|
1 | | In cryptography, the encryption/decryption algorithms are ________; the keys are ________. |
| | A) | secret; public |
| | B) | public; secret |
| | C) | secret; secret |
| | D) | none of the above |
|
|
2 | | In __________cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). |
| | A) | symmetric-key |
| | B) | asymmetric-key |
| | C) | public-key |
| | D) | none of the above |
|
|
3 | | In _________ cryptography, the same key is used in both directions. |
| | A) | symmetric-key |
| | B) | asymmetric-key |
| | C) | public-key |
| | D) | none of the above |
|
|
4 | | The DES cipher uses the same concept as the _________ cipher, but the encryption/ decryption algorithm is much more complex. |
| | A) | RSA |
| | B) | AES |
| | C) | Caesar |
| | D) | none of the above |
|
|
5 | | _________ cryptography is often used for long messages. |
| | A) | Symmetric-key |
| | B) | Asymmetric-key |
| | C) | Public-key |
| | D) | none of the above |
|
|
6 | | ___________ algorithms are more efficient for short messages. |
| | A) | Symmetric-key |
| | B) | Asymmetric-key |
| | C) | Public-key |
| | D) | none of the above |
|
|
7 | | __________means that the sender and the receiver expect confidentiality. |
| | A) | Non-repudiation |
| | B) | Integrity |
| | C) | Authentication |
| | D) | none of the above |
|
|
8 | | ___________ means that the data must arrive at the receiver exactly as they were sent. |
| | A) | Non-repudiation |
| | B) | Message integrity |
| | C) | Authentication |
| | D) | none of the above |
|
|
9 | | ______________ means that the receiver needs to be sure of the sender identity and that an imposter has not sent the message. |
| | A) | Non-repudiation |
| | B) | Message integrity |
| | C) | Message authentication |
| | D) | none of the above |
|
|
10 | | ______________ can provide authentication, integrity, and nonrepudiation for a message. |
| | A) | Encryption/decryption |
| | B) | Digital signature |
| | C) | Compression |
| | D) | none of the above |
|
|
11 | | Digital signature does not provide _________. |
| | A) | non-repudiation |
| | B) | privacy |
| | C) | authentication |
| | D) | provides all of the above |
|
|
12 | | In ___________, the entity identity is verified once for the entire duration of system access. |
| | A) | entity authentication |
| | B) | message integrity |
| | C) | message authentication |
| | D) | none of the above |
|
|
13 | | The symmetric (shared) key in the Diffie-Hellman protocol is ____________. |
| | A) | K = Gxy mod N |
| | B) | K = Gx mod N |
| | C) | K = Gy mod N |
| | D) | none of the above |
|
|
14 | | In __________ cryptography, everyone has access to everyoneís public key. |
| | A) | symmetric-key |
| | B) | asymmetric-key |
| | C) | both a and b |
| | D) | none of the above |
|
|
15 | | ___________servers are involved in the Kerberos protocol. |
| | A) | Two |
| | B) | Three |
| | C) | Four |
| | D) | none of the above |
|
|
16 | | In Kerberos, the _______ is the KDC. |
| | A) | AS |
| | B) | TGS |
| | C) | real server |
| | D) | none of the above |
|
|
17 | | In Kerberos, the _______ issues the ticket for the real server. |
| | A) | AS |
| | B) | TGS |
| | C) | real server |
| | D) | none of the above |
|
|
18 | | In Kerberos, the ___________ provides services for the entity. |
| | A) | AS |
| | B) | TGS |
| | C) | real server |
| | D) | none of the above |
|
|
19 | | Kerberos allows the global distribution of ASs and TGSs, with each system called a ________ |
| | A) | server |
| | B) | realm |
| | C) | client |
| | D) | none of the above |
|
|
20 | | IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level. |
| | A) | data link |
| | B) | network |
| | C) | transport |
| | D) | none of the above |
|
|
21 | | IPSec requires a logical connection between two hosts using a signaling protocol called ____________. |
| | A) | AS |
| | B) | SA |
| | C) | AS |
| | D) | none of the above |
|
|
22 | | IPSec operates at two different modes: _________ mode and _________mode. |
| | A) | transport; network |
| | B) | transport; tunnel |
| | C) | tunnel; surface |
| | D) | none of the above |
|
|
23 | | In the _________ mode, the IPSec header is added between the IP header and the rest of the packet. |
| | A) | transport |
| | B) | tunnel |
| | C) | both a and b |
| | D) | none of the above |
|
|
24 | | In the ________ mode, the IPSec header is placed in front of the original IP header. |
