option
Questions
ayuda
daypo
search.php

CS634

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CS634

Description:
Network Security

Creation Date: 2025/06/01

Category: University

Number of questions: 58

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

What type of cryptography uses a single key for both encryption and decryption?. a) Asymmetric cryptography. b) Symmetric cryptography. c) Public-key cryptography. d) Private-key cryptography.

Which of the following is a common symmetric encryption algorithm?. a) RSA. b) DSA. c) AES. d) Diffie-Hellman.

Which of the following is a common use case for symmetric cryptography?. a) Securely transmitting a public key. b) Digitally signing documents. c) Encrypting large amounts of data. d) Authenticating users.

What type of cryptography uses a pair of keys, a public key and a private key?. a) Symmetric cryptography. b) Asymmetric cryptography. c) Public-key cryptography. d) Private-key cryptography.

Which of the following is a common asymmetric encryption algorithm?. a) AES. b) DES. c) RSA. d) Blowfish.

What is the primary advantage of asymmetric cryptography?. a) Faster performance. b) Easier key distribution. c) Stronger security. d) Simpler implementation.

Which of the following is a common use case for asymmetric cryptography?. a) Encrypting large data files. b) Securing wireless network traffic. c) Digitally signing emails. d) Protecting passwords.

What is a hybrid cryptosystem?. a) A system that uses only symmetric encryption. b) A system that uses only asymmetric encryption. c) A system that combines symmetric and asymmetric encryption. d) A system that uses a combination of classical and modern cryptography.

What is the purpose of a digital certificate?. To encrypt data. To decrypt data. To verify the identity of a user or system. To generate random numbers.

What is a key exchange protocol?. a) A method for distributing public keys. b) A method for distributing private keys. c) A method for securely exchanging cryptographic keys. d) A method for generating random numbers.

What is the role of a certificate authority (CA)?. a) To issue digital certificates. b) To revoke digital certificates. c) To verify the authenticity of digital certificates. d) All of the above.

What is the difference between a block cipher and a stream cipher?. a) Block ciphers encrypt data one bit at a time, while stream ciphers encrypt data in blocks. b) Block ciphers encrypt data in blocks, while stream ciphers encrypt data one bit at a time. c) Block ciphers are more secure than stream ciphers. d) Stream ciphers are more secure than block ciphers.

What is the purpose of a cryptographic hash function?. a) To encrypt data. b) To decrypt data. c) To generate a digital signature. d) To create a fixed-size hash value from input data.

What is a denial-of-service (DoS) attack?. a) A type of attack that tries to guess the password or key by systematically trying all possible combinations. b) A type of attack that exploits vulnerabilities in the software or hardware. c) A type of attack that intercepts and modifies communication between two parties. d) A type of attack that floods a system with traffic to overload it.

Which of the following is a fundamental security service?. a) Authentication. b) Encryption. c) Data Loss Prevention. d) Debugging.

What does confidentiality ensure in information security?. a) Information is accessible to authorized users only. b) Data is accurate and trustworthy. c) Unauthorized changes to data are prevented. d) System services are not interrupted.

What is the main purpose of integrity in security services?. a) To prevent System services are not interrupted. b) To ensure data is accurate and unchanged. c) To provide a backup of all data. d) To encrypt sensitive information.

Which of the following represents availability in security services?. a) Authorized users can access systems when needed. b) Preventing unauthorized access to systems. c) Encrypting sensitive information. d) Ensuring data authenticity.

Which security service ensures that an entity cannot deny its actions?. a) Authentication. b) Non-repudiation. c) Confidentiality. d) Availability.

What is the key goal of cryptographic encryption in security services?. a) Ensuring high performance of systems. b) Keeping data confidential. c) Guaranteeing system uptime. d) Backing up data.

What type of security ensures that the source of data can be verified?. a) Availability. b) Authentication. c) Integrity. d) Confidentiality.

In a public-key encryption system, what is the private key used for?. a) Encrypting messages. b) Decrypting messages. c) Managing network resources. d) Sending emails.

Which security service is achieved using digital signatures?. a) Availability. b) Integrity. c) Non-repudiation. d) Both b and c.

What is a Denial of Service (DoS) attack designed to affect?. a) Integrity. b) Availability. c) Confidentiality. d) Authentication.

Which technique is used to ensure data confidentiality?. a) Hashing. b) Digital Signatures. c) Encryption. d) Firewall.

What is the role of a Certificate Authority (CA) in security services?. a) Encrypting data. b) Validating and issuing digital certificates. c) Monitoring network traffic. d) Ensuring system availability.

What is the main purpose of hashing in security?. a) Data compression. b) Data encryption. c) Data integrity verification. d) Access control.

