Unit No. 3: Important Questions

 Unit No. 3: Important Questions

Q.1  Explain arbitrated and direct digital signature?

Q.2 Explain the RSA and DSS approach to digital signature?

Q.3  Explain the DSA algorithm?

Q.4  Give the overview of Kerberos?

Q.5  Explain Difference between kerberos 4 and kerberos 5 ?

Q.6  Explain X.509 certification formats?

Q.7  Define Digital signature? Explain the properties of Digital Signature?

Q.8  Mention Differences between arbitrated and direct digital signature?

Q.8 Define Kerberos? Explain the Requirements of Kerberos?


1. CA stands for                             

A.   Certified Auditing

B.    Certification Authorities.

            C.Cyper Abuses

          D.   Certified Automation.

2. A  hash function guarantees integrity of a message. It guarantees that message has not be

                                        .

 

A.   Replaced

B.   Over view

C.   Changed

D.   Left

 

3. MAC stands for                                        .

A.   message authentication code

B.   message authentication connection

C.   message authentication control

D.   message authentication cipher


4. if any participant can send his or her public key to any other participant or broadcast the key to the community at large then this technique of key distribution is called as                                     .

 

A.   Publicly available directory

B.   Public announcement

C.   Public-key authority

D.   Public-key certificates

 

5. Maintenance and distribution of the public directory would have to be the responsibility of some trusted entity or organization in this technique of key distribution is called                                                                        .

 

A.   Publicly available directory

B.   Public announcement

C.   Public-key authority

D.   Public-key certificate


6. Hash function is a                                                .

A.   A function that maps a message of any length into a variable-length hash value, which serves as the authenticator

B.   A function that maps a message of any length into a fixed-length hash value, which serves as the authenticator

C.   Both A & B.

D.     None of the above.

 

7.MAC = C(K, M), where K =                              . 

        A.   shared secret key

        B.   shared public key.

            C.   Shared private key.

            D.    None of the above

8. A  variety of approaches has been proposed for the digital signature function. These approaches fall into two categories                                                                                               .

         A.   direct and arbitrated

B.   Indirect and arbitrated

C.   Direct and indirect

D.    None of the above


9.    A digital signature needs a(n)             system.

A.   symmetric key

            B.   asymmetric key

              C.   public key

D.    None of the above


10. Digital signature provides               .

A.   authentication

B.     nonrepudiation

C.   both a and b

D.     neither a nor b


11.  A                     signature is included in the document; a                  signature is a separate entity.

A.   conventional; digital

            B.   digital; digital

              C.   either a or b

D.   either a or b

 

12. In Kerberos ,AS referred as                           .

 

A.   Authorization Service

B.     Authentication Service

C.     Authentication Server

D.    None of the above


13.       In Kerberos ,TGS referred as                           .

   A.   Ticket granting Server

B.   Token getting Server

              C.   Target getting Service

D.    None of the above

 

14.  In Kerberos ,AS requests                                       from user.

        A.   Ticket granting ticket

B.   Token gaining ticket

              C.   Ticket granting Token

D.    None of the above


15..Kerberos , TGS requests                                       from user.

 

A.   Service granting ticket

B.   Ticket granting ticket

C.   Ticket granting token

D.   Token gaining ticket

 

16.    In X.509 certificate ,                                    Consists of two dates: the first and last on which the certificate is valid.

 

A.   Signature algorithm identifier

B.     Period of validity

              C.   Issuer unique identifier

D.    Subject unique identifier


17.    in X.509 certificate                                            do the following task that , An optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.

 

A.   Signature algorithm identifier.

BPeriod of validity

C.   Issuer unique identifier

    D. Subject unique identifier

Post a Comment