Cryptography And Network Security MCQs

Cryptography And Network Security MCQs

The following Cryptography And Network Security MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of Cryptography And Network Security. We encourage you to answer these multiple-choice questions to assess your proficiency.
Please continue by scrolling down.

1: A ________ network can contain servers as well as individual computers

A.   Client/server

B.   Switch

C.   Peer-to-peer

D.   Distributed

2: A ________ sends data between two networks.

A.   Repeater

B.   Switch

C.   Bridge

D.   Router

3: When a wireless client is passively scanning for a bss to join they are listening for a __________.

A.   Request to Send Frame

B.   Probe Response Frame

C.   Probe Request Frame

D.   Beacon Management Frame

4: A __________ is a system that protects the computer network from unauthorized access.

A.   Lock

B.   Guard

C.   Shield

D.   Firewall

5: What is cryptography?

A.   The study of network security protocols

B.   The process of securing data transmission over a network

C.   The science of encrypting and decrypting information

D.   The analysis of network traffic patterns

6: Which cryptographic technique uses a single secret key for both encryption and decryption?

A.   Symmetric key cryptography

B.   Asymmetric key cryptography

C.   Hash function cryptography

D.   Public key cryptography

7: What is the main purpose of using a digital signature in network security?

A.   To encrypt data for secure transmission

B.   To provide authentication and non-repudiation

C.   To ensure the integrity of data during transmission

D.   To prevent denial-of-service attacks

8: Which encryption algorithm is commonly used for secure web communication (HTTPS)?

A.   RSA

B.   AES

C.   DES

D.   TLS/SSL

9: Which of the following is a common application of public key cryptography?

A.   Digital signatures

B.   Data encryption for secure communication

C.   Key exchange for secure communication

D.   Hashing passwords for storage

10: What is a brute-force attack in the context of network security?

A.   A type of malware that spreads rapidly across a network

B.   An attack that involves exploiting software vulnerabilities

C.   A method of attempting all possible combinations of a cryptographic key to decrypt encrypted data

D.   A denial-of-service attack that overwhelms a network with traffic

11: Which of the following protocols provides secure communication over a network and is commonly used for VPNs?

A.   HTTP

B.   IPsec

C.   FTP

D.   OpenVPN

12: What is the purpose of a firewall in network security?

A.   To encrypt data for secure transmission

B.   To prevent unauthorized access and control network traffic

C.   To authenticate users on the network

D.   To monitor network traffic for malicious activity

13: Which cryptographic hash function is commonly used for password storage?

A.   MD5

B.   SHA-1

C.   SHA-256

D.   bcrypt

14: In a public key infrastructure (PKI), what role does a Certificate Authority (CA) play?

A.   It encrypts data for secure communication

B.   It issues digital certificates to authenticate and verify the identity of users and devices

C.   It manages the network firewall

D.   It encrypts and decrypts data using public and private keys