COMPUTER NETWORKS QUESTIONS-04


VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.


A) SSL; tunneling


B) IPSec; SSL

This is the correct answer.
C) IPSec; tunneling


D) None of the choices are correct




Tunneling is a technique in which the IP datagram is first _______ and then _______.


A) encapsulated in another datagram; encrypted

This is the correct answer.
B) encrypted; encapsulated in another datagram


C) authenticated; encrypted


D) encrypted; authenticated




IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.


A) data link

This is the correct answer.
B) network


C) transport


D) None of the choices are correct




IPSec requires a logical connection between two hosts using a signaling protocol called ____________.


A) AS

This is the correct answer.
B) SA


C) AS


D) None of the choices are correct



IPSec operates at two different modes: _________ mode and _________mode.


A) transport; network

This is the correct answer.
B) transport; tunnel


C) tunnel; surface


D) None of the choices are correct


In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.

This is the correct answer.
A) transport


B) tunnel


C) transition


D) None of the choices are correct



In the ________ mode, the IPSec header is placed in front of the original IP header.


A) transport

This is the correct answer.
B) tunnel


C) transition


D) None of the choices are correct



IPSec defines two protocols: _________ and __________.


A) AH: SSP


B) ESP; SSP


C) AH: EH

This is the correct answer.
D) None of the choices are correct



The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.

This is the correct answer.
A) AH


B) ESP


C) SPE


D) None of the choices are correct




The _______ protocol provides message authentication and integrity, but not privacy.

This is the correct answer.
A) AH


B) ESP


C) SPE


D) None of the choices are correct




The _______ protocol provides message authentication, integrity, and privacy.


A) AH

This is the correct answer.
B) ESP


C) SPE


D) None of the choices are correct




The _______ was designed to provide security at the transport layer.


A) AH


B) ESP

This is the correct answer.
C) TLS


D) None of the choices are correct


_______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.


A) AH


B) ESP


C) TLS

This is the correct answer.
D) None of the choices are correct




A packet-filter firewall filters at the ________ or ___________ layer.


A) network; application


B) transport; application

This is the correct answer.
C) network; transport


D) None of the choices are correct



A proxy firewall filters at the __________ layer.


A) transport


B) network

This is the correct answer.
C) application


D) None of the choices are correct




In __________cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption).

This is the correct answer.
A) symmetric-key


B) asymmetric-key


C) public-key


D) None of the choices are correct




In _________ cryptography, the same key is used in both directions.

This is the correct answer.
A) symmetric-key


B) asymmetric-key


C) public-key


D) None of the choices are correct



________ cryptography is often used for long messages.

This is the correct answer.
A) Symmetric-key


B) Asymmetric-key


C) public-key


D) None of the choices are correct



___________ cryptography is often used for short messages.


A) Symmetric-key

This is the correct answer.
B) Asymmetric-key


C) Secret-key


D) None of the choices are correct




__________means that the sender and the receiver expect confidentiality.


A) Non-repudiation


B) Integrity


C) Authentication

This is the correct answer.
D) None of the choices are correct




___________ means that the data must arrive at the receiver exactly as they were sent.


A) Non-repudiation

This is the correct answer.
B) Message integrity


C) Authentication


D) None of the choices are correct



_____________ means that the receiver needs to be sure of the sender identity and that an imposter has not sent the message.


A) Non-repudiation


B) Message integrity

This is the correct answer.
C) Message authentication


D) None of the choices are correct




______________ can provide authentication, integrity, and nonrepudiation for a message.


A) Encryption/decryption

This is the correct answer.
B) Digital signature


C) Compression


D) None of the choices are correct



Digital signature does not provide _________.


A) non-repudiation

This is the correct answer.
B) privacy


C) authentication


D) provides all of the above



In ___________, the entity identity is verified once for the entire duration of system access.


This is the correct answer.
A) entity authentication


B) message integrity


C) message authentication


D) None of the choices are correct




In __________ cryptography, everyone has access to everyone's public key.


