Exam 5: Network Security and Cryptographic Protocols

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

Free
(True/False)
4.8/5
(28)
Correct Answer:
Verified

True

Internet Key Exchange has .... phases and modes of operations

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

C

SSL provides .

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

Data integrity gets compromised when and are taken control off.

(Multiple Choice)
4.9/5
(31)

CIA triad is also known as ____________________________   

(Multiple Choice)
4.9/5
(38)

When integrity is lacking in a security system, __________________________________________  occurs.

(Multiple Choice)
5.0/5
(36)

SET stands for

(Multiple Choice)
4.9/5
(36)

length of the IPv4 address is ....

(Multiple Choice)
4.9/5
(32)

According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

(Multiple Choice)
4.7/5
(42)

IPSec operates in..... different modes

(Multiple Choice)
4.8/5
(37)

When you use the word it means you are protecting your data from getting disclosed.

(Multiple Choice)
4.8/5
(27)

______________is used for encrypting data at network level

(Multiple Choice)
4.8/5
(27)

length of the IPv6 header is....

(Multiple Choice)
4.7/5
(34)

Transport layer Protocol consists of ... main components

(Multiple Choice)
4.8/5
(28)

WPA2 is used for security in ____________________________   

(Multiple Choice)
4.9/5
(40)

____________________________  means the protection of data from modification by unknown users.

(Multiple Choice)
4.9/5
(37)

IPSec provides ....protocols for network layer

(Multiple Choice)
4.8/5
(39)

Data is used to ensure confidentiality.

(Multiple Choice)
4.9/5
(34)

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

(Multiple Choice)
4.8/5
(36)

This helps in identifying the origin of information and authentic user. This referred to here as __________________________________________

(Multiple Choice)
5.0/5
(36)
Showing 1 - 20 of 24
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)