Title | Security Quiz Study |
---|---|
Course | ICT Management and Information Security |
Institution | Charles Sturt University |
Pages | 6 |
File Size | 238.4 KB |
File Type | |
Total Downloads | 34 |
Total Views | 149 |
ITC358 Sample Quizes Study Notes...
Security Quiz Study WEEK 2
•
Question 1 A DES key is 40 bits long. Answers: True False
•
Question 2 A commonly SSL/TLS-aware application is ________. Answers: webservice database Both A and B Neither A nor B
•
Question 3 A digital certificate ________. Answers: indicates that the person or firm named in the certificate is reasonably trustworthy gives the subject's public key Both A and B Neither A nor B
•
Question 4 A ________ is a mathematical process used in encryption and decryption. Answers: key cipher plaintext coding method
•
Question 5 In SSL/TLS, a ________ is a specific set of security methods and options. Answers: cryptographic system standard cipher suite chosen set
tuple •
Question 6 If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits? Answers: 7 times as long 14 times as long 128 times as long 256 times as long
•
Question 7 Hashing is ________. Answers: reversible repeatable Both A and B Neither A nor B
•
Question 8 A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages. Answers: key cipher plaintext Code
•
Question 9 IPsec tunnel mode ________. Answers: provides host-to-host protection is firewall-friendly Both A and B Neither A nor B
•
Question 10 An attacker who captures the keying information in Diffie-Hellman key agreement can compute the symmetric session key. Answers: True False
•
Question 11
Companies can enforce policies for ________. Answers: SSL/TLS IPsec security associations Both A and B Neither A nor B •
Question 12 0 out of 1 points Companies transmit over the Internet because the Internet ________. Selected Answer:
[None Given]
Answers: is inexpensive is secure Both A and B Neither A nor B •
Question 13 0 out of 1 points Digital signatures provide ________. Selected Answer: Answers:
[None Given] message authentication message integrity Both A and B Neither A nor B
•
Question 14 0 out of 1 points A DES key is ________ bits long. Selected Answer: Answers:
[None Given] 40 56 100 128
•
Question 15 0 out of 1 points An attack where an adversary intercepts an encrypted message and transmits it again later is called a ________. Selected Answer:
[None Given]
Answers: replay attack reflex attack reflection attack resend attack •
Question 16
0 out of 1 points Electronic signatures usually provide ________. Selected Answer: Answers:
[None Given] message-by-message authentication message integrity Both A and B Neither A nor B
•
Question 17 0 out of 1 points HMACs provide the cryptographic protection of ________. Selected Answer:
[None Given]
Answers: authentication nonrepudiation Both A and B Neither A nor B •
Question 18 0 out of 1 points A ________ is a cryptographic system that provides secure communication over an untrusted network. Selected Answer:
[None Given]
Answers: virtual private network secure link complete cryptographic system None of the above. •
Question 19 0 out of 1 points
•
DES uses block encryption. Selected Answer: [None Given] Answers: True False Question 20 0 out of 1 points In MS-CHAP, the ________ creates the response message. Selected Answer:
[None Given]
Answers: supplicant verifier Both A and B Neither A nor B •
Question 21 0 out of 1 points Hashing is a reversible process. Selected Answer: [None Given] Answers: True
False •
Question 22
•
A remote access VPN typically gives users access to multiple resources within a site. Selected Answer: [None Given] Answers: True False Question 23
0 out of 1 points
0 out of 1 points Cryptanalysts have found weaknesses in ________. Selected Answer:
[None Given]
Answers: MD5 SHA-512 Both A and B Neither A nor B •
Question 24 0 out of 1 points Digital signatures are used for ________ authentication. Selected Answer: Answers:
[None Given] initial message-by-message Both A and B Neither A nor B
•
Question 25 0 out of 1 points For message-by-message authentication, each message must contain an electronic signature. Selected Answer: Answers:
•
[None Given] True False
Question 26 0 out of 1 points A digital ________, by itself, provides authentication. Selected Answer: Answers:
[None Given] signature certificate Both A and B Neither A nor B
•
Question 27 0 out of 1 points HMACs provide the cryptographic protection of ________. Selected Answer: Answers:
[None Given] message authentication message integrity
Both A and B Neither A nor B •
Question 28 0 out of 1 points 3DES is ________. Selected Answer: Answers:
[None Given] very slow strong enough for communication in corporations expensive in terms of processing cost All of the above
•
Question 29 0 out of 1 points IPsec operates at the ________ layer. Selected Answer: Answers:
[None Given] data link internet transport application...