Professional Documents
Culture Documents
Question Incorrect
Select one:
a. 64 bits
b. 512 bits
c. 1024 bits
d. 128 bits
Select one:
a. add padding bits to original messsge.
b. compression.
Question Correct
Select one:
a. RSA
b. IDEA
c. DES
d. AES
Triple DES
Select one:
a. guarantees excellent security
Question Correct
Select one:
a. his public key
Select one:
a. 64
b. 32
c. 56
d. 128
Select one:
a. iii and iv
b. i and ii
c. ii and iii
d. i and iv
In MD5, the process block divides the 512 bits into ________ sub blocks.
Select one:
a. 32
b. 16
c. 24
d. 84
Question Correct
Select one:
a. the authority checks and assures customers that the public key indeed belongs to the
business which claims its ownership
d. it is safe
Which of the following provides additional encryption strength by repeating the encryption
process with additional keys?
Select one:
a. 3DES
b. Blowfish
c. Twofish
d. DES
Question Incorrect
A digital signature is
Select one:
a. a bit string giving identity of a correspondent
Select one:
a. encrypting plain text by a different randomly selected key for each transmission
b. designing DES with high security and not publicizing algorithm used by it
c. encrypting plain text by a different random key for each message transmission and
sending the key to the receiver using a public key system
Select one:
a. ii and iii
b. i and ii
c. iii and iv
d. i and iii
Select one:
a. Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice.
c. Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for
three rounds.
d. Works with 144 bit blocks of plain text and applies DES algorithm once.
In which way does the Combined Encryption combine symmetric and assymmetric
encryption?
Select one:
a. The secret key is assymmetrically transmitted, the message itself symmetrically
Assymmetric Encryption: Why can a message encrypted with the Public Key only be
decrypted with the receiver's appropriate Private Key?
Select one:
a. The encrypted message contains the function for decryption which identifies the
Private Key.
b. A so called "one way function with back door" is applyed for the encryption.
c. Not true, the message can also be decrypted with the Public Key
d. The Public Key contains a specialfunction which is used to encrypt the message and
which can only be reversed by the appropriate Private Key
Question Incorrect
Select one:
a. private keys of subscribers
In public key encryption system if A encrypts a message using his private key and sends it to
B
Select one:
a. A should send his public key with the message
Question Incorrect
Select one:
a. None of the above
Select one:
a. it is a symmetric key system.
Question Correct
Select one:
a. Less secure encryption function
Select one:
a. A symmetric algorithm is a faster process.
Question Correct
Select one:
a. Expansion permutation.
b. Key transformation.
c. S-box substitution.
d. P-box substitution.
Select one:
a. i and ii
b. ii, iii, iv
c. i, ii, iii, iv
d. i, ii, iii
Question Correct
Select one:
a. 3DES
b. RC5
c. ECC
d. RSA
Select one:
a. 3DES
b. RSA
c. SHA
d. AES
Question Correct
Select one:
a. 16
b. 18
c. 25
d. 21
Select one:
a. sends both message and hashed message using DES
b. sends both message and hashed message using public key encryption
c. sends message key using public key encryption using DES and hashed message using
public key encryption
d. sends message using public key encryption and hashed message using DES
Question Correct
Select one:
a. A encrypts message using B’s public key
Select one:
a. PGP uses assymmetric encryption
Question Correct
Which of the following is true about the purpose and mechanism of usage of IPSec tunnel
mode as one of the methods of implementation provided by IPSec security specification?
Select one:
a. End-to-end protection method provides only IP payload protection
Which of the following are the OSI layers in which the above security protocols ( from left to
right) function?
Select one:
a. Network level, Transport level, Application level
Select one:
a. TLS is designed to prevent eavesdropping, tampering, and message forgery
b. TSL a widely deployed protocol for securing client-server communications over the
internet
Question Correct
What security implementation principle is used for granting users only the rights that are
necessary for them to perform their work?
Select one:
a. Discretionary Access
b. Mandatory Access
c. Least Privilege
d. Separation of Duties
Which of these uses Public Key Infrastructure (PKI) and digital certificates to provide privacy
and authentication?
Select one:
a. TSL
b. DES
c. 3DES
d. SSL
Question Correct
Select one:
a. Continually overwhelming a targeted network with fake requests
d. Forcing computers to drop their connections and reconnect with the attacker’s access
point
Select one:
a. Public Key Cryptosystem
Question Correct
VPN is one of the several methods of achieving secure remote access. Which of the following
are true about how a VPN achieves security requirements?
Select one:
a. User authentication
The four sub-components (Record, Handshake, Change Cipher Spec and Alert protocols) of
the SSL protocol handle various tasks for secure communication between the client machine
and the server.
