
















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
NETSEC 3 EXAM QUESTIONS AND CORRECT ANSWERS 100% VERIFIED!!
Typology: Exams
1 / 24
This page cannot be seen from the preview
Don't miss anything!
________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer. A) Cryptography B) Encryption C) Authentication D) Confidentiality - ANSWER A
________ is the security guarantee that people who intercept messages cannot read them. A) Integrity B) Availability C) Confidentiality D) Encryption - ANSWER C
Which of the following is transmitted across a network? A) The plaintext B) The ciphertext C) Both A and B D) Neither A nor B - ANSWER B
A ________ is a mathematical process used in encryption and decryption. A) key B) cipher C) plaintext
D) coding method - ANSWER B
A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages. A) key B) cipher C) plaintext D) code - ANSWER A
Someone who breaks encryption is called a ________. A) cracker B) coder C) hacker D) cryptanalyst - ANSWER D
________ ciphers move letters around within a message but characters are not substituted. A) Transposition B) Substitution C) Both A and B D) Neither A nor B - ANSWER A
________ ciphers leave letters in their original positions. A) Transposition B) Substitution C) Both A and B D) Neither A nor B - ANSWER B
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits? A) 7 times as long B) 14 times as long C) 128 times as long D) 256 times as long - ANSWER C
In order to be considered strong today, a symmetric encryption key must be at least ________ bits long. A) 6 B) 8 C) 100 D) 1,000 - ANSWER C
Which of the following statements accurately describes RC4? A) RC4 is extremely fast. B) RC4 always uses a 40-bit key. C) Both A and B D) Neither A nor B - ANSWER A
Which of the following statements accurately describes RC4? A) RC4 is very slow. B) RC4 uses a large amount of RAM. C) RC4 can use a broad range of key lengths. D) All of the above - ANSWER C
To meet national export limitation in many countries, RC4 often uses a key length of ________ bits.
A DES key is 40 bits long. - ANSWER FALSE
A DES key is ________ bits long. A) 40 B) 56 C) 100 D) 128 - ANSWER B
The 56-bit key size ________. A) is sufficient for major business transactions B) is sufficient for most residential consumer applications C) is considered a strong length D) All of the above - ANSWER B
DES uses block encryption. - ANSWER TRUE
Which of the following is one of the effective key lengths in 3DES? A) 56 bits B) 100 bits C) 112 bits D) None of the above - ANSWER C
________ occurs when companies believe they have good security because they are using proprietary ciphers that hackers do not know. A) Security through obscurity B) Weakest link ignorance C) Reasonable protection D) Hidden security - ANSWER A
Packaged sets of cryptographic countermeasures for protecting data transmission are ________. A) cryptographic standards B) metacryptographic systems C) cryptographic systems D) All of the above - ANSWER C
In cryptographic systems, the negotiation of security methods and options takes place during the ________ handshaking stage. A) first B) second C) third D) None of the above - ANSWER A
Someone who pretends to be someone else is ________. A) a social engineer B) a hacker C) a cryptanalyst D) an impostor - ANSWER D
Proving your identity to a communication partner is ________.
A) validation B) identification C) authentication D) certification - ANSWER C
When both parties prove their identities to the other, this is called ________. A) mutual authentication B) symmetric authentication C) authentication D) dual authentication - ANSWER A
In cryptographic systems, keying takes place during the second handshaking stage.
What protection do cryptographic systems provide on a message-by-message basis? A) Message authentication B) Message integrity C) Message confidentiality D) All of the above - ANSWER D
Electronic signatures usually provide ________. A) message-by-message authentication B) message integrity C) Both A and B D) Neither A nor B - ANSWER C
What usually is the longest stage in a cryptographic system dialogue?
Hashing is ________. A) reversible B) repeatable C) Both A and B D) Neither A nor B - ANSWER B
When a hashing algorithm is applied, the hash will ALWAYS have a fixed length. - ANSWER TRUE
The hash size in MD-5 is 160 bits. - ANSWER FALSE
The hash size in SHA-1 is 160 bits. - ANSWER TRUE
What is the hash size of SHA-256? A) 112 bits B) 128 bits C) 160 bits D) 256 bits - ANSWER D
Cryptanalysts have found weaknesses in ________. A) MD B) SHA- C) Both A and B D) Neither A nor B - ANSWER A
MS-CHAP is used for ________ authentication.