A) symmetric-key

This is the correct answer.
B) asymmetric-key


C) secret-key


D) None of the choices are correct



After a message is encrypted, it is called _______.


A) plaintext

This is the correct answer.
B) ciphertext


C) cryptotext


D) None of the choices are correct




If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed.


A) 19


B) 20

This is the correct answer.
C) 190


D) 200



In the asymmetric-key method of cryptography, which key is publicly known?

This is the correct answer.
A) encryption key only


B) decryption key only


C) both keys


D) None of the choices are correct




In the asymmetric-key method of cryptography, the receiver has possession of the _______.

This is the correct answer.
A) private key


B) public key


C) none of the keys


D) None of the choices are correct




The RSA algorithm uses _______ cryptography method.

This is the correct answer.
A) an asymmetric-key


B) a private-key


C) a symmetric-key


D) None of the choices are correct




If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.


A) user A

This is the correct answer.
B) user B


C) the network


D) None of the choices are correct




In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.


A) his or her own symmetric key

This is the correct answer.
B) his or her own private key


C) his or her own public key


D) None of the choices are correct



In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.


A) her or his own symmetric key


B) her or his own private key

This is the correct answer.
C) the sender's public key


D) None of the choices are correct




A _______ is a trusted third party that solves the problem of symmetric-key distribution.


A) CA

This is the correct answer.
B) KDC


C) TLS


D) firewall




A _______ certifies the binding between a public key and its owner.

This is the correct answer.
A) CA


B) KDC


C) TLS


D) None of the choices are correct




To request the physical address of a host whose IP address is known, a _______ message is sent.


A) membership-query


B) router-solicitation

This is the correct answer.
C) neighbor-solicitation


D) neighbor-advertisement




If a host needs information about routers on the network, it sends a _______ message.


A) membership-report

This is the correct answer.
B) router-solicitation


C) neighbor-solicitation


D) neighbor-advertisement




The ARP function in version 4 is part of _______ in version 6.


A) echo request and reply


B) router solicitation and advertisement

This is the correct answer.
C) neighbor solicitation and advertisement


D) None of the choices are correct



The IGMP functions in version 4 are part of _______ messages in version 6.


A) echo request and reply


B) router solicitation and advertisement

This is the correct answer.
C) group membership


D) None of the choices are correct




The purpose of echo request and echo reply is to _______.


A) report errors

This is the correct answer.
B) check node-to-node communication


C) check group memberships


D) None of the choices are correct




In error reporting the encapsulated ICMP packet goes to _______.

This is the correct answer.
A) the source


B) the destination


C) a router


D) None of the choices are correct



In error reporting, a destination can send a _______ message if an option is not recognized.

This is the correct answer.
A) parameter-problem


B) packet-too-big


C) time-exceeded


D) None of the choices are correct




When the hop count field reaches zero and the destination has not been reached, a _______ error message is sent.


A) destination-unreachable

This is the correct answer.
B) time-exceeded


C) parameter-problem


D) None of the choices are correct




When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.


A) destination-unreachable


B) time-exceeded


C) parameter-problem
COMPUTER NETWORKS QUESTIONS-05

D) None of the choices are correct


Errors in the header or option fields of an IP datagram require a _______ error message.


A) destination-unreachable


B) time-exceeded

This is the correct answer.
C) parameter-problem


D) None of the choices are correct




The _______ packet contains information about a router.


A) router solicitation


B) router information

This is the correct answer.
C) router advertisement


D) None of the choices are correct




A router can send a _______ message to a host to inform it of a more efficient path.


A) neighbor-solicitation


B) router-solicitation

This is the correct answer.
C) redirection


D) None of the choices are correct




Which error-reporting message from version 4 has been eliminated in version 6?


A) packet too big


B) destination unreachable

This is the correct answer.
C) source quench


D) None of the choices are correct




Which error-reporting message is found in version 6 but not in version 4?

This is the correct answer.
A) packet too big


B) destination unreachable


C) parameter problem


D) None of the choices are correct



No comments:

Post a Comment