Which of the following is represented by the above figure of SSL Handshake protocol?
Select one:
a. Client authentication and key exchange
Select one:
a. Both stateful and packet-filtering firewalls can filter at the application layer.
d. A packet-filtering firewall typically can filter up to the transport layer, while a stateful
firewall can filter up to the session layer.
Select one:
a. DAC (Discretionary Access Control) list.
Question Correct
Select one:
a. Role-based Access Control (RBAC)
c. Password Security
d. Need to know
Which of the following can be used to authenticate and encrypt IP (Internet Protocol) traffic?
Select one:
a. ESP (Encapsulating Security Payload)
Question Correct
Select one:
a. IPsec is not designed to work only with TCP as a transport protocol; it works with UDP
as well.
b. The most common use of IPsec is to provide a Virtual Private Network (VPN)
c. IPsec works from one application end to another application end;so,security cannot be
adopted without requiring changes to individual user computers/applications.
d. Since higher layer headers are hidden which carry port number, IPSec makes traffic
analysis more difficult.
What is the main difference between the implementation of IDS and IPS on devices?
Select one:
a. An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS
stops it immediately
c. An IDS needs to be deployed together with a firewall device, whereas an IPS can
replace a firewall.
d. An IDS can negatively impact the packet flow, whereas an IPS can not.
Question Correct
Select one:
a. transport mode
b. security mode
c. tunnel mode
d. application mode
Select one:
a. traffic must only be allowed to pass from inside to outside the firewall
Question Incorrect
which of the following component of SSL protocol is responsible for authentication and
encryption?
Select one:
a. SSL handshake protocol
Select one:
a. SSL/TSL
b. IPSec
c. SSH
d. WEP
Question Correct
Which firewall concept applies a set of rules to each incoming and outgoing IP packet and
then forwards or discards the packet?
Select one:
a. distributed
b. stateful inspection
c. packet filtering
d. host-based
which of the following is NOT among the common attacks that can occur on a network due
to ICMP vulnerabilities?
Select one:
a. ICMP allows an attacker to carry out network reconnaissance to determine network
topology and paths into the network.
b. ICMP enables to map target networking by describing the path in real-time from the
client to the remote host.
c. An attacker can launch a denial of service attack using the ICMP vulnerability.
IPSec provides the capacity to secure communications across a LAN, across private and
public WANs, and across the Internet. Which of the following is not true about the benefits of
IPSec?
Select one:
a. When it is implemented in a firewall or router, it provides security for all traffic crossing
the perimeter
b. It is transparent to end users as users don't need to know the underlying security
mechanisms
Select one:
a. authentication
b. radix-64 encoding
c. encryption
d. digital signature
b. Network IPS sensors are difficult to deploy when new networks are added.
c. Network IPS is incapable of examining encrypted traffic
d. Network IPS is unable to provide a clear indication of the extent to which the network is
being attacked
e. Network IPS has a difficult time reconstructing fragmented traffic to determine if an
attack was successful
Question Incorrect
Which of the following is a best method to mitigate DoS attack from a network?
Select one:
a. a strong password policy
b. implementing anti-sniffer
An intrusion detection system (IDS) can be used to monitor and filter network traffic. From
the viewpoint of detection, which main IDS types can be distinguished?
Select one:
a. Anomaly-based and heuristic-based
In deploying an IPS in a corporate network, system operators first create a profile of normal
network operation by monitoring network activities in normal network uses. After the profile
is incorporated into the IPS triggering mechanism, alarms will be generated when the IPS
detects excessive activity that is beyond the scope of the profile. Which signature detection
mechanism is deployed?
Select one:
a. Signature based
b. Anomaly based
c. Pattern based
A network technician has been asked to design a virtual private network between two branch
routers. Which type of cryptographic key should be used in this scenario?
Select one:
a. private key
b. public key
c. digital signature
d. hash key
Question Correct
Select one:
a. Firewalls
b. VPNs
c. IDS
My LMS Subjects > 2018-CSE5DNS(CB-2) > Subject Information > Online Test 2
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 2 of 19
Question Correct
Question Correct
In deploying an IPS in a corporate network, system operators first create a profile of
normal network operation by monitoring network activities in normal network uses.
After the profile is incorporated into the IPS triggering mechanism, alarms will be
generated when the IPS detects excessive activity that is beyond the scope of the
profile. Which signature detection mechanism is deployed?
Select one:
a. Signature based
b. Anomaly based
c. Pattern based
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 3 of 19
Question Correct
Which of the following is a best method to mitigate DoS attack from a network?
