Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

1. If end to end connection is done at a network or IP level, and if there are N hosts, then what is the number of keys required?
a) N(N-1)/2
b) N
c) N(N+1)/2
d) N/2

View Answer

Answer: a [Reason:] The number of keys required would be N(N-1)/2, similar to that of a mesh topology network connection (each node is connection line requires a key).

2. For 1000 nodes in IP level, how many keys would be required?
a) 499000
b) 499500
c) 500500
d) 500000

View Answer

Answer: b [Reason:] Use N(N-1)/2 where N=1000.

3. Communication between end systems is encrypted using a key, often known as
a) temporary key
b) section key
c) line key
d) session key

View Answer

Answer: d [Reason:] The key is referred to as session key.

4. Session keys are transmitted after being encrypted by
a) make-shift keys
b) temporary keys
c) master keys
d) section keys

View Answer

Answer: c [Reason:] Each node has a master key which it uses to receive the session key.

5. For a network with N nodes, how many master keys are present?
a) N(N-1)/2
b) N
c) N(N+1)/2
d) N/2

View Answer

Answer: b [Reason:] Each node has a master key to receive the session keys from the Key Distribution Centre (KDC).

6. PDU stands for
a) Protocol data unit
b) Pre data underscore
c) Permuted data unity
d) Protocol data untiy

View Answer

Answer: a [Reason:] In key management, PDU stands for Protocol data unit.

7. SSM stands for
a) Secure Security Module
b) Session Security Module
c) Service Session Module
d) Session Service Module

View Answer

Answer: b [Reason:] SSM stands for Session Security Module.

8. Which is the last step in establishing a connection between hosts using the SSM?
a) Interaction/ Handshaking between the SSM and the KDC
b) Establishment of the connection
c) Release of connection request packet
d) SSM saves the packet and applies to the KDC for connection permission

View Answer

Answer: c [Reason:] The correct order of execution is – (d,b,a,c)