Deck 8: Cryptography and Network Protocols

Full screen (f)
exit full mode
Question
A(n) _________ can be used to preserve the integrity of a document or a message.

A)message digest
B)message summary
C)encrypted message
D)none of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
A(n) ________function creates a message digest out of a message.

A)encryption
B)decryption
C)hash
D)none of the above
Question
A hash function must meet ________ criteria.

A)two
B)three
C)four
D)none of the above
Question
Challenge-response authentication can be done using ________.

A)symmetric-key ciphers
B)asymmetric-key ciphers
C)keyed-hash functions
D)all of the above
Question
A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A)KDC
B)CA
C)KDD
D)none of the above
Question
The _____________ translates internet domain and host names to IP address.

A)domain name system
B)routing information protocol
C)network time protocol
D)internet relay chat
Question
Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?

A)HTTP
B)FTP
C)telnet
D)none
Question
Application layer protocol defines

A)types of messages exchanged
B)message format, syntax and semantics
C)rules for when and how processes send and respond to messages
D)all of the above
Question
Which one of the following protocol delivers/stores mail to reciever server?

A)simple mail transfer protocol
B)post office protocol
C)internet mail access protocol
D)hypertext transfer protocol
Question
Which one of the following is an internet standard protocol for managing devices on IP network?

A)dynamic host configuration protocol
B)simple network management protocol
C)internet message access protocol
D)media gateway protocol
Question
User datagram protocol is called connectionless because

A)all UDP packets are treated independently by transport layer
B)it sends data as a stream of related packets
C)both (a) and (b)
D)none of the above
Question
Transmission control protocol is

A)connection oriented protocol
B)uses a three way handshake to establish a connection
C)recievs data from application as a single stream
D)all of the above
Question
An endpoint of an inter-process communication flow across a computer network is called

A)socket
B)pipe
C)port
D)none of the above
Question
Transport layer aggregates data from different applications into a single stream before passing it to

A)network layer
B)data link layer
C)application layer
D)physical layer
Question
The ASCII encoding of binary data is called

A)base 64 encoding
B)base 32 encoding
C)base 16 encoding
D)base 8 encoding
Question
A high speed communication equipment typically would not be needed for

A)E-mail
B)Transferring large volume of data
C)Supporting communication between nodes in a LAN
D)All of these
Question
What is Unicode?

A)Represents symbol or characters used in any langua
B)Only few languages are supported
C)Supports only few characters
D)Characters from A to Z
Question
In OSI model dialogue control and token management are responsibilities of ?

A)Session Layer
B)Network layer
C)Transport layer
D)Data link layer
Question
An asymmetric-key (or public-key) cipher uses

A)1 Key
B)2 Key
C)3 Key
D)4 Key
Question
A straight permutation cipher or a straight P-box has same number of inputs as

A)cipher
B)Frames
C)Outputs
D)Bits
Question
Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not

A)Authenticated
B)Joined
C)Submit
D)Separate
Question
We use Cryptography term to transforming messages to make them secure and immune to

A)Change
B)Idle
C)Attacks
D)Defend
Question
Shift cipher is sometimes referred to as the

A)Caesar cipher
B)Shift cipher
C)cipher
D)cipher text
Question
Substitutional cipers are

A)Monoalphabatic
B)Sami alphabetic
C)polyalphabetic
D)both a and c
Question
Heart of Data Encryption Standard (DES), is the

A)Cipher
B)Rounds
C)Encryption
D)DES function
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Cryptography and Network Protocols
1
A(n) _________ can be used to preserve the integrity of a document or a message.

A)message digest
B)message summary
C)encrypted message
D)none of the above
message digest
2
A(n) ________function creates a message digest out of a message.

A)encryption
B)decryption
C)hash
D)none of the above
hash
3
A hash function must meet ________ criteria.

A)two
B)three
C)four
D)none of the above
three
4
Challenge-response authentication can be done using ________.

A)symmetric-key ciphers
B)asymmetric-key ciphers
C)keyed-hash functions
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

A)KDC
B)CA
C)KDD
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
The _____________ translates internet domain and host names to IP address.

A)domain name system
B)routing information protocol
C)network time protocol
D)internet relay chat
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?

A)HTTP
B)FTP
C)telnet
D)none
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Application layer protocol defines

A)types of messages exchanged
B)message format, syntax and semantics
C)rules for when and how processes send and respond to messages
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Which one of the following protocol delivers/stores mail to reciever server?

A)simple mail transfer protocol
B)post office protocol
C)internet mail access protocol
D)hypertext transfer protocol
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Which one of the following is an internet standard protocol for managing devices on IP network?

A)dynamic host configuration protocol
B)simple network management protocol
C)internet message access protocol
D)media gateway protocol
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
User datagram protocol is called connectionless because

A)all UDP packets are treated independently by transport layer
B)it sends data as a stream of related packets
C)both (a) and (b)
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Transmission control protocol is

A)connection oriented protocol
B)uses a three way handshake to establish a connection
C)recievs data from application as a single stream
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
An endpoint of an inter-process communication flow across a computer network is called

A)socket
B)pipe
C)port
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Transport layer aggregates data from different applications into a single stream before passing it to

A)network layer
B)data link layer
C)application layer
D)physical layer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The ASCII encoding of binary data is called

A)base 64 encoding
B)base 32 encoding
C)base 16 encoding
D)base 8 encoding
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
A high speed communication equipment typically would not be needed for

A)E-mail
B)Transferring large volume of data
C)Supporting communication between nodes in a LAN
D)All of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
What is Unicode?

A)Represents symbol or characters used in any langua
B)Only few languages are supported
C)Supports only few characters
D)Characters from A to Z
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
In OSI model dialogue control and token management are responsibilities of ?

A)Session Layer
B)Network layer
C)Transport layer
D)Data link layer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
An asymmetric-key (or public-key) cipher uses

A)1 Key
B)2 Key
C)3 Key
D)4 Key
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
A straight permutation cipher or a straight P-box has same number of inputs as

A)cipher
B)Frames
C)Outputs
D)Bits
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not

A)Authenticated
B)Joined
C)Submit
D)Separate
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
We use Cryptography term to transforming messages to make them secure and immune to

A)Change
B)Idle
C)Attacks
D)Defend
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Shift cipher is sometimes referred to as the

A)Caesar cipher
B)Shift cipher
C)cipher
D)cipher text
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Substitutional cipers are

A)Monoalphabatic
B)Sami alphabetic
C)polyalphabetic
D)both a and c
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Heart of Data Encryption Standard (DES), is the

A)Cipher
B)Rounds
C)Encryption
D)DES function
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.