Cryptography Questions and Answers – Symmetric Key Distribution – I

«
»

This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “Symmetric Key Distribution”.

1. If end to end connection is done at a network or IP level, and if there are N hosts, then what is the number of keys required?
a) N(N-1)/2
b) N
c) N(N+1)/2
d) N/2
View Answer

Answer: a
Explanation: The number of keys required would be N(N-1)/2, similar to that of a mesh topology network connection (each node is connection line requires a key).

2. For 1000 nodes in IP level, how many keys would be required?
a) 499000
b) 499500
c) 500500
d) 500000
View Answer

Answer: b
Explanation: Use N(N-1)/2 where N=1000.

3. Communication between end systems is encrypted using a key, often known as
a) temporary key
b) section key
c) line key
d) session key
View Answer

Answer: d
Explanation: The key is referred to as session key.
advertisement
advertisement

4. Session keys are transmitted after being encrypted by
a) make-shift keys
b) temporary keys
c) master keys
d) section keys
View Answer

Answer: c
Explanation: Each node has a master key which it uses to receive the session key.

5. For a network with N nodes, how many master keys are present?
a) N(N-1)/2
b) N
c) N(N+1)/2
d) N/2
View Answer

Answer: b
Explanation: Each node has a master key to receive the session keys from the Key Distribution Centre (KDC).

6. PDU stands for
a) Protocol data unit
b) Pre data underscore
c) Permuted data unity
d) Protocol data untiy
View Answer

Answer: a
Explanation: In key management, PDU stands for Protocol data unit.

7. SSM stands for
a) Secure Security Module
b) Session Security Module
c) Service Session Module
d) Session Service Module
View Answer

Answer: b
Explanation: SSM stands for Session Security Module.
advertisement

8. Which is the last step in establishing a connection between hosts using the SSM?
a) Interaction/ Handshaking between the SSM and the KDC
b) Establishment of the connection
c) Release of connection request packet
d) SSM saves the packet and applies to the KDC for connection permission
View Answer

Answer: c
Explanation: The correct order of execution is – (d,b,a,c)

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

advertisement

To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.