Deck 10: Cybersecurity: Data Protection

Full screen (f)
exit full mode
Question
Choose a CORRECT statement regarding the VPN (virtual private network) technology.

A) VPN generally costs high on network maintenance and administration.
B) VPN allows anywhere, anytime, and any-to-any connectivity because of the Internet's ubiquity.
C) VPN lacks flexibility in adding suppliers or customers of a firm to its enterprise network.
D) VPN offers reliable quality of services (QoS) for mission-critical applications over the Internet.
E) VPN is generally safer than leased lines in transporting sensitive data.
Use Space or
up arrow
down arrow
to flip the card.
Question
When a company tries to connect its suppliers through site-to-site VPNs to exchange invoices electronically, the _____ standard would be the most secure choice.

A) PPTP
B) IPsec
C) SSL
D) PPP
E) DES
Question
When IPv6 is in full swing, ________ technology is expected to become a requirement to protect data communications.

A) PPTP
B) IPsec
C) SSL
D) PPP
E) DES
Question
When IPsec and SSL technologies are compared:

A) IPsec and SSL technologies are defined at the internet layer
B) IPsec software should be installed in each user station in the "tunnel" mode, but SSL software is built into the web browser.
C) SSL has higher overhead than IPsec in setup, maintenance and update.
D) SSL is considered as secure as IPsec.
E) IPsec is considered technically more complex than SSL in implementing VPN.
Question
When the IPsec standard is used for VPN, both communicating parties exchange a(n) _____ for mutual authentication.

A) digital certificate
B) digital signature
C) IPsec gateway
D) IPsec-enabled web browser
E) session key
Question
The IPsec technology can be deployed in __________ modes.

A) site-to-site and remote access
B) tunnel and transport
C) tunnel and site-to-site
D) transport and remote access
E) site-to-site and transport
Question
Choose a CORRECT statement regarding SSL.

A) The technology is defined in the internetwork layer
B) Its usage requires that necessary software be separately purchased and installed.
C) It generally provides a higher level of security than IPsec.
D) It can be used for both site-to-site and remote access VPNs.
E) The software should be installed and maintained in each user station.
Question
The following are descriptions of IPsec tunnel mode EXCEPT:

A) IPsec servers are placed at the boundary of local sites securing all inter-site transactions.
B) Internal hosts are unaware of the IPsec server's existence, making it transparent to the hosts.
C) Packets inside of a corporate network remain unencrypted.
D) The tunnel mode is popular in implementing both remote access and site-to-site VPNs.
E) It provides end-to-end (or host-to-host) security.
Question
Which information may NOT be contained in the digital certificate?

A) Owner's name or alias
B) Owner's public key
C) Issuer's name
D) Owner's private key
E) Issuer's digital signature
Question
Which reflects a correct sequence of security standards from weak to strong?

A) WPA, WEP, WPA2
B) WPA2, WEP, WPA
C) WEP, WPA2, WPA
D) WEP, WPA, WPA2
E) WPA, WPA2, WEP
Question
The main components of a cryptography system include the following EXCEPT:

A) Plaintext
B) Ciphertext
C) Digital signature
D) Key value
E) Encryption algorithm
Question
The hash function is used to derive a __________ from an original message.

A) message digest
B) digital certificate
C) session key
D) public key
E) private key
Question
X.509 issued by ITU (International Telecommunications Union) defines a ____ standard.

A) digital signature
B) digital certificate
C) public key
D) message digest
E) access control list
Question
The following figure summarizes information items included in the ________. <strong>The following figure summarizes information items included in the ________.  </strong> A) Digital signature B) Digital certificate C) Public key D) Message digest E) Access control list <div style=padding-top: 35px>

A) Digital signature
B) Digital certificate
C) Public key
D) Message digest
E) Access control list
Question
Web browsers including Internet Explorer and Firefox have a built-in support for _____.

A) Packet Sniffing Detection
B) IP Spoofing Prevention
C) IP Spoofing Detection
D) Access Control List
E) SSL/TLS
Question
MD5 and SHA-1 are standards of:

A) encryption technologies
B) hashing algorithms (or functions)
C) digital certificate standards
D) well-known worms
E) well-known Trojan horses
Question
Choose an INCORRECT statement about the digital signature.

