Security Quiz Study PDF

Title Security Quiz Study
Course ICT Management and Information Security
Institution Charles Sturt University
Pages 6
File Size 238.4 KB
File Type PDF
Total Downloads 34
Total Views 149

Summary

ITC358 Sample Quizes Study Notes...


Description

Security Quiz Study WEEK 2



Question 1 A DES key is 40 bits long. Answers: True False



Question 2 A commonly SSL/TLS-aware application is ________. Answers: webservice database Both A and B Neither A nor B



Question 3 A digital certificate ________. Answers: indicates that the person or firm named in the certificate is reasonably trustworthy gives the subject's public key Both A and B Neither A nor B



Question 4 A ________ is a mathematical process used in encryption and decryption. Answers: key cipher plaintext coding method



Question 5 In SSL/TLS, a ________ is a specific set of security methods and options. Answers: cryptographic system standard cipher suite chosen set

tuple •

Question 6 If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits? Answers: 7 times as long 14 times as long 128 times as long 256 times as long



Question 7 Hashing is ________. Answers: reversible repeatable Both A and B Neither A nor B



Question 8 A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages. Answers: key cipher plaintext Code



Question 9 IPsec tunnel mode ________. Answers: provides host-to-host protection is firewall-friendly Both A and B Neither A nor B



Question 10 An attacker who captures the keying information in Diffie-Hellman key agreement can compute the symmetric session key. Answers: True False



Question 11

Companies can enforce policies for ________. Answers: SSL/TLS IPsec security associations Both A and B Neither A nor B •

Question 12 0 out of 1 points Companies transmit over the Internet because the Internet ________. Selected Answer:

[None Given]

Answers: is inexpensive is secure Both A and B Neither A nor B •

Question 13 0 out of 1 points Digital signatures provide ________. Selected Answer: Answers:

[None Given] message authentication message integrity Both A and B Neither A nor B



Question 14 0 out of 1 points A DES key is ________ bits long. Selected Answer: Answers:

[None Given] 40 56 100 128



Question 15 0 out of 1 points An attack where an adversary intercepts an encrypted message and transmits it again later is called a ________. Selected Answer:

[None Given]

Answers: replay attack reflex attack reflection attack resend attack •

Question 16

0 out of 1 points Electronic signatures usually provide ________. Selected Answer: Answers:

[None Given] message-by-message authentication message integrity Both A and B Neither A nor B



Question 17 0 out of 1 points HMACs provide the cryptographic protection of ________. Selected Answer:

[None Given]

Answers: authentication nonrepudiation Both A and B Neither A nor B •

Question 18 0 out of 1 points A ________ is a cryptographic system that provides secure communication over an untrusted network. Selected Answer:

[None Given]

Answers: virtual private network secure link complete cryptographic system None of the above. •

Question 19 0 out of 1 points



DES uses block encryption. Selected Answer: [None Given] Answers: True False Question 20 0 out of 1 points In MS-CHAP, the ________ creates the response message. Selected Answer:

[None Given]

Answers: supplicant verifier Both A and B Neither A nor B •

Question 21 0 out of 1 points Hashing is a reversible process. Selected Answer: [None Given] Answers: True

False •

Question 22



A remote access VPN typically gives users access to multiple resources within a site. Selected Answer: [None Given] Answers: True False Question 23

0 out of 1 points

0 out of 1 points Cryptanalysts have found weaknesses in ________. Selected Answer:

[None Given]

Answers: MD5 SHA-512 Both A and B Neither A nor B •

Question 24 0 out of 1 points Digital signatures are used for ________ authentication. Selected Answer: Answers:

[None Given] initial message-by-message Both A and B Neither A nor B



Question 25 0 out of 1 points For message-by-message authentication, each message must contain an electronic signature. Selected Answer: Answers:



[None Given] True False

Question 26 0 out of 1 points A digital ________, by itself, provides authentication. Selected Answer: Answers:

[None Given] signature certificate Both A and B Neither A nor B



Question 27 0 out of 1 points HMACs provide the cryptographic protection of ________. Selected Answer: Answers:

[None Given] message authentication message integrity

Both A and B Neither A nor B •

Question 28 0 out of 1 points 3DES is ________. Selected Answer: Answers:

[None Given] very slow strong enough for communication in corporations expensive in terms of processing cost All of the above



Question 29 0 out of 1 points IPsec operates at the ________ layer. Selected Answer: Answers:

[None Given] data link internet transport application...


Similar Free PDFs