Deck 6: Cryptography and VPNS

Full screen (f)
exit full mode
Question
ECC encryption system is __________

A)symmetric key encryption algorithm
B)asymmetric key encryption algorithm
C)not an encryption algorithm
D)block cipher method
Use Space or
up arrow
down arrow
to flip the card.
Question
________function creates a message digest out of a message.

A)encryption
B)decryption
C)hash
D)none of the above
Question
Extensions to the X.509 certificates were added in version ____

A)1
B)2
C)3
D)4
Question
A digital signature needs ____ system

A)symmetric-key
B)asymmetric-key
C)either (a) or (b)
D)neither (a) nor (b)
Question
"Elliptic curve cryptography follows the associative property."
Question
ECC stands for

A)elliptic curve cryptography
B)enhanced curve cryptography
C)elliptic cone cryptography
D)eclipse curve cryptography
Question
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user's public key.
Question
The DSS signature uses which hash algorithm?

A)md5
B)sha-2
C)sha-1
D)does not use hash algorithm
Question
What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

A)42 bytes
B)32 bytes
C)36 bytes
D)48 bytes
Question
In the handshake protocol which is the message type first sent between client and server ?

A)server_hello
B)client_hello
C)hello_request
D)certificate_request
Question
One commonly used public-key cryptography method is the ______ algorithm.

A)rss
B)ras
C)rsa
D)raa
Question
he ________ method provides a one-time session key for two parties.

A)diffie-hellman
B)rsa
C)des
D)aes
Question
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.

A)man-in-the-middle
B)ciphertext attack
C)plaintext attack
D)none of the above
Question
1. VPN is abbreviated as __________

A)visual private network
B)virtual protocol network
C)virtual private network
D)virtual protocol networking
Question
__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

A)visual private network
B)virtual protocol network
C)virtual protocol networking
D)virtual private network
Question
Which of the statements are not true to classify VPN systems?

A)protocols used for tunnelling the traffic
B)whether vpns are providing site-to-site or remote access connection
C)securing the network from bots and malwares
D)levels of security provided for sending and receiving data privately
Question
What types of protocols are used in VPNs?

A)application level protocols
B)tunnelling protocols
C)network protocols
D)mailing protocols
Question
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
Question
There are _________ types of VPNs.

A)3
B)2
C)5
D)4
Question
_________ type of VPNs are used for home private and secure connectivity.

A)remote access vpns
B)site-to-site vpns
C)peer-to-peer vpns
D)router-to-router vpns
Question
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?

A)remote access vpns
B)site-to-site vpns
C)peer-to-peer vpns
D)country-to-country vpns
Question
Site-to-Site VPN architecture is also known as _________

A)remote connection based vpns
B)peer-to-peer vpns
C)extranet based vpn
D)country-to-country vpns
Question
There are ________ types of VPN protocols.

A)3
B)4
C)5
D)6
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Cryptography and VPNS
1
ECC encryption system is __________

A)symmetric key encryption algorithm
B)asymmetric key encryption algorithm
C)not an encryption algorithm
D)block cipher method
asymmetric key encryption algorithm
2
________function creates a message digest out of a message.

A)encryption
B)decryption
C)hash
D)none of the above
hash
3
Extensions to the X.509 certificates were added in version ____

A)1
B)2
C)3
D)4
3
4
A digital signature needs ____ system

A)symmetric-key
B)asymmetric-key
C)either (a) or (b)
D)neither (a) nor (b)
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
"Elliptic curve cryptography follows the associative property."
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
ECC stands for

A)elliptic curve cryptography
B)enhanced curve cryptography
C)elliptic cone cryptography
D)eclipse curve cryptography
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user's public key.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
The DSS signature uses which hash algorithm?

A)md5
B)sha-2
C)sha-1
D)does not use hash algorithm
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

A)42 bytes
B)32 bytes
C)36 bytes
D)48 bytes
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
In the handshake protocol which is the message type first sent between client and server ?

A)server_hello
B)client_hello
C)hello_request
D)certificate_request
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
One commonly used public-key cryptography method is the ______ algorithm.

A)rss
B)ras
C)rsa
D)raa
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
he ________ method provides a one-time session key for two parties.

A)diffie-hellman
B)rsa
C)des
D)aes
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.

A)man-in-the-middle
B)ciphertext attack
C)plaintext attack
D)none of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
1. VPN is abbreviated as __________

A)visual private network
B)virtual protocol network
C)virtual private network
D)virtual protocol networking
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

A)visual private network
B)virtual protocol network
C)virtual protocol networking
D)virtual private network
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the statements are not true to classify VPN systems?

A)protocols used for tunnelling the traffic
B)whether vpns are providing site-to-site or remote access connection
C)securing the network from bots and malwares
D)levels of security provided for sending and receiving data privately
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
What types of protocols are used in VPNs?

A)application level protocols
B)tunnelling protocols
C)network protocols
D)mailing protocols
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
There are _________ types of VPNs.

A)3
B)2
C)5
D)4
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
_________ type of VPNs are used for home private and secure connectivity.

A)remote access vpns
B)site-to-site vpns
C)peer-to-peer vpns
D)router-to-router vpns
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?

A)remote access vpns
B)site-to-site vpns
C)peer-to-peer vpns
D)country-to-country vpns
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
Site-to-Site VPN architecture is also known as _________

A)remote connection based vpns
B)peer-to-peer vpns
C)extranet based vpn
D)country-to-country vpns
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
There are ________ types of VPN protocols.

A)3
B)4
C)5
D)6
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 23 flashcards in this deck.