Select one:
a. a strong password policy
b. implementing anti-sniffer
Question Correct
Select one:
a. MD5 and SHA-1
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 4 of 19
Question Correct
Select one:
a. DAC (Discretionary Access Control) list.
Question Incorrect
Select one:
a. Public Key Cryptosystem
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 5 of 19
Question Correct
Which of the following are the OSI layers in which the above security protocols ( from
left to right) function?
Select one:
a. Network level, Transport level, Application level
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 6 of 19
Question Incorrect
Select one:
a. IPsec is not designed to work only with TCP as a transport protocol; it works with
UDP as well.
b. The most common use of IPsec is to provide a Virtual Private Network (VPN)
d. Since higher layer headers are hidden which carry port number, IPSec makes
traffic analysis more difficult.
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 7 of 19
Question Correct
Select one:
a. Continually overwhelming a targeted network with fake requests
d. Forcing computers to drop their connections and reconnect with the attacker’s
access point
Question Incorrect
Which of the following is true about the purpose and mechanism of usage of IPSec
tunnel mode as one of the methods of implementation provided by IPSec security
specification?
Select one:
a. End-to-end protection method provides only IP payload protection
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 8 of 19
Question Correct
Select one:
a. Firewalls
b. VPNs
c. IDS
b. Network IPS sensors are difficult to deploy when new networks are added.
d. Network IPS is unable to provide a clear indication of the extent to which the
network is being attacked
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 9 of 19
Question Correct
An intrusion detection system (IDS) can be used to monitor and filter network traffic.
From the viewpoint of detection, which main IDS types can be distinguished?
Select one:
a. Anomaly-based and heuristic-based
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 10 of 19
Question Correct
Which security protocol is represented by the following flow chart during message
transmission?
Select one:
a. PGP
b. s/MIME
c. SSL/TSL
d. IPSec
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 11 of 19
Question Correct
Select one:
a. Role-based Access Control (RBAC)
c. Password Security
d. Need to know
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 12 of 19
Question Incorrect
The four sub-components (Record, Handshake, Change Cipher Spec and Alert
protocols) of the SSL protocol handle various tasks for secure communication between
the client machine and the server.
Which of the following is represented by the above figure of SSL Handshake protocol?
Select one:
a. Client authentication and key exchange
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 13 of 19
Question Incorrect
Select one:
a. to limit the actions or operations that a legitimate user can perform
Question Correct
Select one:
a. SSL/TSL
b. IPSec
c. SSH
d. WEP
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 14 of 19
Question Incorrect
A network technician has been asked to design a virtual private network between two
branch routers. Which type of cryptographic key should be used in this scenario?
Select one:
a. private key
b. public key
c. digital signature
d. hash key
Question Correct
Select one:
a. TLS is designed to prevent eavesdropping, tampering, and message forgery
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 15 of 19
Question Incorrect
What security implementation principle is used for granting users only the rights that are
necessary for them to perform their work?
Select one:
a. Discretionary Access
b. Mandatory Access
c. Least Privilege
d. Separation of Duties
Question Correct
Select one:
a. Both stateful and packet-filtering firewalls can filter at the application layer.
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 16 of 19
Question Correct
Select one:
a. authentication
b. radix-64 encoding
c. encryption
d. digital signature
Question Incorrect
which of the following is NOT among the common attacks that can occur on a network
due to ICMP vulnerabilities?
Select one:
a. ICMP allows an attacker to carry out network reconnaissance to determine
network topology and paths into the network.
b. ICMP enables to map target networking by describing the path in real-time from
the client to the remote host.
c. An attacker can launch a denial of service attack using the ICMP vulnerability.
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 17 of 19
Question Correct
Which of the following can be used to authenticate and encrypt IP (Internet Protocol)
traffic?
Select one:
a. ESP (Encapsulating Security Payload)
Question Correct
Select one:
a. transport mode
b. security mode
c. tunnel mode
d. application mode
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 18 of 19
Question Correct
Which firewall concept applies a set of rules to each incoming and outgoing IP packet
and then forwards or discards the packet?
Select one:
a. distributed
b. stateful inspection
c. packet filtering
d. host-based
Question Correct
Which of these uses Public Key Infrastructure (PKI) and digital certificates to provide
privacy and authentication?
Select one:
a. TSL
b. DES
c. 3DES
d. SSL
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018
Online Test 2 Page 19 of 19
Question Incorrect
VPN is one of the several methods of achieving secure remote access. Which of the
following are true about how a VPN achieves security requirements?
Select one:
a. User authentication
https://lms.latrobe.edu.au/mod/quiz/review.php?attempt=7597285 31/10/2018