Unit No. 3: Important Questions
Q.1 Explain arbitrated and direct digital
signature?
Q.2 Explain the RSA and DSS approach to digital signature?
Q.3 Explain the DSA algorithm?
Q.4 Give the overview
of Kerberos?
Q.5 Explain Difference
between kerberos 4 and kerberos
5 ?
Q.6 Explain X.509 certification formats?
Q.7 Define Digital signature? Explain the properties of Digital Signature?
Q.8 Mention Differences between arbitrated and direct digital signature?
Q.8 Define Kerberos? Explain the Requirements of Kerberos?
1. CA stands
for
A.
Certified Auditing
B.
Certification
Authorities.
C.Cyper Abuses
D. Certified Automation.
2. A
hash function guarantees integrity of a message.
It guarantees that message has not
be
.
A. Replaced
B. Over view
C. Changed
D.
Left
3. MAC stands for .
A. message authentication code
B. message authentication connection
C. message authentication control
D. message authentication cipher
4. if any participant can send his or her public key to any other participant or broadcast the key to the
community at large then this technique of key distribution is called as .
A. Publicly available directory
B. Public announcement
C.
Public-key authority
D.
Public-key certificates
5. Maintenance
and distribution of the public directory would have to be the responsibility of
some trusted entity or organization in this technique of key distribution is called .
A. Publicly available directory
B. Public announcement
C. Public-key authority
D. Public-key certificate
A. A
function that maps a message of any length into a variable-length hash value,
which serves as the authenticator
B. A function that maps a message of any length into a fixed-length hash value, which serves as the authenticator
C. Both A & B.
D.
None of the above.
7.MAC = C(K, M), where K = .
A. shared secret key
B. shared public key.
C. Shared private key.
D. None of the above
8. A variety
of approaches has been proposed for the digital signature function. These
approaches fall into two categories .
A. direct and arbitrated
B.
Indirect and arbitrated
C.
Direct and indirect
D. None of the above
9.
A digital signature needs a(n) system.
A.
symmetric key
B.
asymmetric key
C. public key
D. None of the above
10. Digital signature provides .
A.
authentication
B.
nonrepudiation
C.
both a and b
D. neither a nor b
11. A signature is included in the document; a signature is a separate entity.
A.
conventional;
digital
B.
digital; digital
C. either
a or b
D.
either a or b
12. In Kerberos
,AS referred as .
A. Authorization Service
B.
Authentication
Service
C.
Authentication
Server
D.
None of the above
13. In Kerberos ,TGS referred as .
A. Ticket granting Server
B.
Token getting Server
C. Target getting
Service
D.
None of the above
14. In Kerberos ,AS requests from user.
A. Ticket granting ticket
B.
Token gaining ticket
C. Ticket granting
Token
D.
None of the above
15..Kerberos , TGS requests from user.
A. Service granting
ticket
B.
Ticket granting ticket
C. Ticket granting
token
D.
Token gaining ticket
16.
In X.509 certificate , Consists of two dates: the
first and last on which the certificate
is valid.
A.
Signature algorithm identifier
B.
Period of validity
C. Issuer unique identifier
D. Subject unique identifier
17. in X.509 certificate do the following task that , An optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.
A. Signature algorithm identifier.
B. Period of validity
C.
Issuer unique identifier
D. Subject unique identifier
Post a Comment