solution - Computer Network : Network Security (Test 1)

Question : Which property of network security ensures that data remains unchanged during transmission?

Solution :
220020260403094440 Correct Answer : Integrity

Description -

Computer Network : Network Security (Test 1)

Question : Which of the following attacks involves intercepting communication between two parties without their knowledge?

Solution :
77220260403094403 Correct Answer : Man-in-the-Middle (MITM)

Description -

Computer Network : Network Security (Test 1)

Question : Which network security tool is primarily responsible for monitoring and blocking unauthorized traffic based on predefined rules?

Solution :
531420260403094320 Correct Answer : Firewall

Description -

Computer Network : Network Security (Test 1)

Question : In which cryptographic method does the sender use a public key and the receiver uses a private key to decrypt data?

Solution :
437120260403094240 Correct Answer : Public Key Cryptography

Description -

Computer Network : Network Security (Test 1)

Question : Which of the following ensures that a sender cannot deny sending a message?

Solution :
836720260403094135 Correct Answer : Non-repudiation

Description -

Computer Network : Network Security (Test 1)

Question : Which of the following algorithms is commonly associated with public key cryptography?

Solution :
144220260403093937 Correct Answer : RSA

Description -

Computer Network : Network Security (Test 1)

Question : In asymmetric encryption, which key is used by the sender to encrypt data?

Solution :
893320260403093850 Correct Answer : Public key of receiver

Description -

Computer Network : Network Security (Test 1)

Question : Which of the following is a major challenge of symmetric encryption?

Solution :
13020260403093809 Correct Answer : Key distribution problem

Description -

Computer Network : Network Security (Test 1)

Question : In symmetric (secret key) encryption, which statement is correct?

Solution :
970720260403093738 Correct Answer : Same key is used for both encryption and decryption

Description -

Computer Network : Network Security (Test 1)

Question : Which of the following best defines the primary goal of computer network privacy?

Solution :
707220260403093648 Correct Answer : Making data unreadable to unauthorized users

Description -

Computer Network : Network Security (Test 1)

Question : Which statement is NOT correct about digital signatures?

Solution :
856720260403093538 Correct Answer : They ensure confidentiality of the message by default

Description -

Computer Network : Network Security (Test 1)

Question : What will happen if the two digests (sender and receiver) do NOT match during verification?

Solution :
324420260403093456 Correct Answer : Message has been altered or signature is invalid

Description -

Computer Network : Network Security (Test 1)

Question : Why is a message digest (hash) used instead of signing the entire message?

Solution :
648420260403093415 Correct Answer : To reduce computational cost and improve efficiency

Description -

Computer Network : Network Security (Test 1)

Question : In a digital signature system, which key is used by the sender to sign the message?

Solution :
463320260403093338 Correct Answer : Sender’s private key

Description -

Computer Network : Network Security (Test 1)

Question : Which of the following security aspects are primarily achieved using a digital signature?

Solution :
235920260403093243 Correct Answer : Integrity, Authentication, and Non-repudiation

Description -

Computer Network : Network Security (Test 1)

Question : Which concept in PGP replaces centralized certificate authorities?

Solution :
948020260403093114 Correct Answer : Web of Trust

Description -

Computer Network : Network Security (Test 1)

Question : In PGP, how is the session key securely transmitted to the receiver?

Solution :
72820260403093025 Correct Answer : Encrypted with receiver’s public key

Description -

Computer Network : Network Security (Test 1)

Question : Why does PGP use a session key?

Solution :
491920260403092858 Correct Answer : To improve speed using symmetric encryption

Description -

Computer Network : Network Security (Test 1)

Question : In PGP, the digital signature is created by:

Solution :
190120260403092736 Correct Answer : Encrypting the hash with sender’s private key

Description -

Computer Network : Network Security (Test 1)

Question : Which combination of techniques is used by PGP to ensure security?

Solution :
193820260403092642 Correct Answer : Symmetric + Asymmetric + Hashing

Description -

Computer Network : Network Security (Test 1)