network security

Question # 00080742 Posted By: echo7 Updated on: 07/08/2015 10:48 AM Due on: 08/07/2015
Subject General Questions Topic General General Questions Tutorials:
Question
Dot Image

Question 1

An example of an active attack is an attack where someone is eavesdropping on a communication line to capture information being transmitted.

True

False

Question 2

How can a symmetric encryption algorithm be figured out or "cracked"?

A. Cryptanalysis

B. Denial of service

C. Man in the middle

D. Brute force

E. Eavesdropping

1.

A, D

2.

A, B

3.

A, E

4.

B, C

5.

D, E

6.

A, C

Question 3

The number of passwords that can be generated from the set of characters {a,b,c,d} with replacement is? (replacement means you can use each character multiple times)

1.

64

2.

24

3.

256

4.

512

5.

1024

2 points

Question 4

The standard that defines and guides Public Key Infrastructure is:

1.

X.800

2.

X.509

3.

RFC 3280

4.

Document - New Directions in Cryptography

5.

ASN.1 for PKIX

2 points

Question 5

Assume there are 256 possible keys in the universe of keys for a particular cipher. How many keys on average would need to be tried to break the cipher? Blank 1

2 points

Question 6

A message is sent using a Message Authentication Code (MAC). An attacker intercepts the message, changes the message and sends it to the original recipient. The recipient of the message will not detect the change.

True

False

2 points

Question 7

A block encryption algorithm encrypts fixed size blocks.

True

False

2 points

Question 8

The number of passwords that can be generated from the set of characters {a,b,c,d} without replacement is? (without replacement means you can use each character once and only once)

1.

24

2.

64

3.

128

4.

256

5.

512

2 points

Question 9

Match the "value" with the technology.

secret key

Public key

Private key

Message digest

Pseudo random numbers

Answer

A.

Hash algorithms

B.

PRNG

C.

Asymmetric encryption

D.

Symmetric encryption

7 points

Question 10

A digital certificate is issued with a digital signature from a certificate authority. The digital certificate binds together a public key with an identity.

True

False

2 points

Question 11

The difference between the DES and 3DES algorithms is?

1.

DES is symmetric encryption. 3DES is asymmetric encryption.

2.

DES uses 16 subkeys for encryption and decryption, 3DES uses 3.

3.

DES uses 1 key for encryption and decryption; 3DES uses 3 keys.

4.

3DES uses a Feistel network, DES does not.

5.

None of the answers are correct.

2 points

Question 12

Using a rail fence cipher with depth of 2 decrypt the following ciphertext: TEATIAMDIH HPRYSTINGT Blank 1

2 points

Question 13

XOR the two values together.

Select the correct result.

0110 1011 1111

1101 1100 1100

1.

0100 1000 1100

2.

1011 0111 0011

3.

None of the selections

4.

1111 1111 1111

5.

0100 1000 1100

2 points

Question 14

An attribute of randomness that can be used to determine the strength of a password is known as?

1.

Entropy

2.

Diffusion

3.

Confusion

4.

Maturation

5.

Reversability

2 points

Question 15

The standard that guides Security Architecture for OSI:

1.

X.800

2.

X.504

3.

FIPS Pub 200

4.

X.895 Security Standard

5.

RFC 2828

2 points

Question 16

A root digital certificate is typically issued by who?

1.

tration authority

2.

Certificate authority

3.

Any individual

4.

X800 standards commitee

5.

A secure directory system that uses LDAP

2 points

Question 17

The number of different keys used in symmetric encryption is Blank 1

2 points

Question 18

Select the correct answer. The Diffie Hellman algorithm is used for what?

1.

Public key encryption.

2.

Symmetric encryption

3.

Message Authentication

4.

Key Exchange

5.

Message digest generation

2 points

Question 19

When creating a digital envelope which of the following steps are done.

A. The message is encrypted using a one time random symmetric key

B. The one time random symmetric key is encrypted by using the receivers private key

C. The one time random key is made a public key

D. The message is encrypted by using a one time random asymmetric key

E. The one time random symmetric key is encrypted with the receivers public key

1.

A, E

2.

A, C

3.

B, E

4.

C, D

5.

A, D

2 points

Question 20

Select the best answer that defines Security Risk

1.

Threat of attack coupled with security breach

2.

Threat of attack and vulnerability to attack

3.

Vulnerability to attack coupled with an active attack

4.

Threat of active and passive attack

2 points

Question 21

Using a Playfair cipher what is the plaintext for the following ciphertext. RNNEQLDKPCNRMI The keyword you should use is "MONEY". You are being asked to decrypt this message. Blank 1

2 points

Question 22

With a symmetric block cipher the relationship with key size, security and performance is what?

A. The larger the key the more secure the algorithm

B. The larger the key size the slower encryption/decryption performance.

C. The larger the key the easier to perform cryptanalysis

D. The smaller the key the more secure the encryption/decryption

E. The larger the key the faster the encryption/decryption performance.

1.

A, C

2.