A) The message digest is a short message calculated from an original message.
B) A hash function is generally used to produce a message digest from the original message.
C) The message digest is encrypted with a receiver's public key, resulting in a digital signature.
D) The receiver computer decrypts the sender's digital signature using the sender's public key.
E) The receiver computer produces its own message digest based on the delivered message for comparison purpose.
Question
Choose the LEAST accurate statement of the public key encryption.

A) When A sends a message to B, A encrypts it with B's public key.
B) After A encrypts a message with B's public key, A can decrypt it using the same B's public key.
C) When A needs authentication to B, A encrypts a message with A's private key.
D) If A and B send messages to each other, each encrypts with the other's public key.
E) If A encrypts a message with B's public key, B's private key will decrypt it.
Question
Choose a CORRECT statement regarding Wi-Fi standards.

A) WPA is an official IEEE standard.
B) WPA and WPA2 rely on the same encryption standard.
C) With WPA, the pre-shared key is permanently used making it vulnerable for password cracking.
D) The home network relies on centralized authentication between hosts and an authentication server.
E) To derive pre-shared keys in WEP or WPA-PSK, passwords/passphrases are heavily used.
Question
In total, how many different keys should be used for secure communication between two parties when it relies on the asymmetric key encryption?

A) 0
B) 1
C) 2
D) 4
E) 8
Question
The PKI servers of a certificate authority perform the following functions except:

A) create digital certificates
B) maintain a certificate revocation list
C) distribute digital certificates
D) securely distribute private keys
E) perform security testing of a business system
Question
The cipher text is _________.

A) a message digest produced from an original text
B) a message digest produced from an encrypted text
C) an original text to be encrypted.
D) an encrypted text
E) an encrypted text that has been compromised.
Question
How to combine asymmetric and symmetric key encryptions to make the most of their strengths? Choose the LEAST accurate statement in describing the procedure from A to E.

A) Party A creates a single key for a session (called session key).
B) Party A encrypts the session key using Party B's private key and sends it to Party B.
C) Party B decrypts that secret session key with Party B's private key.
D) Both parties now encrypt data with the session key.
E) With the session key, encryption and decryption are faster than using the asymmetric key system.
Question
Which is CORRECT about hashing?

A) Hashing takes an input of any lengths and produces a variable-length hash value.
B) The hash function is also known as a message digest.
C) A dataset cannot be created in order to produce a predefined hash value.
D) The probability of different messages to produce the same hash value is zero.
E) A hash value can be reversed to restore the original input.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Cybersecurity: Data Protection
1
Choose a CORRECT statement regarding the VPN (virtual private network) technology.

A) VPN generally costs high on network maintenance and administration.
B) VPN allows anywhere, anytime, and any-to-any connectivity because of the Internet's ubiquity.
C) VPN lacks flexibility in adding suppliers or customers of a firm to its enterprise network.
D) VPN offers reliable quality of services (QoS) for mission-critical applications over the Internet.
E) VPN is generally safer than leased lines in transporting sensitive data.
B
2
When a company tries to connect its suppliers through site-to-site VPNs to exchange invoices electronically, the _____ standard would be the most secure choice.

A) PPTP
B) IPsec
C) SSL
D) PPP
E) DES
B
3
When IPv6 is in full swing, ________ technology is expected to become a requirement to protect data communications.

A) PPTP
B) IPsec
C) SSL
D) PPP
E) DES
B
4
When IPsec and SSL technologies are compared:

A) IPsec and SSL technologies are defined at the internet layer
B) IPsec software should be installed in each user station in the "tunnel" mode, but SSL software is built into the web browser.
C) SSL has higher overhead than IPsec in setup, maintenance and update.
D) SSL is considered as secure as IPsec.
E) IPsec is considered technically more complex than SSL in implementing VPN.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
When the IPsec standard is used for VPN, both communicating parties exchange a(n) _____ for mutual authentication.

A) digital certificate
B) digital signature
C) IPsec gateway
D) IPsec-enabled web browser
E) session key
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
The IPsec technology can be deployed in __________ modes.

A) site-to-site and remote access
B) tunnel and transport
C) tunnel and site-to-site
D) transport and remote access
E) site-to-site and transport
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Choose a CORRECT statement regarding SSL.

