303 - NETWORK SECURITY

MULTIPLE CHOICE QUESTIONS

1. The MD5 is a message digest algorithm developed by ______.

a. Ron Rivest.

b. WhiteField Diffie.

c. Martin Hellman.

d. Diffie-Hellman.

Answer: A.

2. The original message digest algorithm is called as ______.

a. MAC.

b. SHA.

c. MD.

d. DSA.

Answer: C.

3. MD5 is quite fast and produces ______message digests.

a. 512 bits.

b. 1024 bits.

c. 128 bits.

d. 64 bits.

Answer: C.

4. The first step of MD5 is ______.

a. add padding bits to original messsge.

b. adding append length bits.

c. divide the input into 512 bit blocks.

d. compression.

Answer: A.

5. In MD5, the process block divides the 512 bits into ______sub blocks.

a. 16.

b. 24.

c. 32

d. 84.

Answer: A.

6. Which financial institutions have a relationship with merchants for processing payment

card authorizations and payments?

a. Issuer.

b. Acquirer.

c. Merchant.

d. Dealer.

Answer: B.163E-NETWORK SECURITY

2

7. Which of the following contains the order information such as which items are being

purchased?

a. PI.

b. OI.

c. MD.

d. DS.

Answer: B.

8. The purchase request exchange is made up of ______messages.

a. 2.

b. 3.

c. 4.

d. 5.

Answer: C.

9. The payment gateway sends back an ______message to the merchant.

a. authorization response.

b. request.

c. no response.

d. acknowledgement.

Answer: A.

10. Payment information can be encrypted by using ______.

a. customer’s private key.

b. merchant public key.

c. one-time session key.

d. customer’s public key.

Answer: C.

11. Digital signature envelope is decrypted by using ______.

a. merchant private key.

b. payment’s private key.

c. payment public key.

d. merchant’s public key.

Answer: B.

12. ______will ensure the merchant and their payment information.

a. Digital certificate.

b. Merchant.

c. Dual signature.

d. Certificate authority.

Answer: C.

13. SET provides an authentication with the help of ______.

a. dual signature.

b. digital certificate.

c. payment’s public key.

d. payment’s private key.

Answer: B.163E-NETWORK SECURITY

3

14. ______helps in ensuring non-fraudulent transactions on the web.

a. Certificate authority

b. Digital authority.

c. Dual authority.

d. Digital signature.

Answer: A.

15. SSL is placed in between the ______layers.

a. transport & datalink.

b. application & presentation.

c. application & transport.

d. application & session.

Answer: C.

16. SSL is used to encrypt the ______.

a. L5 data.

b. L4 data.

c. L3 data.

d. L2 data.

Answer: A.

17. SSL provides only ______.

a. authentication.

b. confidentiality.

c. integrity.

d. durability.

Answer: A.

18. ______are very crucial for success of RSA algorithm.

a. Integers.

b. Prime numbers.

c. Negative number.

d. Fraction.

Answer: B.

19. In the basic TCP/IP protocol suite, the number of layers used are ______.

a. 4.

b. 6.

c. 5.

d. 7.

Answer: A.

20. Physical layer transmits the data in TCP/IP as ______.

a. packets.

b. pulse codes.

c. data.

d. bits.

Answer: B.163E-NETWORK SECURITY

4

21. S/MIME stands for ______.

a. standard multipurpose internet mail extensions.

b. secure multipurpose internet mail extensions.

c. secure multipurpose international mail extensions.

d. standard multipurpose international mail extensions.

Answer: B.

22. ______uniquely identifies the MIME entities uniquely with reference to multiple

contexts.

a. Content description.

b. Content -id.

c. Content type.

d. Content transfer encoding.

Answer: B.

23. The processed S/MIME along with security related data is called as ______.

a. public key cryptography standard.

b. private key cryptography standard.

c. S/MIME.

d. MIME.

Answer: A.

24. In S/MIME,MLA stands for ______.

a. mailing list agent.

b. multipurpose list agent.

c. mail lock agent.

d. message link agent.

Answer: A.

25. The cryptography algorithms used in S/MIME are ______.

a. IDEA.

b. RC4.

c. RSA,DES-3.

d. RC5.

Answer: C.

26. The ______acts as financial institutions who provides a payment card to a card

holder.

a. payment gateway.

b. card holder.

c. acquirer.

d. issuer.

Answer: D.

27. Who will be responsible for processing the payment from the customer’s account to

the merchant account?

a. Acquirer.

b. Merchant.

c. Issuer.

d. Payment gateway.

Answer: D.163E-NETWORK SECURITY

5

28. The cardholder combines the PIMD and OIMD and hashes them together to form

______.

a. OPMD.

b. POMD.

c. MD.

d. DS.

Answer: B.

29. Which process will ensure that the issues of the credit card is an approved

transactions?

a. Payment capture.

b. Payment authorization.

c. Purchase request.

d. Purchase reply.

Answer: B.

30. ______is used for hiding the payment information from the merchant.

a. SET.

b. SSL.

c. SHTTP.

d. TSP.

Answer: A.

31. ______is a block cipher.

a. DES.

b. IDEA.

c. AES.

d. RSA.

Answer: A.

32. DES encrypts data in block size of ______bits each.

a. 64.

b. 128.

c. 32.

d. 56.

Answer: A.

33. Merkle and Hellman introduced the concept of ______.

a. meet in middle attack.

b. meet in attack.

c. hijack.

d. virus attacks.

Answer: A.

34. Data Encryption Standard also called as ______.

a. Data Encryption Algorithm.

b. Double DES.

c. AES.

d. RSA.

Answer: A.163E-NETWORK SECURITY

6

35. ______is generally used in ECB,CBC, or CFB mode.

a. DES

b. AES

c. IDEA

d. RSA.

Answer: A.

36. DES consists of ______rounds to perform the substitution and transposition

techniques.

a. 16.

b. 18.

c. 21.

d. 25.

Answer: A.

37. ______is the first step in DES.

a. Key transformation.

b. Expansion permutation.

c. S-box substitution.

d. P-box substitution.

Answer: A.

38. ______substitution is a process that accepts 48 bits from the XOR operation.

a. S-box.

b. P-box.

c. Expansion permutations.

d. Key transformation.

Answer: A.

39. ______refers more to asymmetric key cryptography.

a. Timing attack.

b. Meet in middle attack.

c. Virus attack.

d. Worms attack.

Answer: A.

40. Eli Biham & Adi Shamir introduced ______.

a. differential & linear cryptoanalysis.

b. Double DES.

c. DES.

d. RSA.

Answer : A.

41. Electronic money is also called as ______.

a. digital cash.

b. internet cash.

c. eucash.

d. physical cash.

Answer: A.163E-NETWORK SECURITY

7

42. The physical form of money is converted into ______.

a. octal form.

b. hexadecimal.

c. decimal.

d. binary form.

Answer: D.

43. The bank ______the customer’s message after getting the email request for emoney.

a. integrate.

b. access.

c. authenticates.

d. non-repudiate.

Answer: C.

44. The encryption of an original message can be done ______.

a. only once.

b. twice.

c. thrice.

d. many times.

Answer: B.

45. Customer uses ______key for decryption.

a. public key.

b. private key.

c. secret key.

d. hash key.

Answer: B.

46. E-money is classified into ______types.

a. 3.

b. 2.

c. 4.

d. 5.

Answer: B.

47. The bank can trace the transaction using ______money.

a. anonymous.

b. identified.

c. physical.

d. rational.

Answer: B.

48. In anonymous e-money ______factor is used to encrypt the random number.

a. blinded.

b. prince.

c. prime.

d. anonymity.

Answer: A.