CNS MCQ 4
CNS MCQ 4
1. In the digital signature technique when the whole message is signed using an
asymmetric key, the receiver of the message uses _______ to verify the signature.
A. SSL; tunneling
B. IPSec; SSL
C. IPSec; tunneling
D. None of the choices are correct.
Engineering Task Force) to provide security for a packet at the _________ level.
A. data link
B. network
C. transport
D. None of the choices are correct.
4. IPSec requires a logical connection between two hosts using a signaling protocol
called ____________.
A. AS
B. SA
C. AS
D. None of the choices are correct.
5. IPSec operates at two different modes: _________ mode and _________ mode.
A. transport; network
B. transport; tunnel
C. tunnel; surface
D. None of the choices are correct.
6. In the _________ mode, the IPSec header is added between the IP header and the
A. transport
B. tunnel
C. transition
D. None of the choices are correct.
A. Digital Signature
B. Artificial Signature
C. Encrypted Signature
D. None of the choices are correct.
8. The ________ protocol is designed to authenticate the source host and to ensure the
A. AH
B. ESP
C. SPE
D. None of the choices are correct.
9. The _______ protocol provides message authentication, integrity, and privacy.
A. AH
B. ESP
C. SPE
D. None of the choices are correct.
10. The _______ was designed to provide security at the transport layer.
A. AH
B. ESP
C. TLS
D. None of the choices are correct.
A. network; application
B. transport; application
C. network; transport
D. None of the choices are correct
A. transport
B. network
C. application
D. None of the choices are correct.
13. Three security goals are _______________________________________.
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. None of the choices are correct.
A. Replaying
B. Modification
C. Denial of service
D. None of the choices are correct.
A. Steganography
B. Cryptography
C. Compressing
D. None of the choices are correct.
17. ______________ means concealing the message by covering it with something
else.
A. Cryptography
B. Steganography
C. Compressing
D. None of the choices are correct.
18. In __________ cryptography, the same key is used by the sender and the receiver.
A. symmetric-key
B. asymmetric-key
C. public-key
D. None of the choices are correct.
A. symmetric-key
B. asymmetric-key
C. public-key
D. None of the choices are correct.
A. Symmetric-key
B. Asymmetric-key
C. public-key
D. None of the choices are correct.
21. ___________ cryptography is often used for short messages.
A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. None of the choices are correct
22. ___________ means that the data must arrive at the receiver exactly as they were
sent.
A. Nonrepudiation
B. Message integrity
C. Authentication
D. None of the choices are correct.
message.
A. Encryption/decryption
B. Digital signature
C. Compression
D. None of the choices are correct.
24. In ___________, the identity of a party is verified once for the entire duration of
system access.
A. entity authentication
B. message integrity
C. message authentication
D. None of the choices are correct.
25. In __________ cryptography, everyone has access to everyone's public key.
A. symmetric-key
B. asymmetric-key
C. secret-key
D. None of the choices are correct.
A. plaintext
B. ciphertext
C. cryptotext
D. None of the choices are correct.
27. In the asymmetric-key method used for confidentiality, which key is publicly known?
28. In the asymmetric-key method used for confidentiality, the receiver uses his/her own
A. private key
B. public key
C. no key
D. None of the choices are correct.
29. The RSA algorithm for confidentiality uses _______ cryptography.
A. asymmetric-key
B. symmetric-key
C. substitution
D. None of the choices are correct.
30. An agent is a host or router that runs the SNMP _______ process.
A. client
B. server
C. client and server
D. None of the choices are correct.
A. MIB; SMTP
B. SMI; MIB
C. FTP; SMI
D. None of the choices are correct.
32. ________ defines the general rules for naming objects, defining object types, and
A. MIB
B. BER
C. SMI
D. None of the choices are correct.
33. __________ creates a collection of named objects, their types, and their
A. MIB
B. SMI
C. BER
D. None of the choices are correct
34. We can compare the task of network management to the task of writing a program.
A. SMNP
B. MIB
C. SMI
D. None of the choices are correct.
35. We can compare the task of network management to the task of writing a program.
Both tasks need variable definition and declarations. In network management this is
handled by _________.
A. SMNP
B. MIB
C. SMI
D. None of the choices are correct.
36. We can compare the task of network management to the task of writing a program.
handled by _______.
A. SMNP
B. MIB
C. SMI
D. None of the choices are correct.
37. SMI emphasizes three attributes to handle an object: _______, ________, and
_________.
38. To name objects globally, SMI uses an object identifier, which is a hierarchical
A. linear
B. tree
C. graph
D. None of the choices are correct.
39. All objects managed by SNMP are given an object identifier. The object identifier
A. 1.3.6.1.2.1
B. 1.3.6.1.2.2
C. 1.3.6.1.2.3
D. None of the choices are correct.
40. To define the data type, SMI uses fundamental definitions in _______ and adds
A. AMS.1
B. ASN.1
C. ASN.2
D. None of the choices are correct.
41. SMI has two broad categories of data type: _______ and _______.
A. simple; complex
B. simple; structured
C. structured; unstructured
D. None of the choices are correct.
42. The _______ data types are atomic data types.
A. structure
B. simple
C. array
D. None of the choices are correct.
43. SMI defines two structured data types: ________ and _________.
A. sequence; atomic
B. sequence; a sequence of
C. sequence; array
D. None of the choices are correct.
44. SMI uses another standard, ___________, to encode data to be transmitted over
the network.
A. MIB
B. ANS.1
C. BER
D. None of the choices are correct.
45. BER specifies that each piece of data be encoded using three fields:
_____________________.
46. _______ runs the SNMP client program; _______ runs the SNMP server program.
A. A manager; a manager
B. An agent; an agent
C. A manager; an agent
D. An agent; a manager
47. For a 1-byte length field, what is the maximum value for the data length?
A. 127
B. 128
C. 255
D. None of the choices are correct.
A. GetRequest
B. SetRequest
C. Trap
D. None of the choices are correct.
A. Response
B. GetRequest
C. SetRequest
D. None of the choices are correct.
A. monitoring
B. configuring
C. testing and trouble shooting
D. All of the choices are correct.
51. The ___________ management system monitors and controls the network to
A. configuration
B. fault
C. accounting
D. performance
52. The ___________ management system is responsible for controlling access to the
A. configuration
B. fault
C. security
D. performance
53. SNMP is a (an) ______________ protocol in which a few manager stations control a
set of agents.
A. application-level
B. transport-level
C. network-level
D. None of the choices are correct.
54. A station, called ________, is a host that runs the SNMP client program.
A. a manager
B. an agent
C. a manager or an agent
D. None of the choices are correct.
55. A device, called ________, is a router (or a host) that runs the SNMP server
program.
A. an agent
B. a manager
C. an agent or a manager
D. None of the choices are correct.
A. format
B. encoding
C. number
D. None of the choices are correct.
A. client
B. server
C. client and server
D. None of the choices are correct