Which of these ensures secure key exchange between two parties?. a) Symmetric key encryption. b) Public key infrastructure (PKI). c) Simple Mail Transfer Protocol (SMTP). d) Secure File Transfer Protocol (SFTP).

What is the primary purpose of key management?. a) Encrypt data. b) Manage cryptographic keys throughout their lifecycle. c) Generate random numbers. d) Hash passwords.

Which of the following is NOT a key management phase?. a) Key generation. b) Key storage. c) Key multiplication. d) Key destruction.

What is a master key used for?. a) Encrypting bulk data. b) Encrypting session keys. c) Storing user passwords. d) Signing digital certificates.

What is the characteristic of a session key?. a) It is long-term. b) It is used for a specific communication session. c) It is asymmetric. d) It cannot be revoked.

How is a session key typically shared in symmetric encryption?. a) Through a trusted third party. b) In plaintext. c) Using a master key. d) By embedding it in the data.

Why is a session key preferred for bulk data encryption?. a) It is easier to manage. b) It is faster than a master key. c) It ensures data integrity. d) It is asymmetric.

What is a common solution for symmetric key distribution in large networks?. a) Manual key sharing. b) Centralized key management system. c) Key splitting. d) Digital signature.

What is a decentralized key distribution system?. a) A system where no keys are shared. b) A system where keys are distributed without relying on a central authority. c) A system where only one master key is used. d) A system based on physical key exchange.

How are public keys typically distributed?. a) By email. b) Through digital certificates. c) Using physical tokens. d) Through symmetric encryption.

What is the role of a certificate authority (CA)?. a) Encrypting data. b) Issuing and verifying digital certificates. c) Managing symmetric keys. d) Authenticating users.

What is the purpose of a public key signature?. a) To encrypt data. b) To verify the integrity of the public key. c) To authenticate users. d) To revoke the public key.

What mechanism ensures that a public key belongs to the intended owner?. a) Key splitting. b) MAC. c) Certificate validation. d) Hashing.

What information does a digital certificate NOT include?. a) Public key. b) Certificate issuer. c) Private key. d) Validity period.

Which of the following is an example of a passive network threat?. a) Denial of service. b) Eavesdropping. c) Malware installation. d) Spoofing.

What is malware?. a) A type of software patch. b) A harmful software designed to damage systems. c) A legitimate software update. d) An internet protocol.

What is a computer virus?. a) Self-replicating malware requiring user action. b) Malware that spreads without user action. c) A type of antivirus software. d) A legitimate software component.

How do viruses typically spread?. a) Through phishing attacks only. b) Through infected files and email attachments. c) Through encrypted communication channels. d) Through legitimate updates.

What is a computer worm?. a) Malware that infects files and requires user action to spread. b) Malware that self-replicates and spreads without user intervention. c) A harmless system utility. d) A type of ransomware.

How does a worm differ from a virus?. a) A worm attaches to files while a virus spreads on its own. b) A worm spreads autonomously while a virus requires user action. c) Worms and viruses are identical in function. d) Worms are hardware threats.

What is a Trojan horse?. a) A program that replicates itself. b) Malicious software disguised as legitimate software. c) A program that encrypts data. d) Malware that self-destructs.

How are Trojans typically distributed?. a) Through phishing emails and fake software updates. b) Through legitimate software downloads. c) Automatically by operating systems. d) Via hardware defects.

What distinguishes a Trojan from a virus?. a) Trojans self-replicate; viruses do not. b) Trojans disguise themselves as legitimate programs. c) Trojans only infect email accounts. d) Trojans encrypt entire networks.

Which of the following is a common goal of Trojans?. a) Data theft or backdoor access. b) Preventing malware installation. c) Encrypting email communications. d) Protecting user privacy.

How can users protect themselves from Trojans?. a) Avoiding unverified downloads and enabling firewalls. b) Disabling antivirus software. c) Sharing passwords across multiple accounts. d) Disconnecting from the internet permanently.

Which component of the Security Trinity focuses on preventing unauthorized access to information?. a) Integrity. b) Confidentiality. c) Availability. d) Authentication.

Which of the following is NOT part of the Security Trinity?. a) Confidentiality. b) Integrity. c) Redundancy. d) Availability.

What is the main goal of confidentiality?. a) Ensuring system uptime. b) Ensuring data accuracy. c) Preventing unauthorized access to sensitive information. d) Monitoring user activities.

Which technology is most commonly used to maintain confidentiality?. a) Firewalls. b) Encryption. c) Load balancing. d) Data replication.

What is a common method to verify data integrity?. a) Hashing. b) Encryption. c) Firewall rules. d) Data replication.

Which tool helps ensure data integrity during transmission?. a) Digital signatures. b) Load balancers. c) Antivirus software. d) Data redundancy.

Report abuse