| | A) | transport |
| | B) | tunnel |
| | C) | both a and b |
| | D) | none of the above |
|
|
25 | | IPSec defines two protocols: _________ and __________. |
| | A) | AH: SSP |
| | B) | ESP; SSP |
| | C) | AH: EH |
| | D) | none of the above |
|
|
26 | | The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet. |
| | A) | AH |
| | B) | ESP |
| | C) | both a and b |
| | D) | none of the above |
|
|
27 | | The _______ protocol provides message authentication and integrity, but not privacy. |
| | A) | AH |
| | B) | ESP |
| | C) | both a and b |
| | D) | none of the above |
|
|
28 | | The _______ protocol provides message authentication, integrity, and privacy. |
| | A) | AH |
| | B) | ESP |
| | C) | both a and b |
| | D) | none of the above |
|
|
29 | | The _______ was designed to provide security at the transport layer. |
| | A) | AH |
| | B) | ESP |
| | C) | TLS |
| | D) | none of the above |
|
|
30 | | _______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email. |
| | A) | AH |
| | B) | ESP |
| | C) | TLS |
| | D) | none of the above |
|
|
31 | | A packet-filter firewall filters at the ________ or ___________ layer. |
| | A) | network; application |
| | B) | transport; application |
| | C) | network; transport |
| | D) | none of the above |
|
|
32 | | A proxy firewall filters at the __________ layer. |
| | A) | transport |
| | B) | network |
| | C) | application |
| | D) | none of the above |
|
|
33 | | Before a message is encrypted, it is called _______. |
| | A) | plaintext |
| | B) | ciphertext |
| | C) | cryptotext |
| | D) | none of the above |
|
|
34 | | After a message is encrypted, it is called _______. |
| | A) | plaintext |
| | B) | ciphertext |
| | C) | cryptotext |
| | D) | none of the above |
|
|
35 | | If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed. |
| | A) | 19 |
| | B) | 20 |
| | C) | 190 |
| | D) | 200 |
|
|
36 | | In the asymmetric-key method of cryptography, which key is publicly known? |
| | A) | encryption key only |
| | B) | decryption key only |
| | C) | both |
| | D) | none of the above |
|
|
37 | | In the asymmetric-key method of cryptography, the receiver has possession of the _______. |
| | A) | private key |
| | B) | public key |
| | C) | both keys |
| | D) | none of the above |
|
|
38 | | The RSA algorithm uses _______ cryptography method. |
| | A) | an asymmetric-key |
| | B) | a private-key |
| | C) | a symmetric-key |
| | D) | none of the above |
|
|
39 | | If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______. |
| | A) | user A |
| | B) | user B |
| | C) | the network |
| | D) | none of the above |
|
|
40 | | In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message. |
| | A) | his or her own symmetric key |
| | B) | his or her own private key |
| | C) | his or her own public key |
| | D) | none of the above |
|
|
41 | | In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature. |
| | A) | her or his own symmetric key |
| | B) | her or his own private key |
| | C) | the senderís public key |
| | D) | none of the above |
|
|
42 | | A _______ is a trusted third party that solves the problem of symmetric-key distribution. |
| | A) | CA |
| | B) | KDC |
| | C) | TLS |
| | D) | firewall |
|
|
43 | | A _______ certifies the binding between a public key and its owner. |
| | A) | CA |
| | B) | KDC |
| | C) | TLS |
| | D) | none of the above |
|
|
44 | | In a _______ attack, a message captured by an intruder is illegally sent a second time. |
| | A) | return |
| | B) | man-in-the-middle |
| | C) | replay |
| | D) | none of the above |
|
|
45 | | A _______ is a large number used only once that helps distinguish a fresh authentication request from a repeated one. |
| | A) | ticket |
| | B) | nonce |
| | C) | realm |
| | D) | none of the above |
|
|
46 | | In the _______ protocol, the symmetric key is K = Gxy mod N, where G and N are public numbers. |
| | A) | Diffie-Hellman |
| | B) | Needham-Schroeder |
| | C) | Otway-Rees |
| | D) | none of the above |
|
|
47 | | In a _______ attack, an intruder comes between two communicating parties, intercepting and replying to their messages. |
| | A) | ciphertext |
| | B) | man-in-the-middle |
| | C) | replay |
| | D) | none of the above |
|
|
48 | | _______ is an authentication protocol that needs an authentication server and a ticket-granting server. |
| | A) | Diffie-Hellman |
| | B) | Needham-Schroeder |
| | C) | Kerberos |
| | D) | none of the above |
|