A) initial B) message-by-message C) Both A and B D) Neither A nor B - ANSWER A
In MS-CHAP, the ________ creates the response message. A) supplicant B) verifier C) Both A and B D) Neither A nor B - ANSWER A
Which encryption method does MS-CHAP use? A) Symmetric key encryption B) Public key encryption C) Both A and B D) Neither A nor B - ANSWER D
MS-CHAP provides mutual authentication. - ANSWER FALSE
When Emma sends a message to Lucy, Emma will use the public key to encrypt it. - ANSWER FALSE
When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message. A) the public key B) Joshua's public key C) Larry's public key D) Larry's private key - ANSWER C
Strong RSA keys are at least ________ bits long. A) 100 B) 256 C) 512 D) 1,024 - ANSWER D
Julia encrypts a message to David using public key encryption for confidentiality. After encrypting the message, can Julia decrypt it? - ANSWER FALSE
Symmetric session key exchange can be done with public key encryption. - ANSWER TRUE
Which of the following can be used as a keying method? A) Public key encryption for confidentiality B) MS-CHAP C) Both A and B D) None of the above - ANSWER A
An attacker who captures the keying information in Diffie-Hellman key agreement can compute the symmetric session key. - ANSWER FALSE
In public key encryption for authentication, the supplicant uses ________ to encrypt. A) the supplicant's private key B) the supplicant's public key C) the verifier's private key D) the verifier's public key - ANSWER A
For message-by-message authentication, each message must contain an electronic signature. - ANSWER TRUE
In public key encryption for authentication, the verifier decrypts the ciphertext with the supplicant's public key. - ANSWER FALSE
In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier's public key. - ANSWER FALSE
The person the supplicant claims to be is the true party. - ANSWER TRUE
In public key encryption for authentication, the supplicant must prove that it knows ________, which nobody else should be able to know. A) the supplicant's public key B) the supplicant's private key C) the true party's private key D) the verifier's private key - ANSWER C
Digital signatures are used for ________ authentication. A) initial B) message-by-message C) Both A and B D) Neither A nor B - ANSWER B
The supplicant creates a message digest by ________. A) adding the password to the challenge message and hashing the two B) hashing the plaintext message C) encrypting the message digest with its own private key D) None of the above. - ANSWER B
C) Both A and B D) Neither A nor B - ANSWER C
Most message-by-message authentication methods provide message integrity as a by-products. - ANSWER TRUE
The sender the uses public key of the recipient in ________. A) public key encryption for confidentiality B) public key encryption for authentication C) Both A and B D) Neither A nor B - ANSWER A
In public key encryption for authentication, the receiver decrypts with the public key of the sender. - ANSWER FALSE
Which of the following fields are contained on a digital certificate? A) Public key B) Digital signature C) Serial number D) All of the above - ANSWER D
It is OK for a verifier to receive digital certificates from the sender. - ANSWER TRUE
Most CAs are not regulated. - ANSWER TRUE
A digital certificate ________. A) indicates that the person or firm named in the certificate is reasonably trustworthy B) gives the subject's public key
C) Both A and B D) Neither A nor B - ANSWER B
To ensure that a digital certificate is valid, the receiver of the certificate must check ________. A) the digital signature B) the valid period C) Both A and B D) Neither A nor B - ANSWER C
To ensure that a digital certificate is valid, the receiver of the certificate must check ________. A) the digital signature B) the valid period C) whether the certificate has been revoked D) All of the above. - ANSWER D
To check a certificate's revocation status, the verifier can ________. A) download the CRL from the CA B) send an OCSP message to the CA C) Both A and B D) Neither A nor B - ANSWER B
A digital ________, by itself, provides authentication. A) signature B) certificate C) Both A and B D) Neither A nor B - ANSWER D
Replay attacks can be thwarted by using ________. A) time stamps B) sequence numbers C) nonces D) All of the above. - ANSWER D
________ thwart replay attacks by ensuring "freshness" using cutoff values. A) Time stamps B) Sequence numbers C) Nonces D) All of the above. - ANSWER A
Nonces can be used in ________. A) all applications B) client/server applications C) time-insensitive applications D) persistent applications - ANSWER B
Quantum key distribution ________. A) is a way to deliver enormously long keys to communication partners B) creates a major threat to many traditional cryptographic methods C) Both A and B D) Neither A nor B - ANSWER A
Quantum key cracking ________. A) is a way to deliver enormously long keys to communication partners
B) creates a major threat to many traditional cryptographic methods C) Both A and B D) Neither A nor B - ANSWER B
The first task in establishing a cryptographic system is selecting a cryptographic system standard for the dialogue. - ANSWER TRUE
A ________ is a cryptographic system that provides secure communication over an untrusted network. A) virtual private network B) secure link C) complete cryptographic system D) None of the above. - ANSWER A
Companies transmit over the Internet because the Internet ________. A) is inexpensive B) is secure C) Both A and B D) Neither A nor B - ANSWER A
Companies transmit over the wireless LANs because WLANs ________. A) are inexpensive B) are secure C) Both A and B D) Neither A nor B - ANSWER B
Which of the following is a type of VPN? A) Host-to-host