Deck 7: Cryptography and Security Measures in Network Communication

Full screen (f)
exit full mode
Question
In tunnel mode, IPSec protects the ______

A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
Use Space or
up arrow
down arrow
to flip the card.
Question
Pretty good privacy (PGP) is used in ______

A)browser security
B)email security
C)ftp security
D)wifi security
Question
PGP encrypts data by using a block cipher called ______

A)international data encryption algorithm
B)private data encryption algorithm
C)internet data encryption algorithm
D)local data encryption algorithm
Question
IKE creates SAs for _____.

A)ssl
B)pgp
C)ipsec
D)vp
Question
SSL provides _________.

A)message integrity
B)confidentiality
C)compression
D)all of the above
Question
IKE uses _______

A)oakley
B)skeme
C)isakmp
D)all of the above
Question
In ______, there is a single path from the fully trusted authority to any certificate.

A)x509
B)pgp
C)kdc
D)none of the above
Question
_______ uses the idea of certificate trust levels.

A)x509
B)pgp
C)kdc
D)none of the above
Question
________ provides privacy, integrity, and authentication in e-mail.

A)ipsec
B)ssl
C)pgp
D)none of the above
Question
In _____, there can be multiple paths from fully or partially trusted authorities.

A)x509
B)pgp
C)kdc
D)none of the above
Question
______ provides authentication at the IP level.

A)ah
B)esp
C)pgp
D)ssl
Question
In _______, the cryptographic algorithms and secrets are sent with the message.

A)ipsec
B)ssl
C)tls
D)pgp
Question
______ was invented by Phil Zimmerman.

A)ipsec
B)ssl
C)pgp
D)none of the above
Question
ISAKMP stands for ______

A)internet system association and key management packet
B)internet security association and key management protocol
C)interchange system and key modeling protocol
D)internet security association and key modeling protocol
Question
PGP makes use of which cryptographic algorithm?

A)des
B)aes
C)rsa
D)rabin
Question
What is the key size allowed in PGP?

A)1024-1056
B)1024-4056
C)1024-4096
D)1024-2048
Question
In SSL, what is used for authenticating a message?

A)mac (message access code)
B)mac (message authentication code)
C)mac (machine authentication code)
D)mac (machine access code)
Question
Security Measures Needed to protect ________ during their transmission

A)file
B)data
C)packet
D)all of above
Question
__________ means knowledge obtained from investigation, study , intelligence new ,facts .

A)security
B)data
C)information
D)none of these
Question
Protection against Denial by one of these parties in a communication refers to?

A)non-repudiation
B)data integrity
C)authentication
D)none of these
Question
Which One of them is Passive attack?

A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
Question
What is lying of IP address called as?

A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
Question
What is full form of DDoS?

A)derived denial of service
B)distributed denial of service
C)denial of service
D)none of these
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Cryptography and Security Measures in Network Communication
1
In tunnel mode, IPSec protects the ______

A)entire ip packet
B)ip header
C)ip payload
D)ip trailer
entire ip packet
2
Pretty good privacy (PGP) is used in ______

A)browser security
B)email security
C)ftp security
D)wifi security
email security
3
PGP encrypts data by using a block cipher called ______

A)international data encryption algorithm
B)private data encryption algorithm
C)internet data encryption algorithm
D)local data encryption algorithm
international data encryption algorithm
4
IKE creates SAs for _____.

A)ssl
B)pgp
C)ipsec
D)vp
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
SSL provides _________.

A)message integrity
B)confidentiality
C)compression
D)all of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
IKE uses _______

A)oakley
B)skeme
C)isakmp
D)all of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
In ______, there is a single path from the fully trusted authority to any certificate.

A)x509
B)pgp
C)kdc
D)none of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
_______ uses the idea of certificate trust levels.

A)x509
B)pgp
C)kdc
D)none of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
________ provides privacy, integrity, and authentication in e-mail.

A)ipsec
B)ssl
C)pgp
D)none of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
In _____, there can be multiple paths from fully or partially trusted authorities.

A)x509
B)pgp
C)kdc
D)none of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
______ provides authentication at the IP level.

A)ah
B)esp
C)pgp
D)ssl
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
In _______, the cryptographic algorithms and secrets are sent with the message.

A)ipsec
B)ssl
C)tls
D)pgp
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
______ was invented by Phil Zimmerman.

A)ipsec
B)ssl
C)pgp
D)none of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
ISAKMP stands for ______

A)internet system association and key management packet
B)internet security association and key management protocol
C)interchange system and key modeling protocol
D)internet security association and key modeling protocol
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
PGP makes use of which cryptographic algorithm?

A)des
B)aes
C)rsa
D)rabin
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
What is the key size allowed in PGP?

A)1024-1056
B)1024-4056
C)1024-4096
D)1024-2048
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
In SSL, what is used for authenticating a message?

A)mac (message access code)
B)mac (message authentication code)
C)mac (machine authentication code)
D)mac (machine access code)
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
Security Measures Needed to protect ________ during their transmission

A)file
B)data
C)packet
D)all of above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
__________ means knowledge obtained from investigation, study , intelligence new ,facts .

A)security
B)data
C)information
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
Protection against Denial by one of these parties in a communication refers to?

A)non-repudiation
B)data integrity
C)authentication
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
Which One of them is Passive attack?

A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
What is lying of IP address called as?

A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
What is full form of DDoS?

A)derived denial of service
B)distributed denial of service
C)denial of service
D)none of these
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 23 flashcards in this deck.