This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “Symmetric Key Distribution”.
1. If end to end connection is done at a network or IP level, and if there are N hosts, then what is the number of keys required?
a) N(N-1)/2
b) N
c) N(N+1)/2
d) N/2
View Answer
Explanation: The number of keys required would be N(N-1)/2, similar to that of a mesh topology network connection (each node is connection line requires a key).
2. For 1000 nodes in IP level, how many keys would be required?
a) 499000
b) 499500
c) 500500
d) 500000
View Answer
Explanation: Use N(N-1)/2 where N=1000.
3. Communication between end systems is encrypted using a key, often known as
a) temporary key
b) section key
c) line key
d) session key
View Answer
Explanation: The key is referred to as session key.
4. Session keys are transmitted after being encrypted by
a) make-shift keys
b) temporary keys
c) master keys
d) section keys
View Answer
Explanation: Each node has a master key which it uses to receive the session key.
5. For a network with N nodes, how many master keys are present?
a) N(N-1)/2
b) N
c) N(N+1)/2
d) N/2
View Answer
Explanation: Each node has a master key to receive the session keys from the Key Distribution Centre (KDC).
6. PDU stands for
a) Protocol data unit
b) Pre data underscore
c) Permuted data unity
d) Protocol data untiy
View Answer
Explanation: In key management, PDU stands for Protocol data unit.
7. SSM stands for
a) Secure Security Module
b) Session Security Module
c) Service Session Module
d) Session Service Module
View Answer
Explanation: SSM stands for Session Security Module.
8. Which is the last step in establishing a connection between hosts using the SSM?
a) Interaction/ Handshaking between the SSM and the KDC
b) Establishment of the connection
c) Release of connection request packet
d) SSM saves the packet and applies to the KDC for connection permission
View Answer
Explanation: The correct order of execution is – (d,b,a,c)
Sanfoundry Global Education & Learning Series – Cryptography and Network Security.
To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Apply for Computer Science Internship
- Check Cryptography and Network Security Books
- Check Computer Science Books
- Practice Cyber Security MCQ
- Practice Computer Science MCQs