Site MapHelpFeedbackQuizzes
Quizzes
(See related pages)

1
Three security goals are _______________________________________.
A)confidentiality, cryptography, and nonrepudiation
B)confidentiality, encryption, and decryption
C)confidentiality, integrity, and availability
D)None of the choices are correct
2
Which of the following attacks is threatening integrity?
A)Masquerading
B)Traffic Analysis
C)Denial of service
D)None of the choices are correct
3
Which of the following attacks is threatening availability?
A)Replaying
B)Modification
C)Denial of service
D)None of the choices are correct
4
_____________ means concealing the contents of a message by enciphering.
A)Steganography
B)Cryptography
C)Compressing
D)None of the choices are correct
5
______________means concealing the message by covering it with something else.
A)Cryptography
B)Steganography
C)Compressing
D)None of the choices are correct
6
In __________cryptography, the same key is used by the sender and the receiver.
A)symmetric-key
B)asymmetric-key
C)public-key
D)None of the choices are correct
7
In _________ cryptography, the same key is used in both directions.
A)symmetric-key
B)asymmetric-key
C)public-key
D)None of the choices are correct
8
_________ cryptography is often used for long messages.
A)Symmetric-key
B)Asymmetric-key
C)Public-key
D)None of the choices are correct
9
___________ cryptography is often used for short messages.
A)Symmetric-key
B)Asymmetric-key
C)Secret-key
D)None of the choices are correct
10
__________means that the sender and the receiver expect confidentiality.
A)Nonrepudiation
B)Integrity
C)Authentication
D)None of the choices are correct
11
___________ means that the data must arrive at the receiver exactly as they were sent.
A)Nonrepudiation
B)Message integrity
C)Authentication
D)None of the choices are correct
12
______________ can provide authentication, integrity, and nonrepudiation for a message.
A)Encryption/decryption
B)Digital signature
C)Compression
D)None of the choices are correct
13
Digital signature does not provide _________.
A)nonrepudiation
B)privacy
C)authentication
D)Provides all of the choices
14
In ___________, the identity of a party is verified once for the entire duration of system access.
A)entity authentication
B)message integrity
C)message authentication
D)None of the choices are correct
15
In __________ cryptography, everyone has access to everyone's public key.
A)symmetric-key
B)asymmetric-key
C)secret-key
D)None of the choices are correct
16
After a message is encrypted, it is called _______.
A)plaintext
B)ciphertext
C)cryptotext
D)None of the choices are correct
17
In the asymmetric-key method used for confidentiality, which key is publicly known?
A)Encryption key only
B)Decryption key only
C)Both keys
D)None of the choices are correct
18
In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.
A)private key
B)public key
C)no key
D)None of the choices are correct
19
The RSA algorithm for confidentiality uses _______ cryptography.
A)asymmetric-key
B)symmetric-key
C)substitution
D)None of the choices are correct
20
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.
A)user A
B)user B
C)the network
D)None of the choices are correct
21
In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.
A)his or her own symmetric key
B)his or her own private key
C)his or her own public key
D)None of the choices are correct
22
In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
A)her or his own public key
B)her or his own private key
C)the sender's public key
D)None of the choices are correct
23
A _______ is a trusted third party that solves the problem of symmetric-key distribution.
A)CA
B)KDC
C)TLS
D)firewall
24
A _______ certifies the binding between a public key and its owner.
A)CA
B)KDC
C)TLS
D)None of the choices are correct







Data Comm. and NetworkingOnline Learning Center

Home > Chapter 31 > Quizzes