1. The MD5 is a message digest algorithm developed by ______. a. Ron Rivest. b. WhiteField Diffie. c. Martin Hellman. d. Diffie-Hellman. Answer: A. 2. The original message digest algorithm is called as _______. a. MAC. b. SHA. c. MD. d. DSA. Answer: C. 3. MD5 is quite fast and produces ________ message digests. a. 512 bits. b. 1024 bits. c. 128 bits. d. 64 bits. Answer: C. 4. The first step of MD5 is __________. a. add padding bits to original messsge. b. adding append length bits. c. divide the input into 512 bit blocks. d. compression. Answer: A. 5. In MD5, the process block divides the 512 bits into ________ sub blocks. a. 16. b. 24. c. 32 d. 84. Answer: A. 6. Which financial institutions have a relationship with merchants for processing payment card authorizations and payments? a. Issuer. b. Acquirer. c. Merchant. d. Dealer. Answer: B.163E-NETWORK SECURITY 2 7. Which of the following contains the order information such as which items are being purchased? a. PI. b. OI. c. MD. d. DS. Answer: B. 8. The purchase request exchange is made up of _______ messages. a. 2. b. 3. c. 4. d. 5. Answer: C. 9. The payment gateway sends back an _________ message to the merchant. a. authorization response. b. request. c. no response. d. acknowledgement. Answer: A. 10. Payment information can be encrypted by using ________. a. customer’s private key. b. merchant public key. c. one-time session key. d. customer’s public key. Answer: C. 11. Digital signature envelope is decrypted by using _________. a. merchant private key. b. payment’s private key. c. payment public key. d. merchant’s public key. Answer: B. 12. __________ will ensure the merchant and their payment information. a. Digital certificate. b. Merchant. c. Dual signature. d. Certificate authority. Answer: C. 13. SET provides an authentication with the help of ____________. a. dual signature. b. digital certificate. c. payment’s public key. d. payment’s private key. Answer: B.163E-NETWORK SECURITY 3 14. _________ helps in ensuring non-fraudulent transactions on the web. a. Certificate authority b. Digital authority. c. Dual authority. d. Digital signature. Answer: A. 15. SSL is placed in between the ________ layers. a. transport & datalink. b. application & presentation. c. application & transport. d. application & session. Answer: C. 16. SSL is used to encrypt the ___________. a. L5 data. b. L4 data. c. L3 data. d. L2 data. Answer: A. 17. SSL provides only ___________. a. authentication. b. confidentiality. c. integrity. d. durability. Answer: A. 18. ___________are very crucial for success of RSA algorithm. a. Integers. b. Prime numbers. c. Negative number. d. Fraction. Answer: B. 19. In the basic TCP/IP protocol suite, the number of layers used are _________. a. 4. b. 6. c. 5. d. 7. Answer: A. 20. Physical layer transmits the data in TCP/IP as _________. a. packets. b. pulse codes. c. data. d. bits. Answer: B.163E-NETWORK SECURITY 4 21. S/MIME stands for ____________. a. standard multipurpose internet mail extensions. b. secure multipurpose internet mail extensions. c. secure multipurpose international mail extensions. d. standard multipurpose international mail extensions. Answer: B. 22. _________ uniquely identifies the MIME entities uniquely with reference to multiple contexts. a. Content description. b. Content -id. c. Content type. d. Content transfer encoding. Answer: B. 23. The processed S/MIME along with security related data is called as ________. a. public key cryptography standard. b. private key cryptography standard. c. S/MIME. d. MIME. Answer: A. 24. In S/MIME,MLA stands for __________. a. mailing list agent. b. multipurpose list agent. c. mail lock agent. d. message link agent. Answer: A. 25. The cryptography algorithms used in S/MIME are _________. a. IDEA. b. RC4. c. RSA,DES-3. d. RC5. Answer: C. 26. The __________ acts as financial institutions who provides a payment card to a card holder. a. payment gateway. b. card holder. c. acquirer. d. issuer. Answer: D. 27. Who will be responsible for processing the payment from the customer’s account to the merchant account? a. Acquirer. b. Merchant. c. Issuer. d. Payment gateway. Answer: D.163E-NETWORK SECURITY 5 28. The cardholder combines the PIMD and OIMD and hashes them together to form ________. a. OPMD. b. POMD. c. MD. d. DS. Answer: B. 29. Which process will ensure that the issues of the credit card is an approved transactions? a. Payment capture. b. Payment authorization. c. Purchase request. d. Purchase reply. Answer: B. 30. _________ is used for hiding the payment information from the merchant. a. SET. b. SSL. c. SHTTP. d. TSP. Answer: A. 31. _________ is a block cipher. a. DES. b. IDEA. c. AES. d. RSA. Answer: A. 32. DES encrypts data in block size of __________ bits each. a. 64. b. 128. c. 32. d. 56. Answer: A. 33. Merkle and Hellman introduced the concept of ________. a. meet in middle attack. b. meet in attack. c. hijack. d. virus attacks. Answer: A. 34. Data Encryption Standard also called as __________. a. Data Encryption Algorithm. b. Double DES. c. AES. d. RSA. Answer: A.163E-NETWORK SECURITY 6 35. __________ is generally used in ECB,CBC, or CFB mode. a. DES b. AES c. IDEA d. RSA. Answer: A. 36. DES consists of __________ rounds to perform the substitution and transposition techniques. a. 16. b. 18. c. 21. d. 25. Answer: A. 37. _________is the first step in DES. a. Key transformation. b. Expansion permutation. c. S-box substitution. d. P-box substitution. Answer: A. 38. ___________ substitution is a process that accepts 48 bits from the XOR operation. a. S-box. b. P-box. c. Expansion permutations. d. Key transformation. Answer: A. 39. __________ refers more to asymmetric key cryptography. a. Timing attack. b. Meet in middle attack. c. Virus attack. d. Worms attack. Answer: A. 40. Eli Biham & Adi Shamir introduced ___________. a. differential & linear cryptoanalysis. b. Double DES. c. DES. d. RSA. Answer : A. 41. Electronic money is also called as _______________. a. digital cash. b. internet cash. c. eucash. d. physical cash. Answer: A.163E-NETWORK SECURITY 7 42. The physical form of money is converted into ___________. a. octal form. b. hexadecimal. c. decimal. d. binary form. Answer: D. 43. The bank ___________the customer’s message after getting the email request for emoney. a. integrate. b. access. c. authenticates. d. non-repudiate. Answer: C. 44. The encryption of an original message can be done __________. a. only once. b. twice. c. thrice. d. many times. Answer: B. 45. Customer uses ____________ key for decryption. a. public key. b. private key. c. secret key. d. hash key. Answer: B. 46. E-money is classified into __________types. a. 3. b. 2. c. 4. d. 5. Answer: B. 47. The bank can trace the transaction using ___________money. a. anonymous. b. identified. c. physical. d. rational. Answer: B. 48. In anonymous e-money ___________ factor is used to encrypt the random number. a. blinded. b. prince. c. prime. d. anonymity. Answer: A.