In the name of ALLAH, the most beneficient, the most merciful

Network Security (CS707)

Multiple Choice Questions (MCQs)

 

Objective Questions

Question

A device used by the ancient Greeks used as a cipher to communicate during military campaigns is called __________.

Answer: Chapter No.  

Question

DES, 3DES, and AES are examples of __________.

Answer: Chapter No.  

Question

Examples of asymmetric key algorithms are __________.

Answer: Chapter No.  

Question

At a minimum, PKI consists of __________.

Answer: Chapter No.  

Question

Two instances of the same key are used while encrypting and decrypting messages by the sender and receiver in __________.

Answer: Chapter No.  

Question

A digital signature is best described as __________.

Answer: Chapter No.  

Question

A zero-day exploit is __________.

Answer: Chapter No.  

Question

The three most serious application security risks are considered to be _________.

Answer: Chapter No.  

Question

The standard used in digital certificates that defines its structure, fields, and values is __________.

Answer: Chapter No.