 |
1 |  |  Three security goals are _______________________________________. |
|  | A) | confidentiality, cryptography, and nonrepudiation |
|  | B) | confidentiality, encryption, and decryption |
|  | C) | confidentiality, integrity, and availability |
|  | D) | None of the choices are correct. |
|
|
 |
2 |  |  Which of the following attacks is threatening integrity? |
|  | A) | Masquerading |
|  | B) | Traffic Analysis |
|  | C) | Denial of service |
|  | D) | None of the choices are correct. |
|
|
 |
3 |  |  Which of the following attacks is threatening availability? |
|  | A) | Replaying |
|  | B) | Modification |
|  | C) | Denial of service |
|  | D) | None of the choices are correct. |
|
|
 |
4 |  |  _____________ means concealing the contents of a message by enciphering. |
|  | A) | Steganography |
|  | B) | Cryptography |
|  | C) | Compressing |
|  | D) | None of the choices are correct. |
|
|
 |
5 |  |  ______________ means concealing the message by covering it with something else. |
|  | A) | Cryptography |
|  | B) | Steganography |
|  | C) | Compressing |
|  | D) | None of the choices are correct. |
|
|
 |
6 |  |  In __________ cryptography, the same key is used by the sender and the receiver. |
|  | A) | symmetric-key |
|  | B) | asymmetric-key |
|  | C) | public-key |
|  | D) | None of the choices are correct. |
|
|
 |
7 |  |  In _________ cryptography, the same key is used in both directions. |
|  | A) | symmetric-key |
|  | B) | asymmetric-key |
|  | C) | public-key |
|  | D) | None of the choices are correct. |
|
|
 |
8 |  |  _________ cryptography is often used for long messages. |
|  | A) | Symmetric-key |
|  | B) | Asymmetric-key |
|  | C) | public-key |
|  | D) | None of the choices are correct. |
|
|
 |
9 |  |  ___________ cryptography is often used for short messages. |
|  | A) | Symmetric-key |
|  | B) | Asymmetric-key |
|  | C) | Secret-key |
|  | D) | None of the choices are correct |
|
|
 |
10 |  |  __________ means that the sender and the receiver expect confidentiality. |
|  | A) | Nonrepudiation |
|  | B) | Integrity |
|  | C) | Authentication |
|  | D) | None of the choices are correct. |
|
|
 |
11 |  |  ___________ means that the data must arrive at the receiver exactly as they were sent. |
|  | A) | Nonrepudiation |
|  | B) | Message integrity |
|  | C) | Authentication |
|  | D) | None of the choices are correct. |
|
|
 |
12 |  |  ______________ can provide authentication, integrity, and nonrepudiation for a message. |
|  | A) | Encryption/decryption |
|  | B) | Digital signature |
|  | C) | Compression |
|  | D) | None of the choices are correct. |
|
|
 |
13 |  |  Digital signature does not provide _________. |
|  | A) | nonrepudiation |
|  | B) | privacy |
|  | C) | authentication |
|  | D) | Provides all of the choices. |
|
|
 |
14 |  |  In ___________, the identity of a party is verified once for the entire duration of system access. |
|  | A) | entity authentication |
|  | B) | message integrity |
|  | C) | message authentication |
|  | D) | None of the choices are correct. |
|
|
 |
15 |  |  In __________ cryptography, everyone has access to everyone's public key. |
|  | A) | symmetric-key |
|  | B) | asymmetric-key |
|  | C) | secret-key |
|  | D) | None of the choices are correct. |
|
|
 |
16 |  |  After a message is encrypted, it is called _______. |
|  | A) | plaintext |
|  | B) | ciphertext |
|  | C) | cryptotext |
|  | D) | None of the choices are correct. |
|
|
 |
17 |  |  In the asymmetric-key method used for confidentiality, which key is publicly known? |
|  | A) | encryption key only |
|  | B) | decryption key only |
|  | C) | both keys |
|  | D) | None of the choices are correct. |
|
|
 |
18 |  |  In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message. |
|  | A) | private key |
|  | B) | public key |
|  | C) | no key |
|  | D) | None of the choices are correct. |
|
|
 |
19 |  |  The RSA algorithm for confidentiality uses _______ cryptography. |
