Question : Which property of network security ensures that data remains unchanged during transmission?
Solution :
Correct Answer : Integrity
Description -
Question : Which of the following attacks involves intercepting communication between two parties without their knowledge?
Solution :
Correct Answer : Man-in-the-Middle (MITM)
Description -
Question : Which network security tool is primarily responsible for monitoring and blocking unauthorized traffic based on predefined rules?
Solution :
Correct Answer : Firewall
Description -
Question : In which cryptographic method does the sender use a public key and the receiver uses a private key to decrypt data?
Solution :
Correct Answer : Public Key Cryptography
Description -
Question : Which of the following ensures that a sender cannot deny sending a message?
Solution :
Correct Answer : Non-repudiation
Description -
Question : Which of the following algorithms is commonly associated with public key cryptography?
Solution :
Correct Answer : RSA
Description -
Question : In asymmetric encryption, which key is used by the sender to encrypt data?
Solution :
Correct Answer : Public key of receiver
Description -
Question : Which of the following is a major challenge of symmetric encryption?
Solution :
Correct Answer : Key distribution problem
Description -
Question : In symmetric (secret key) encryption, which statement is correct?
Solution :
Correct Answer : Same key is used for both encryption and decryption
Description -
Question : Which of the following best defines the primary goal of computer network privacy?
Solution :
Correct Answer : Making data unreadable to unauthorized users
Description -
Question : Which statement is NOT correct about digital signatures?
Solution :
Correct Answer : They ensure confidentiality of the message by default
Description -
Question : What will happen if the two digests (sender and receiver) do NOT match during verification?
Solution :
Correct Answer : Message has been altered or signature is invalid
Description -
Question : Why is a message digest (hash) used instead of signing the entire message?
Solution :
Correct Answer : To reduce computational cost and improve efficiency
Description -
Question : In a digital signature system, which key is used by the sender to sign the message?
Solution :
Correct Answer : Sender’s private key
Description -
Question : Which of the following security aspects are primarily achieved using a digital signature?
Solution :
Correct Answer : Integrity, Authentication, and Non-repudiation
Description -
Question : Which concept in PGP replaces centralized certificate authorities?
Solution :
Correct Answer : Web of Trust
Description -
Question : In PGP, how is the session key securely transmitted to the receiver?
Solution :
Correct Answer : Encrypted with receiver’s public key
Description -
Question : Why does PGP use a session key?
Solution :
Correct Answer : To improve speed using symmetric encryption
Description -
Question : In PGP, the digital signature is created by:
Solution :
Correct Answer : Encrypting the hash with sender’s private key
Description -
Question : Which combination of techniques is used by PGP to ensure security?
Solution :
Correct Answer : Symmetric + Asymmetric + Hashing
Description -