Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)

Please answer all questions.




1Message ________ means that the sender and the receiver expect privacy.
A)confidentiality
B)integrity
C)authentication
D)none of the above



2Message_____ means that the data must arrive at the receiver exactly as sent.
A)confidentiality
B)integrity
C)authentication
D)none of the above



3Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
A)confidentiality
B)integrity
C)authentication
D)none of the above



4_________ means that a sender must not be able to deny sending a message that he sent.
A)Confidentiality
B)Integrity
C)Authentication
D)Nonrepudiation



5________ means to prove the identity of the entity that tries to access the system's resources.
A)Message authentication
B)Entity authentication
C)Message confidentiality
D)none of the above



6A(n) _________ can be used to preserve the integrity of a document or a message.
A)message digest
B)message summary
C)encrypted message
D)none of the above



7A(n) ________function creates a message digest out of a message.
A)encryption
B)decryption
C)hash
D)none of the above



8A hash function must meet ________ criteria.
A)two
B)three
C)four
D)none of the above



9A _______ message digest is used as an MDC.
A)keyless
B)keyed
C)either (a) or (b)
D)neither (a) nor (b)



10To authenticate the data origin, one needs a(n) _______.
A)MDC
B)MAC
C)either (a) or (b)
D)neither (a) nor (b)



11A ________ signature is included in the document; a _______ signature is a separate entity.
A)conventional; digital
B)digital; digital
C)either (a) or (b)
D)neither (a) nor (b)



12Digital signature provides ________.
A)authentication
B)nonrepudiation
C)both (a) and (b)
D)neither (a) nor (b)



13Digital signature cannot provide ________ for the message.
A)integrity
B)confidentiality
C)nonrepudiation
D)authentication



14If _________ is needed, a cryptosystem must be applied over the scheme.
A)integrity
B)confidentiality
C)nonrepudiation
D)authentication



15A digital signature needs a(n)_________ system.
A)symmetric-key
B)asymmetric-key
C)either (a) or (b)
D)neither (a) nor (b)



16A witness used in entity authentication is ____________.
A)something known
B)something possessed
C)something inherent
D)all of the above



17In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.
A)message authentication
B)entity authentication
C)message confidentiality
D)message integrity



18Password-based authentication can be divided into two broad categories: _______ and _______.
A)fixed; variable
B)time-stamped; fixed
C)fixed; one-time
D)none of the above



19In ________ authentication, the claimant proves that she knows a secret without actually sending it.
A)password-based
B)challenge-response
C)either (a) or (b)
D)neither (a) nor (b)



20Challenge-response authentication can be done using ________.
A)symmetric-key ciphers
B)asymmetric-key ciphers
C)keyed-hash functions
D)all of the above



21A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
A)KDC
B)CA
C)KDD
D)none of the above



22A(n)______ creates a secret key only between a member and the center.
A)CA
B)KDC
C)KDD
D)none of the above



23The secret key between members needs to be created as a ______ key when two members contact KDC.
A)public
B)session
C)complimentary
D)none of the above



24__________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.
A)KDC
B)Kerberos
C)CA
D)none of the above



25A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.
A)KDC
B)Kerberos
C)CA
D)none of the above



26A(n) ______ is a hierarchical system that answers queries about key certification.
A)KDC
B)PKI
C)CA
D)none of the above



27The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
A)one-wayness
B)weak-collision-resistance
C)strong-collision-resistance
D)none of the above



28The ________ criterion ensures that a message cannot easily be forged.
A)one-wayness
B)weak-collision-resistance
C)strong-collision-resistance
D)none of the above



29The _______criterion ensures that we cannot find two messages that hash to the same digest.
A)one-wayness
B)weak-collision-resistance
C)strong-collision-resistance
D)none of the above







Forouzan: DCNOnline Learning Center

Home > Chapter 31 > Multiple Choice Quiz