Computer Network Questions and Answers – Security Management

This set of Computer Network Multiple Choice Questions & Answers (MCQs) focuses on “Security Management “.

1. _________ public key is the hybrid of secret and public key.
a) Vigner Cipher
b) Diffie-Hellman
c) RSA
d) AES
View Answer

Answer: b
Explanation: The Diffie-Hellman public key algorithm is the oldest public key algorithm. It is a hybrid of the secret and public key.

2. ________ of individual hosts are useful for identifying some hidden costs.
a) Configuring
b) Performance
c) Accounting
d) Importing
View Answer

Answer: c
Explanation: Accounting management is probably the least developed function of the network management application. Accounting management could also include the use of individual hosts, administrative segments, and external traffic. Accounting of individual hosts is useful for identifying some hidden costs.

3. Security management is both a/an _______ and a/an _______ issue in information management.
a) technical, administrative
b) authoritative, non-administrative
c) non-technical, administrative
d) non-authoritative, administrative
View Answer

Answer: a
Explanation: Security management is both a technical and administrative issue in information management. It involves securing access to the network and information flowing in the network, access to data stored in the network, and manipulating the data that are stored and flowing across the network.
advertisement
advertisement

4. The application gateway behaves differently for each application.
a) True
b) False
View Answer

Answer: a
Explanation: An application-level gateway is used to overcome some of the problems identified in packet filtering. Firewalls F1 and F2 will only forward if data are to or from the application gateway. Thus, the secured LAN is a gateway LAN. The application gateway behaves differently for each application, and filtering is handled by the proxy services in the application gateway.

5. Firewalls use _________ as the primary technique of controlling undesired traffic.
a) performance management
b) cryptography
c) packet filtering
d) masquerading
View Answer

Answer: c
Explanation: The main purpose of a firewall is to protect a network from external attacks. It monitors and controls traffic into and out of a secure network. h can be implemented in a router, or a gateway or a special host. A firewall is normally located at the gateway to a network, but it may also be implemented at host access points. Firewalls use packet filtering or application-level gateways as the two primary techniques of controlling undesired traffic.

6. The scope of network and access to security management covers only enterprise intranet network.
a) True
b) False
View Answer

Answer: b
Explanation: Security management is both a technical and administrative issue in information management. It involves securing access to the network and information flowing in the network, access to data stored in the network, and manipulating the data that are stored and flowing across the network. The scope of network and access to it not only covers enterprise intranet network but also the Internet that it is connected to.

7. Which among the following algorithms implement secret key?
a) AES
b) DES
c) RSA
d) CRC
View Answer

Answer: b
Explanation: There are two standard algorithms implement secret key cryptography. They are Data Encryption Standard (DES) and International Data Encryption Algorithm (IDEA). DES is designed for efficient hardware implementation and consequently has a poor performance if implemented in software. In contrast to that, IDEA functions efficiently in software implementation.
advertisement

8. The ________ module in Pretty Good Privacy (PGP) uses MD5 to generate a hash code of the message and encrypts it with the sender’s private key using an RSA algorithm.
a) signature generation
b) encryption
c) email conversion
d) compression
View Answer

Answer: a
Explanation: Pretty Good Privacy (PGP) defines a clever procedure that utilizes various available modules to perform the functions needed to transmit a secure message, such as email. The signature generation module uses MD5 to generate a hash code of the message and encrypts it with the sender’s private key using an RSA algorithm.

9. The encryption and decryption modules for secret key cryptography can be implemented only in hardware.
a) True
b) False
View Answer

Answer: b
Explanation: In Secret Key Cryptography, each letter is replaced by another letter n letters later in the alphabet. It is the same key that is used for encryption and decryption and is called secret key cryptography. The encryption and decryption modules can be implemented in either hardware or software.
advertisement

10. What do you mean by integrity protection in Security management?
a) It makes sure that the information has not tampered as it traverses between the source and the destination
b) It validates the originator identification
c) It is used to overcome some of the problems identified in packet filtering
d) It reduces the risk of access to hosts from an external network by filtering insecure services
View Answer

Answer: a
Explanation: For secure communication, we need to ensure integrity protection and authentication validation. Integrity protection makes sure that the information has not been tampered with as it traverses between the source and the destination.

Sanfoundry Global Education & Learning Series – Computer Networks.

To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers.

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.