Student Edition | Instructor Edition | Information Center | Home
TCP/IP Protocol Suite, 3/e
Student Edition
PowerPoint Present...
Animations
Solutions
Chapter 1 Quiz
Chapter 2 Quiz
Chapter 3 Quiz
Chapter 4 Quiz
Chapter 5 Quiz
Chapter 6 Quiz
Chapter 7 Quiz
Chapter 8 Quiz
Chapter 9 Quiz
Chapter 10 Quiz
Chapter 11 Quiz
Chapter 12 Quiz
Chapter 13 Quiz
Chapter 14 Quiz
Chapter 15 Quiz
Chapter 16 Quiz
Chapter 17 Quiz
Chapter 18 Quiz
Chapter 19 Quiz
Chapter 20 Quiz
Chapter 21 Quiz
Chapter 22 Quiz
Chapter 23 Quiz
Chapter 24 Quiz
Chapter 25 Quiz
Chapter 26 Quiz
Chapter 27 Quiz
Chapter 28 Quiz

Feedback
Help Center




Chapter 28 Quiz



1

In cryptography, the encryption/decryption algorithms are ________; the keys are ________.
A)secret; public
B)public; secret
C)secret; secret
D)none of the above
2

In __________cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption).
A)symmetric-key
B)asymmetric-key
C)public-key
D)none of the above
3

In _________ cryptography, the same key is used in both directions.
A)symmetric-key
B)asymmetric-key
C)public-key
D)none of the above
4

The DES cipher uses the same concept as the _________ cipher, but the encryption/ decryption algorithm is much more complex.
A)RSA
B)AES
C)Caesar
D)none of the above
5

_________ cryptography is often used for long messages.
A)Symmetric-key
B)Asymmetric-key
C)Public-key
D)none of the above
6

___________ algorithms are more efficient for short messages.
A)Symmetric-key
B)Asymmetric-key
C)Public-key
D)none of the above
7

__________means that the sender and the receiver expect confidentiality.
A)Non-repudiation
B)Integrity
C)Authentication
D)none of the above
8

___________ means that the data must arrive at the receiver exactly as they were sent.
A)Non-repudiation
B)Message integrity
C)Authentication
D)none of the above
9

______________ means that the receiver needs to be sure of the sender identity and that an imposter has not sent the message.
A)Non-repudiation
B)Message integrity
C)Message authentication
D)none of the above
10

______________ can provide authentication, integrity, and nonrepudiation for a message.
A)Encryption/decryption
B)Digital signature
C)Compression
D)none of the above
11

Digital signature does not provide _________.
A)non-repudiation
B)privacy
C)authentication
D)provides all of the above
12

In ___________, the entity identity is verified once for the entire duration of system access.
A)entity authentication
B)message integrity
C)message authentication
D)none of the above
13

The symmetric (shared) key in the Diffie-Hellman protocol is ____________.
A)K = Gxy mod N
B)K = Gx mod N
C)K = Gy mod N
D)none of the above
14

In __________ cryptography, everyone has access to everyoneís public key.
A)symmetric-key
B)asymmetric-key
C)both a and b
D)none of the above
15

___________servers are involved in the Kerberos protocol.
A)Two
B)Three
C)Four
D)none of the above
16

In Kerberos, the _______ is the KDC.
A)AS
B)TGS
C)real server
D)none of the above
17

In Kerberos, the _______ issues the ticket for the real server.
A)AS
B)TGS
C)real server
D)none of the above
18

In Kerberos, the ___________ provides services for the entity.
A)AS
B)TGS
C)real server
D)none of the above
19

Kerberos allows the global distribution of ASs and TGSs, with each system called a ________
A)server
B)realm
C)client
D)none of the above
20

IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.
A)data link
B)network
C)transport
D)none of the above
21

IPSec requires a logical connection between two hosts using a signaling protocol called ____________.
A)AS
B)SA
C)AS
D)none of the above
22

IPSec operates at two different modes: _________ mode and _________mode.
A)transport; network
B)transport; tunnel
C)tunnel; surface
D)none of the above
23

In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.
A)transport
B)tunnel
C)both a and b
D)none of the above
24

In the ________ mode, the IPSec header is placed in front of the original IP header.
A)transport
B)tunnel
C)both a and b
D)none of the above
25

IPSec defines two protocols: _________ and __________.
A)AH: SSP
B)ESP; SSP
C)AH: EH
D)none of the above
26

The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.
A)AH
B)ESP
C)both a and b
D)none of the above
27

The _______ protocol provides message authentication and integrity, but not privacy.
A)AH
B)ESP
C)both a and b
D)none of the above
28

The _______ protocol provides message authentication, integrity, and privacy.
A)AH
B)ESP
C)both a and b
D)none of the above
29

The _______ was designed to provide security at the transport layer.
A)AH
B)ESP
C)TLS
D)none of the above
30

_______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
A)AH
B)ESP
C)TLS
D)none of the above
31

A packet-filter firewall filters at the ________ or ___________ layer.
A)network; application
B)transport; application
C)network; transport
D)none of the above
32

A proxy firewall filters at the __________ layer.
A)transport
B)network
C)application
D)none of the above
33

Before a message is encrypted, it is called _______.
A)plaintext
B)ciphertext
C)cryptotext
D)none of the above
34

After a message is encrypted, it is called _______.
A)plaintext
B)ciphertext
C)cryptotext
D)none of the above
35

If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed.
A)19
B)20
C)190
D)200
36

In the asymmetric-key method of cryptography, which key is publicly known?
A)encryption key only
B)decryption key only
C)both
D)none of the above
37

In the asymmetric-key method of cryptography, the receiver has possession of the _______.
A)private key
B)public key
C)both keys
D)none of the above
38

The RSA algorithm uses _______ cryptography method.
A)an asymmetric-key
B)a private-key
C)a symmetric-key
D)none of the above
39

If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.
A)user A
B)user B
C)the network
D)none of the above
40

In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.
A)his or her own symmetric key
B)his or her own private key
C)his or her own public key
D)none of the above
41

In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
A)her or his own symmetric key
B)her or his own private key
C)the senderís public key
D)none of the above
42

A _______ is a trusted third party that solves the problem of symmetric-key distribution.
A)CA
B)KDC
C)TLS
D)firewall
43

A _______ certifies the binding between a public key and its owner.
A)CA
B)KDC
C)TLS
D)none of the above
44

In a _______ attack, a message captured by an intruder is illegally sent a second time.
A)return
B)man-in-the-middle
C)replay
D)none of the above
45

A _______ is a large number used only once that helps distinguish a fresh authentication request from a repeated one.
A)ticket
B)nonce
C)realm
D)none of the above
46

In the _______ protocol, the symmetric key is K = Gxy mod N, where G and N are public numbers.
A)Diffie-Hellman
B)Needham-Schroeder
C)Otway-Rees
D)none of the above
47

In a _______ attack, an intruder comes between two communicating parties, intercepting and replying to their messages.
A)ciphertext
B)man-in-the-middle
C)replay
D)none of the above
48

_______ is an authentication protocol that needs an authentication server and a ticket-granting server.
A)Diffie-Hellman
B)Needham-Schroeder
C)Kerberos
D)none of the above