In the name of ALLAH, the most beneficient, the most merciful

Network Security (CS707)

Multiple Choice Questions (MCQs)

Objective Questions

  1. Two instances of the same key are used while encrypting and decrypting messages by the sender and receiver in __________.

  2. The standard used in digital certificates that defines its structure, fields, and values is __________.

  3. A digital signature is best described as __________.

  4. Examples of asymmetric key algorithms are __________.

  5. A zero-day exploit is __________.

  6. At a minimum, PKI consists of __________.

  7. DES, 3DES, and AES are examples of __________.

  8. The three most serious application security risks are considered to be _________.

  9. A device used by the ancient Greeks used as a cipher to communicate during military campaigns is called __________.