A, B

3.

A, B, C

4.

C, D

5.

B, C

2 points

Question 23

A Security Mechanism is an implementation of a specific program, process or device that is designed to detect, prevent, or recover from a security attack.

True

False

2 points

Question 24

Match the cryptology mechanism with what type it is.

DES

AES

Diffie Hellman

Cipher block chaining

Cipher feedback

RC4

Electronic codebook

SHA1

3DES

MD5

Answer

A.

Symmetric stream encryption

B.

Mode of operation

C.

Hashing algorithm

D.

Key exchange

E.

Symmetric block encryption

7 points

Question 25

A Security Service protects against specific threats according to the categorization of security threats in the X.503 architecture.

True

False

2 points

Question 26

Assuming only asymmetric encryption is being used for communication between two parties. How many different keys are in play for sending one message from person A to person B? Assume person B reads the message.

1.

2

2.

1

3.

Cannot determine

4.

At least three

2 points

Question 27

Select the best answer. If the sender uses the recipients public key to encrypt a message what functionality is provided:

1.

Message integrity

2.

Message confidentiality

3.

Message authentication

4.

Message authentication and message confidentiality

5.

none of the choices

2 points

Question 28

Using a rail fence cipher with a depth of 3 encrypt the following message:

The party is at Fenway in October Blank 1

2 points

Question 29

The sender of the message in Digital signature encrypts the message digest using what?

1.

The secret key.

2.

Receivers public key.

3.

Senders private key.

4.

Symmetric key.

5.

MAC value.

2 points

Question 30

A digital certificate is what?

1.

A notarized document certifying your identity.

2.

A mail message sent with a Digital Signature from any third party that certifies the identity of a person or an entity.

3.

Secret keys (among other information) used for symmetric encryption.

4.

Public key (among other information) used for asymmetric encryption.

5.

A mail message from a registration authority (RA).

2 points

Question 31

Prime numbers are sometimes used to construct private and public key pairs.

True

False

2 points

Question 32

The key benefit of the Feistel Cipher is:

1.

The same algorithm can be used for encryption and decryption.

2.

There are always 16 rounds.

3.

There can be more then 16 rounds.

4.

The algorithm is very difficult to analyze.

5.

The algorithm can use different block sizes.

2 points

Question 33

Match the specific attack with the type of attack it is.

Disruption of Service

Eavesdropping

Masquerade

Traffic Analysis

Modification of data

Replay

Answer

A.

Active

B.

Passive

6 points

Question 34

Match the Feistel mechanism with the corresponding attribute. Use each option once. Select the best choice.

Confusion of data

Read Answer Items for Question 34

Diffusion of data

Read Answer Items for Question 34

XOR of data

Read Answer Items for Question 34

Round function

Read Answer Items for Question 34

Subkey

Read Answer Items for Question 34

Answer

A.

S (substitution) Box

B.

Uses P Boxes and S Boxes

C.

Boolean operation combines keys with data

D.

Derived from overall key

E.

P (permutation) Box

5 points

Question 35

Select the best answer. If the senders private key is used to encrypt a message what functionality is provided:

1.

Message integrity and confidentiality

2.

Message confidentiality

3.

Message authentication

4.

Message authentication and message integrity

5.

Message authentication and message confidentiality

2 points

Question 36

Match the specific authentication technique with general type of authentication it is.

Password

Read Answer Items for Question 36

Iris scanning

Read Answer Items for Question 36

Typing speed

Read Answer Items for Question 36

ATM card

Read Answer Items for Question 36

Public / Private Key

Read Answer Items for Question 36

Answer

A.

Encryption authentication

B.

Token authentication

C.

Static biometric authentication

D.

Active biometric authentication

E.

Something a person knows

5 points

Question 37

The Diffie-Hellman key exchange is vulnerable to a Blank 1 attack.

2 points

Question 38

Using a Playfair cipher encrypt the following plaintext: THE CAR IS HERE Use HELLO as the keyword to set up the matrix. Show the answer in digraph form. Blank 1

2 points

Question 39

The CIA acronym refers to which of the following:

1.

Central Intelligence Association

2.

Confidentiality, Integrity, Availability

3.

Communication, Integrity, Accessibility

4.

Cipher, Intelligence, Availability

5.

None of the above

2 points

Question 40

A secret key used for generating a message authentication code (MAC) should only be shared between the sender and receiver of a message.

True

False

2 points

Save and Submit

Dot Image
Tutorials for this Question
  1. Tutorial # 00075411 Posted By: echo7 Posted on: 07/08/2015 10:48 AM
    Puchased By: 3
    Tutorial Preview
    A, C 1. A, D Question 3 The number of passwords that ...
    Attachments
    20050011-Solution.docx (120.35 KB)
    20050012-Solution.docx (112.04 KB)
    20050013-Solution.docx (111.3 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    ch...ogo Rating Tutorial ordering is safe and secure 11/18/2015

Great! We have found the solution of this question!

Whatsapp Lisa