A) The technology is defined in the internetwork layer
B) Its usage requires that necessary software be separately purchased and installed.
C) It generally provides a higher level of security than IPsec.
D) It can be used for both site-to-site and remote access VPNs.
E) The software should be installed and maintained in each user station.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
The following are descriptions of IPsec tunnel mode EXCEPT:

A) IPsec servers are placed at the boundary of local sites securing all inter-site transactions.
B) Internal hosts are unaware of the IPsec server's existence, making it transparent to the hosts.
C) Packets inside of a corporate network remain unencrypted.
D) The tunnel mode is popular in implementing both remote access and site-to-site VPNs.
E) It provides end-to-end (or host-to-host) security.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
Which information may NOT be contained in the digital certificate?

A) Owner's name or alias
B) Owner's public key
C) Issuer's name
D) Owner's private key
E) Issuer's digital signature
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Which reflects a correct sequence of security standards from weak to strong?

A) WPA, WEP, WPA2
B) WPA2, WEP, WPA
C) WEP, WPA2, WPA
D) WEP, WPA, WPA2
E) WPA, WPA2, WEP
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
The main components of a cryptography system include the following EXCEPT:

A) Plaintext
B) Ciphertext
C) Digital signature
D) Key value
E) Encryption algorithm
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
The hash function is used to derive a __________ from an original message.

A) message digest
B) digital certificate
C) session key
D) public key
E) private key
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
X.509 issued by ITU (International Telecommunications Union) defines a ____ standard.

A) digital signature
B) digital certificate
C) public key
D) message digest
E) access control list
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
The following figure summarizes information items included in the ________. <strong>The following figure summarizes information items included in the ________.  </strong> A) Digital signature B) Digital certificate C) Public key D) Message digest E) Access control list

A) Digital signature
B) Digital certificate
C) Public key
D) Message digest
E) Access control list
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
Web browsers including Internet Explorer and Firefox have a built-in support for _____.

A) Packet Sniffing Detection
B) IP Spoofing Prevention
C) IP Spoofing Detection
D) Access Control List
E) SSL/TLS
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
MD5 and SHA-1 are standards of:

A) encryption technologies
B) hashing algorithms (or functions)
C) digital certificate standards
D) well-known worms
E) well-known Trojan horses
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
Choose an INCORRECT statement about the digital signature.

A) The message digest is a short message calculated from an original message.
B) A hash function is generally used to produce a message digest from the original message.
C) The message digest is encrypted with a receiver's public key, resulting in a digital signature.
D) The receiver computer decrypts the sender's digital signature using the sender's public key.
E) The receiver computer produces its own message digest based on the delivered message for comparison purpose.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
Choose the LEAST accurate statement of the public key encryption.

A) When A sends a message to B, A encrypts it with B's public key.
B) After A encrypts a message with B's public key, A can decrypt it using the same B's public key.
C) When A needs authentication to B, A encrypts a message with A's private key.
D) If A and B send messages to each other, each encrypts with the other's public key.
E) If A encrypts a message with B's public key, B's private key will decrypt it.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
Choose a CORRECT statement regarding Wi-Fi standards.

A) WPA is an official IEEE standard.
B) WPA and WPA2 rely on the same encryption standard.
C) With WPA, the pre-shared key is permanently used making it vulnerable for password cracking.
D) The home network relies on centralized authentication between hosts and an authentication server.
E) To derive pre-shared keys in WEP or WPA-PSK, passwords/passphrases are heavily used.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
In total, how many different keys should be used for secure communication between two parties when it relies on the asymmetric key encryption?

A) 0
B) 1
C) 2
D) 4
E) 8
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
The PKI servers of a certificate authority perform the following functions except:

A) create digital certificates
B) maintain a certificate revocation list
C) distribute digital certificates
D) securely distribute private keys
E) perform security testing of a business system
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
The cipher text is _________.

A) a message digest produced from an original text
B) a message digest produced from an encrypted text
C) an original text to be encrypted.
D) an encrypted text
E) an encrypted text that has been compromised.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
How to combine asymmetric and symmetric key encryptions to make the most of their strengths? Choose the LEAST accurate statement in describing the procedure from A to E.

A) Party A creates a single key for a session (called session key).
B) Party A encrypts the session key using Party B's private key and sends it to Party B.
C) Party B decrypts that secret session key with Party B's private key.
D) Both parties now encrypt data with the session key.
E) With the session key, encryption and decryption are faster than using the asymmetric key system.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
Which is CORRECT about hashing?

A) Hashing takes an input of any lengths and produces a variable-length hash value.
B) The hash function is also known as a message digest.
C) A dataset cannot be created in order to produce a predefined hash value.
D) The probability of different messages to produce the same hash value is zero.
E) A hash value can be reversed to restore the original input.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.