Deck 5: Network Security and Cryptographic Protocols
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
Play
Full screen (f)
Deck 5: Network Security and Cryptographic Protocols
1
______________is used for encrypting data at network level
A)ipsec
B)https
C)smtp
D)s/mime
A)ipsec
B)https
C)smtp
D)s/mime
ipsec
2
WPA2 is used for security in ____________________________
A)ethernet
B)wi-fi
C)bluetooth
D)e-mail
A)ethernet
B)wi-fi
C)bluetooth
D)e-mail
wi-fi
3
Which of the following is not a strong security protocol
A)ssl
B)httpl
C)smtp
D)sftp
A)ssl
B)httpl
C)smtp
D)sftp
smtp
4
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
IPSec operates in..... different modes
A)3
B)2
C)4
D)5
A)3
B)2
C)4
D)5
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
length of the IPv4 address is ....
A)32 bits
B)64 bits
C)16 bits
D)128 bit
A)32 bits
B)64 bits
C)16 bits
D)128 bit
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Internet Key Exchange has .... phases and modes of operations
A)4
B)3
C)2
D)5
A)4
B)3
C)2
D)5
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
PGP is abbreviated as
A)pretty good privacy
B)pretty good policy
C)policy good privacy
D)pretty good protection
A)pretty good privacy
B)pretty good policy
C)policy good privacy
D)pretty good protection
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
SET stands for
A)set electronic transaction
B)secure electronic transaction
C)simple electronic transaction
D)none of the above
A)set electronic transaction
B)secure electronic transaction
C)simple electronic transaction
D)none of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Transport layer Protocol consists of ... main components
A)2
B)1
C)3
D)4
A)2
B)1
C)3
D)4
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
SSL provides .
A)message integrity
B)confidentiality
C)compression
D)all of the above
A)message integrity
B)confidentiality
C)compression
D)all of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
IPSec provides ....protocols for network layer
A)7
B)3
C)1
D)4
A)7
B)3
C)1
D)4
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
length of the IPv6 header is....
A)64 bits
B)16 bits
C)32 bits
D)8 bits
A)64 bits
B)16 bits
C)32 bits
D)8 bits
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
A)confidentiality
B)integrity
C)authenticity
D)availability
A)confidentiality
B)integrity
C)authenticity
D)availability
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
CIA triad is also known as ____________________________
A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
____________________________ of information means, only authorised users are capable of accessing the information.
A)confidentiality
B)integrity
C)non-repudiation
D)availability
A)confidentiality
B)integrity
C)non-repudiation
D)availability
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
____________________________ means the protection of data from modification by unknown users.
A)confidentiality
B)integrity
C)authentication
D)non-repudiation
A)confidentiality
B)integrity
C)authentication
D)non-repudiation
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
When you use the word it means you are protecting your data from getting disclosed.
A)confidentiality
B)integrity
C)authentication
D)availability
A)confidentiality
B)integrity
C)authentication
D)availability
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
When integrity is lacking in a security system, __________________________________________ occurs.
A)database hacking
B)data deletion
C)data tampering
D)data leakage
A)database hacking
B)data deletion
C)data tampering
D)data leakage
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
This helps in identifying the origin of information and authentic user. This referred to here as __________________________________________
A)confidentiality
B)integrity
C)authenticity
D)availability
A)confidentiality
B)integrity
C)authenticity
D)availability
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
Data is used to ensure confidentiality.
A)encryption
B)locking
C)deleting
D)backup
A)encryption
B)locking
C)deleting
D)backup
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
Data integrity gets compromised when and are taken control off.
A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
____________________________ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
A)network security
B)database security
C)information security
D)physical security
A)network security
B)database security
C)information security
D)physical security
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck