ensures
Network Security Quiz
Test your knowledge on network security concepts, cryptography, and data protection techniques. This quiz features 45 well-crafted questions that cover a range of topics, from encryption methods to security requirements. Perfect for students, educators, and professionals alike!
Key Features:
- 45 multiple-choice questions
- Instant feedback on answers
- Improve your understanding of security protocols
1-RFC 2828 ensures adequate security of the systems or of data transfers
True
False
2-Involve algorithms and secret info it is the considered as security challenge
True
False
3-Whats is message integrity in the network security ?
Message not altered without detection
Confirm identity
Decrypts message
Services must be accessible and available to users
4-The one of a secure communication Requirements is
Confidentiality
Availability
Encryption
Message Integrity
5-The one of Cryptography Components
Secrecy
Authentication
Confidentiality
Availability
6-Examples of the availability in the security requirements
Bank accounts
Authentication service
Bills
Patient information
7-Removing sender or receiver, inserting himself in place
Denial of service
Impersonation
Eavesdrop
Hijacking
8-One of the Key of Security Concepts
Cryptography
Secrecy
Authentication
Confidentiality
9-Single mechanism could be support all services required
True
False
10-Security labels it is the one of the pervasive security mechanisms
True
False
11-Encipherment it the one of the pervasive security mechanisms
True
False
12-Info used in cipher known only to sender and receiver
Key
Algorithm
Decipher
Encipher
13-in the Public Key Encryption we generates 2 keys
True
False
14-In the Symmetric Encryption Principles the encryption scheme has 6 ingredients
True
False
15-Scrambled message produced
Plaintext
Secret key
Decryption algorithm
Ciphertext
16-Attacker can be decrypt the Ciphertext by
Several knowledge of the plaintext
Deduce the secret key
Cryptanalysis
Ciphertext samples
17-Decryption algorithm are essentially the encryption algorithm run in forward .
True
False
18-Same key is used for encryption & decryption the algorithm is called
Public Key
Cipher
Asymmetric
Symmetric
19-Plaintext message is encrypted and decrypted with Key (ab)
Asymmetric encryption
Public Key Encryption
Symmetric encryption
Authentication
20-security of symmetric encryption depends on the secrecy of the algorithm
True
False
21-Whats is the Ciphertext mean ?
Algorithm
Transforming plaintext to ciphertext
Coded message
Original message
22-The primary goal for Network administrator
Secure the network’s servers
Secure the network’s infrastructure
Secure the network’s Software
Secure the network’s Routers
23-Homophone Codes Example of Polyalphabetic codes
True
False
24-One of the creating cipher text method
OTP
Secret Key
Encryption Algorithm
Implement security controls
25-PIN similar to
Authentication
Integrity
Confidentiality
Confidentiality
26-Transposition are the methods of creating cipher text
True
False
27-The different key shift is identified using a privet key between sender and receiver
True
False
28-Readable data is called
E-Text
Decrypt a message
Plaintext
Ciphertext
29-LAN can be secured by
Hardware
Hardware\Software
Firewall features
Firewall Devices
30-Replacing each character of the clear text by one or more symbols
Block permutations
Cryptology
Permutations of columns
Simple principle
31-The key length refers to
Data size
Data lingth
Data type
Size of the encryption key
32-The bifid alphabet matrix must be square
True
False
33-In the bifid codes we reading the indices vertically
True
False
34-Shorter key lengths mean slower execution
True
False
35-What is the numeric code of the keyword MONEY
24315
24351
42315
42351
36-The Polyalphabetic codes using Caesar table to encrypt the characters
True
False
37-What kind of Transposition that using swapping the message from the keyword
Alphabets transposed
Block permutations
Simple principle
Permutations of columns
38-In Symmetric Algorithms, which Algorithm use rotated by three letters
Polyalphabetic Cipher
Monoalphabetic Cipher
Vigenere Cipher
Caesar Cipher
39-Algorithms that using separation of a message into blocks
Simple principle
Block permutations
Alphabets transposed
Permutations of columns
40-Algorithms that using transposition as part of it
DES
DSE
AES
RSA
41-In Symmetric Algorithms, which Algorithm use pairing letters
Polyalphabetic Cipher
Caesar Cipher
Monoalphabetic Cipher
Vigenere Cipher
42-Replacing each character of the clear text by one or more symbols
Simple principle
Cryptology
Permutations of columns
Block permutations
43-In Symmetric Algorithms, which Algorithm use sequence of monoalpabetic
Polyalphabetic Cipher
Caesar Cipher
Cyphers Cipher
Monoalphabetic Cipher
44-Transposition method write plain message in a matrix from left to right and top to bottom
Permutations of columns
Alphabets transposed
Simple principle
Block permutations
wahts the cryptogram order matrix
cryptogram = AI RIELEKBRTMBOO IP
I M A K
E B I B
L I O R
E P O R T
2-4-5-3-1
4-2-5-3-1
4-1-5-3-2
4-2-3-5-1
{"name":"ensures", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on network security concepts, cryptography, and data protection techniques. This quiz features 45 well-crafted questions that cover a range of topics, from encryption methods to security requirements. Perfect for students, educators, and professionals alike!Key Features:45 multiple-choice questionsInstant feedback on answersImprove your understanding of security protocols","img":"https:/images/course5.png"}