This set of Computer Network Multiple Choice Questions & Answers (MCQs) focuses on “Security Management “.
1. _________ public key is the hybrid of secret and public key.
a) Vigner Cipher
b) Diffie-Hellman
c) RSA
d) AES
View Answer
Explanation: The Diffie-Hellman public key algorithm is the oldest public key algorithm. It is a hybrid of the secret and public key.
2. ________ of individual hosts are useful for identifying some hidden costs.
a) Configuring
b) Performance
c) Accounting
d) Importing
View Answer
Explanation: Accounting management is probably the least developed function of the network management application. Accounting management could also include the use of individual hosts, administrative segments, and external traffic. Accounting of individual hosts is useful for identifying some hidden costs.
3. Security management is both a/an _______ and a/an _______ issue in information management.
a) technical, administrative
b) authoritative, non-administrative
c) non-technical, administrative
d) non-authoritative, administrative
View Answer
Explanation: Security management is both a technical and administrative issue in information management. It involves securing access to the network and information flowing in the network, access to data stored in the network, and manipulating the data that are stored and flowing across the network.
4. The application gateway behaves differently for each application.
a) True
b) False
View Answer
Explanation: An application-level gateway is used to overcome some of the problems identified in packet filtering. Firewalls F1 and F2 will only forward if data are to or from the application gateway. Thus, the secured LAN is a gateway LAN. The application gateway behaves differently for each application, and filtering is handled by the proxy services in the application gateway.
5. Firewalls use _________ as the primary technique of controlling undesired traffic.
a) performance management
b) cryptography
c) packet filtering
d) masquerading
View Answer
Explanation: The main purpose of a firewall is to protect a network from external attacks. It monitors and controls traffic into and out of a secure network. h can be implemented in a router, or a gateway or a special host. A firewall is normally located at the gateway to a network, but it may also be implemented at host access points. Firewalls use packet filtering or application-level gateways as the two primary techniques of controlling undesired traffic.
6. The scope of network and access to security management covers only enterprise intranet network.
a) True
b) False
View Answer
Explanation: Security management is both a technical and administrative issue in information management. It involves securing access to the network and information flowing in the network, access to data stored in the network, and manipulating the data that are stored and flowing across the network. The scope of network and access to it not only covers enterprise intranet network but also the Internet that it is connected to.
7. Which among the following algorithms implement secret key?
a) AES
b) DES
c) RSA
d) CRC
View Answer
Explanation: There are two standard algorithms implement secret key cryptography. They are Data Encryption Standard (DES) and International Data Encryption Algorithm (IDEA). DES is designed for efficient hardware implementation and consequently has a poor performance if implemented in software. In contrast to that, IDEA functions efficiently in software implementation.
8. The ________ module in Pretty Good Privacy (PGP) uses MD5 to generate a hash code of the message and encrypts it with the sender’s private key using an RSA algorithm.
a) signature generation
b) encryption
c) email conversion
d) compression
View Answer
Explanation: Pretty Good Privacy (PGP) defines a clever procedure that utilizes various available modules to perform the functions needed to transmit a secure message, such as email. The signature generation module uses MD5 to generate a hash code of the message and encrypts it with the sender’s private key using an RSA algorithm.
9. The encryption and decryption modules for secret key cryptography can be implemented only in hardware.
a) True
b) False
View Answer
Explanation: In Secret Key Cryptography, each letter is replaced by another letter n letters later in the alphabet. It is the same key that is used for encryption and decryption and is called secret key cryptography. The encryption and decryption modules can be implemented in either hardware or software.
10. What do you mean by integrity protection in Security management?
a) It makes sure that the information has not tampered as it traverses between the source and the destination
b) It validates the originator identification
c) It is used to overcome some of the problems identified in packet filtering
d) It reduces the risk of access to hosts from an external network by filtering insecure services
View Answer
Explanation: For secure communication, we need to ensure integrity protection and authentication validation. Integrity protection makes sure that the information has not been tampered with as it traverses between the source and the destination.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Check Computer Science Books
- Practice MCA MCQs
- Check Computer Network Books
- Apply for Computer Science Internship
- Practice Computer Science MCQs