VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
A) SSL; tunneling
B) IPSec; SSL
This is the correct answer.
C) IPSec; tunneling
D) None of the choices are correct
Tunneling is a technique in which the IP datagram is first _______ and then _______.
A) encapsulated in another datagram; encrypted
This is the correct answer.
B) encrypted; encapsulated in another datagram
C) authenticated; encrypted
D) encrypted; authenticated
IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.
A) data link
This is the correct answer.
B) network
C) transport
D) None of the choices are correct
IPSec requires a logical connection between two hosts using a signaling protocol called ____________.
A) AS
This is the correct answer.
B) SA
C) AS
D) None of the choices are correct
IPSec operates at two different modes: _________ mode and _________mode.
A) transport; network
This is the correct answer.
B) transport; tunnel
C) tunnel; surface
D) None of the choices are correct
In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.
This is the correct answer.
A) transport
B) tunnel
C) transition
D) None of the choices are correct
In the ________ mode, the IPSec header is placed in front of the original IP header.
A) transport
This is the correct answer.
B) tunnel
C) transition
D) None of the choices are correct
IPSec defines two protocols: _________ and __________.
A) AH: SSP
B) ESP; SSP
C) AH: EH
This is the correct answer.
D) None of the choices are correct
The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.
This is the correct answer.
A) AH
B) ESP
C) SPE
D) None of the choices are correct
The _______ protocol provides message authentication and integrity, but not privacy.
This is the correct answer.
A) AH
B) ESP
C) SPE
D) None of the choices are correct
The _______ protocol provides message authentication, integrity, and privacy.
A) AH
This is the correct answer.
B) ESP
C) SPE
D) None of the choices are correct
The _______ was designed to provide security at the transport layer.
A) AH
B) ESP
This is the correct answer.
C) TLS
D) None of the choices are correct
_______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
A) AH
B) ESP
C) TLS
This is the correct answer.
D) None of the choices are correct
A packet-filter firewall filters at the ________ or ___________ layer.
A) network; application
B) transport; application
This is the correct answer.
C) network; transport
D) None of the choices are correct
A proxy firewall filters at the __________ layer.
A) transport
B) network
This is the correct answer.
C) application
D) None of the choices are correct
In __________cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption).
This is the correct answer.
A) symmetric-key
B) asymmetric-key
C) public-key
D) None of the choices are correct
In _________ cryptography, the same key is used in both directions.
This is the correct answer.
A) symmetric-key
B) asymmetric-key
C) public-key
D) None of the choices are correct
________ cryptography is often used for long messages.
This is the correct answer.
A) Symmetric-key
B) Asymmetric-key
C) public-key
D) None of the choices are correct
___________ cryptography is often used for short messages.
A) Symmetric-key
This is the correct answer.
B) Asymmetric-key
C) Secret-key
D) None of the choices are correct
__________means that the sender and the receiver expect confidentiality.
A) Non-repudiation
B) Integrity
C) Authentication
This is the correct answer.
D) None of the choices are correct
___________ means that the data must arrive at the receiver exactly as they were sent.
A) Non-repudiation
This is the correct answer.
B) Message integrity
C) Authentication
D) None of the choices are correct
_____________ means that the receiver needs to be sure of the sender identity and that an imposter has not sent the message.
A) Non-repudiation
B) Message integrity
This is the correct answer.
C) Message authentication
D) None of the choices are correct
______________ can provide authentication, integrity, and nonrepudiation for a message.
A) Encryption/decryption
This is the correct answer.
B) Digital signature
C) Compression
D) None of the choices are correct
Digital signature does not provide _________.
A) non-repudiation
This is the correct answer.
B) privacy
C) authentication
D) provides all of the above
In ___________, the entity identity is verified once for the entire duration of system access.
This is the correct answer.
A) entity authentication
B) message integrity
C) message authentication
D) None of the choices are correct
In __________ cryptography, everyone has access to everyone's public key.
A) symmetric-key
This is the correct answer.
