded by

adnan ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Computer Network Security MCQ - 4

1. In the digital signature technique when the whole message is signed using an

asymmetric key, the receiver of the message uses _______ to verify the signature.

A. her or his own public key


B. her or his own private key
C. the sender's public key
D. None of the choices are correct.

2. VPN technology uses two simultaneous techniques to guarantee privacy for an

organization: ________ and ___________.

A. SSL; tunneling
B. IPSec; SSL
C. IPSec; tunneling
D. None of the choices are correct.

3. IP Security (IPSec) is a collection of protocols designed by the IETF (Internet

Engineering Task Force) to provide security for a packet at the _________ level.

A. data link
B. network
C. transport
D. None of the choices are correct.

4. IPSec requires a logical connection between two hosts using a signaling protocol

called ____________.

A. AS
B. SA
C. AS
D. None of the choices are correct.
5. IPSec operates at two different modes: _________ mode and _________ mode.

A. transport; network
B. transport; tunnel
C. tunnel; surface
D. None of the choices are correct.

6. In the _________ mode, the IPSec header is added between the IP header and the

rest of the packet.

A. transport
B. tunnel
C. transition
D. None of the choices are correct.

7. The sender signs a message as:.

A. Digital Signature
B. Artificial Signature
C. Encrypted Signature
D. None of the choices are correct.

8. The ________ protocol is designed to authenticate the source host and to ensure the

integrity of the payload carried by the IP packet.

A. AH
B. ESP
C. SPE
D. None of the choices are correct.
9. The _______ protocol provides message authentication, integrity, and privacy.

A. AH
B. ESP
C. SPE
D. None of the choices are correct.

10. The _______ was designed to provide security at the transport layer.

A. AH
B. ESP
C. TLS
D. None of the choices are correct.

11. A packet-filter firewall filters at the ________ or ___________ layer.

A. network; application
B. transport; application
C. network; transport
D. None of the choices are correct

12. A proxy firewall filters at the __________ layer.

A. transport
B. network
C. application
D. None of the choices are correct.
13. Three security goals are _______________________________________.

A. confidentiality, cryptography, and nonrepudiation


B. confidentiality, encryption, and decryption
C. confidentiality, integrity, and availability
D. None of the choices are correct.

14. Which of the following attacks is threatening integrity?

A. Masquerading
B. Traffic Analysis
C. Denial of service
D. None of the choices are correct.

15. Which of the following attacks is threatening availability?

A. Replaying
B. Modification
C. Denial of service
D. None of the choices are correct.

16. _____________ means concealing the contents of a message by enciphering.

A. Steganography
B. Cryptography
C. Compressing
D. None of the choices are correct.
17. ______________ means concealing the message by covering it with something

else.

A. Cryptography
B. Steganography
C. Compressing
D. None of the choices are correct.

18. In __________ cryptography, the same key is used by the sender and the receiver.

A. symmetric-key
B. asymmetric-key
C. public-key
D. None of the choices are correct.

19. In _________ cryptography, the same key is used in both directions.

A. symmetric-key
B. asymmetric-key
C. public-key
D. None of the choices are correct.

20. _________ cryptography is often used for long messages.

A. Symmetric-key
B. Asymmetric-key
C. public-key
D. None of the choices are correct.
21. ___________ cryptography is often used for short messages.

A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. None of the choices are correct

22. ___________ means that the data must arrive at the receiver exactly as they were

sent.

A. Nonrepudiation
B. Message integrity
C. Authentication
D. None of the choices are correct.

23. ______________ can provide authentication, integrity, and nonrepudiation for a

message.

A. Encryption/decryption
B. Digital signature
C. Compression
D. None of the choices are correct.

24. In ___________, the identity of a party is verified once for the entire duration of

system access.

A. entity authentication
B. message integrity
C. message authentication
D. None of the choices are correct.
25. In __________ cryptography, everyone has access to everyone's public key.

A. symmetric-key
B. asymmetric-key
C. secret-key
D. None of the choices are correct.

26. After a message is encrypted, it is called _______.

A. plaintext
B. ciphertext
C. cryptotext
D. None of the choices are correct.

27. In the asymmetric-key method used for confidentiality, which key is publicly known?

A. encryption key only


B. decryption key only
C. both keys
D. None of the choices are correct.

28. In the asymmetric-key method used for confidentiality, the receiver uses his/her own

______________ to decrypt the message.

A. private key
B. public key
C. no key
D. None of the choices are correct.
29. The RSA algorithm for confidentiality uses _______ cryptography.