|  | A) | asymmetric-key |
|  | B) | symmetric-key |
|  | C) | substitution |
|  | D) | None of the choices are correct. |
|
|
 |
20 |  |  In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______. |
|  | A) | user A |
|  | B) | user B |
|  | C) | the network |
|  | D) | None of the choices are correct. |
|
|
 |
21 |  |  In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message. |
|  | A) | his or her own symmetric key |
|  | B) | his or her own private key |
|  | C) | his or her own public key |
|  | D) | None of the choices are correct. |
|
|
 |
22 |  |  In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature. |
|  | A) | her or his own public key |
|  | B) | her or his own private key |
|  | C) | the sender's public key |
|  | D) | None of the choices are correct. |
|
|
 |
23 |  |  A _______ is a trusted third party that solves the problem of symmetric-key distribution. |
|  | A) | CA |
|  | B) | KDC |
|  | C) | TLS |
|  | D) | firewall |
|
|
 |
24 |  |  A _______ certifies the binding between a public key and its owner. |
|  | A) | CA |
|  | B) | KDC |
|  | C) | TLS |
|  | D) | None of the choices are correct. |
|
|
 |
25 |  |  VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________. |
|  | A) | SSL; tunneling |
|  | B) | IPSec; SSL |
|  | C) | IPSec; tunneling |
|  | D) | None of the choices are correct. |
|
|
 |
26 |  |  IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level. |
|  | A) | data link |
|  | B) | network |
|  | C) | transport |
|  | D) | None of the choices are correct. |
|
|
 |
27 |  |  IPSec requires a logical connection between two hosts using a signaling protocol called ____________. |
|  | A) | AS |
|  | B) | SA |
|  | C) | AS |
|  | D) | None of the choices are correct. |
|
|
 |
28 |  |  IPSec operates at two different modes: _________ mode and _________ mode. |
|  | A) | transport; network |
|  | B) | transport; tunnel |
|  | C) | tunnel; surface |
|  | D) | None of the choices are correct. |
|
|
 |
29 |  |  In the _________ mode, the IPSec header is added between the IP header and the rest of the packet. |
|  | A) | transport |
|  | B) | tunnel |
|  | C) | transition |
|  | D) | None of the choices are correct. |
|
|
 |
30 |  |  In the ________ mode, the IPSec header is placed in front of the original IP header. |
|  | A) | transport |
|  | B) | tunnel |
|  | C) | transition |
|  | D) | None of the choices are correct. |
|
|
 |
31 |  |  IPSec defines two protocols: _________ and __________. |
|  | A) | AH: SSP |
|  | B) | ESP; SSP |
|  | C) | AH: EH |
|  | D) | None of the choices are correct. |
|
|
 |
32 |  |  The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet. |
|  | A) | AH |
|  | B) | ESP |
|  | C) | SPE |
|  | D) | None of the choices are correct. |
|
|
 |
33 |  |  The _______ protocol provides message authentication and integrity, but not privacy. |
|  | A) | AH |
|  | B) | ESP |
|  | C) | SPE |
|  | D) | None of the choices are correct. |
|
|
 |
34 |  |  The _______ protocol provides message authentication, integrity, and privacy. |
|  | A) | AH |
|  | B) | ESP |
|  | C) | SPE |
|  | D) | None of the choices are correct. |
|
|
 |
35 |  |  The _______ was designed to provide security at the transport layer. |
|  | A) | AH |
|  | B) | ESP |
|  | C) | TLS |
|  | D) | None of the choices are correct. |
|
|
 |
36 |  |  _______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email. |
|  | A) | AH |
|  | B) | ESP |
|  | C) | TLS |
|  | D) | None of the choices are correct. |
|
|
 |
37 |  |  A packet-filter firewall filters at the ________ or ___________ layer. |
|  | A) | network; application |
|  | B) | transport; application |
|  | C) | network; transport |
|  | D) | None of the choices are correct. |
|
|
 |
38 |  |  A proxy firewall filters at the __________ layer. |
|  | A) | transport |
|  | B) | network |
|  | C) | application |
|  | D) | None of the choices are correct. |
|
|