B) asymmetric-key
C) secret-key
D) None of the choices are correct
After a message is encrypted, it is called _______.
A) plaintext
This is the correct answer.
B) ciphertext
C) cryptotext
D) None of the choices are correct
If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed.
A) 19
B) 20
This is the correct answer.
C) 190
D) 200
In the asymmetric-key method of cryptography, which key is publicly known?
This is the correct answer.
A) encryption key only
B) decryption key only
C) both keys
D) None of the choices are correct
In the asymmetric-key method of cryptography, the receiver has possession of the _______.
This is the correct answer.
A) private key
B) public key
C) none of the keys
D) None of the choices are correct
The RSA algorithm uses _______ cryptography method.
This is the correct answer.
A) an asymmetric-key
B) a private-key
C) a symmetric-key
D) None of the choices are correct
If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.
A) user A
This is the correct answer.
B) user B
C) the network
D) None of the choices are correct
In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.
A) his or her own symmetric key
This is the correct answer.
B) his or her own private key
C) his or her own public key
D) None of the choices are correct
In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
A) her or his own symmetric key
B) her or his own private key
This is the correct answer.
C) the sender's public key
D) None of the choices are correct
A _______ is a trusted third party that solves the problem of symmetric-key distribution.
A) CA
This is the correct answer.
B) KDC
C) TLS
D) firewall
A _______ certifies the binding between a public key and its owner.
This is the correct answer.
A) CA
B) KDC
C) TLS
D) None of the choices are correct
To request the physical address of a host whose IP address is known, a _______ message is sent.
A) membership-query
B) router-solicitation
This is the correct answer.
C) neighbor-solicitation
D) neighbor-advertisement
If a host needs information about routers on the network, it sends a _______ message.
A) membership-report
This is the correct answer.
B) router-solicitation
C) neighbor-solicitation
D) neighbor-advertisement
The ARP function in version 4 is part of _______ in version 6.
A) echo request and reply
B) router solicitation and advertisement
This is the correct answer.
C) neighbor solicitation and advertisement
D) None of the choices are correct
The IGMP functions in version 4 are part of _______ messages in version 6.
A) echo request and reply
B) router solicitation and advertisement
This is the correct answer.
C) group membership
D) None of the choices are correct
The purpose of echo request and echo reply is to _______.
A) report errors
This is the correct answer.
B) check node-to-node communication
C) check group memberships
D) None of the choices are correct
In error reporting the encapsulated ICMP packet goes to _______.
This is the correct answer.
A) the source
B) the destination
C) a router
D) None of the choices are correct
In error reporting, a destination can send a _______ message if an option is not recognized.
This is the correct answer.
A) parameter-problem
B) packet-too-big
C) time-exceeded
D) None of the choices are correct
When the hop count field reaches zero and the destination has not been reached, a _______ error message is sent.
A) destination-unreachable
This is the correct answer.
B) time-exceeded
C) parameter-problem
D) None of the choices are correct
When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.
A) destination-unreachable
B) time-exceeded
C) parameter-problem
COMPUTER NETWORKS QUESTIONS-05
D) None of the choices are correct
Errors in the header or option fields of an IP datagram require a _______ error message.
A) destination-unreachable
B) time-exceeded
This is the correct answer.
C) parameter-problem
D) None of the choices are correct
The _______ packet contains information about a router.
A) router solicitation
B) router information
This is the correct answer.
C) router advertisement
D) None of the choices are correct
A router can send a _______ message to a host to inform it of a more efficient path.
A) neighbor-solicitation
B) router-solicitation
This is the correct answer.
C) redirection
D) None of the choices are correct
Which error-reporting message from version 4 has been eliminated in version 6?
A) packet too big
B) destination unreachable
This is the correct answer.
C) source quench
D) None of the choices are correct
Which error-reporting message is found in version 6 but not in version 4?
This is the correct answer.
A) packet too big
B) destination unreachable
C) parameter problem
D) None of the choices are correct
No comments:
Post a Comment