A. asymmetric-key
B. symmetric-key
C. substitution
D. None of the choices are correct.

30. An agent is a host or router that runs the SNMP _______ process.

A. client
B. server
C. client and server
D. None of the choices are correct.

31. SNMP uses two other protocols: _______ and _________.

A. MIB; SMTP
B. SMI; MIB
C. FTP; SMI
D. None of the choices are correct.

32. ________ defines the general rules for naming objects, defining object types, and

showing how to encode objects and values.

A. MIB
B. BER
C. SMI
D. None of the choices are correct.
33. __________ creates a collection of named objects, their types, and their

relationships to each other in an entity to be managed.

A. MIB
B. SMI
C. BER
D. None of the choices are correct

34. We can compare the task of network management to the task of writing a program.

Both tasks need rules. In network management this is handled by ___________.

A. SMNP
B. MIB
C. SMI
D. None of the choices are correct.

35. We can compare the task of network management to the task of writing a program.

Both tasks need variable definition and declarations. In network management this is

handled by _________.

A. SMNP
B. MIB
C. SMI
D. None of the choices are correct.

36. We can compare the task of network management to the task of writing a program.

Both tasks have actions performed by statements. In network management this is

handled by _______.

A. SMNP
B. MIB
C. SMI
D. None of the choices are correct.
37. SMI emphasizes three attributes to handle an object: _______, ________, and

_________.

A. name; data type; size


B. name; size; encoding method
C. name; data type; encoding method
D. None of the choices are correct.

38. To name objects globally, SMI uses an object identifier, which is a hierarchical

identifier based on a _______ structure

A. linear
B. tree
C. graph
D. None of the choices are correct.

39. All objects managed by SNMP are given an object identifier. The object identifier

always starts with _______.

A. 1.3.6.1.2.1
B. 1.3.6.1.2.2
C. 1.3.6.1.2.3
D. None of the choices are correct.

40. To define the data type, SMI uses fundamental definitions in _______ and adds

some new definitions.

A. AMS.1
B. ASN.1
C. ASN.2
D. None of the choices are correct.

41. SMI has two broad categories of data type: _______ and _______.

A. simple; complex
B. simple; structured
C. structured; unstructured
D. None of the choices are correct.
42. The _______ data types are atomic data types.

A. structure
B. simple
C. array
D. None of the choices are correct.

43. SMI defines two structured data types: ________ and _________.

A. sequence; atomic
B. sequence; a sequence of
C. sequence; array
D. None of the choices are correct.

44. SMI uses another standard, ___________, to encode data to be transmitted over

the network.

A. MIB
B. ANS.1
C. BER
D. None of the choices are correct.

45. BER specifies that each piece of data be encoded using three fields:
_____________________.

A. type, value, name


B. tag, length, and value
C. value, length, name
D. None of the choices are correct.

46. _______ runs the SNMP client program; _______ runs the SNMP server program.

A. A manager; a manager
B. An agent; an agent
C. A manager; an agent
D. An agent; a manager
47. For a 1-byte length field, what is the maximum value for the data length?

A. 127
B. 128
C. 255
D. None of the choices are correct.

48. An SNMP agent can send _______ messages.

A. GetRequest
B. SetRequest
C. Trap
D. None of the choices are correct.

49. An SNMP agent can send _______ messages.

A. Response
B. GetRequest
C. SetRequest
D. None of the choices are correct.

50. We can define network management as ________________ network components

to meet a set of requirements defined by an organization.

A. monitoring
B. configuring
C. testing and trouble shooting
D. All of the choices are correct.
51. The ___________ management system monitors and controls the network to

ensure that it is running as efficiently as possible.

A. configuration
B. fault
C. accounting
D. performance

52. The ___________ management system is responsible for controlling access to the

network based on the pre-defined policy.

A. configuration
B. fault
C. security
D. performance

53. SNMP is a (an) ______________ protocol in which a few manager stations control a

set of agents.

A. application-level
B. transport-level
C. network-level
D. None of the choices are correct.

54. A station, called ________, is a host that runs the SNMP client program.

A. a manager
B. an agent
C. a manager or an agent
D. None of the choices are correct.
55. A device, called ________, is a router (or a host) that runs the SNMP server

program.

A. an agent
B. a manager
C. an agent or a manager
D. None of the choices are correct.

56. SNMP defines the ___________________ of packets to be exchanged between a

manager and an agent.

A. format
B. encoding
C. number
D. None of the choices are correct.

57. A manager is a host that runs the SNMP _______ process.

A. client
B. server
C. client and server
D. None of the choices are correct

You might also like