1.
Message _______ means that the receiver is ensured that the message is coming from the expected source, not from impersonator.
Correct Answer
A. Authentication
Explanation
Authentication is the correct answer because it refers to the process of verifying the identity of a sender or the integrity of a message. When a message is authenticated, the receiver can trust that it is indeed coming from the expected source and not from an impersonator. This ensures that the communication is secure and reliable.
2.
The secret key between members needs to be created as a ______ key when two members contact KDC.
Correct Answer
B. Session
Explanation
When two members contact the Key Distribution Center (KDC), they need to create a session key. This session key is used for encrypting and decrypting the communication between the members during their session. The session key is unique to each session and is generated specifically for that session. It provides a secure and efficient way for the members to communicate with each other.
3.
The ________ criterion ensures that a message cannot easily be forged.
Correct Answer
B. Weak-collision-resistance
Explanation
Weak collision resistance ensures that it is difficult to find two different inputs that produce the same hash output. This criterion helps to prevent the forging of messages because even a small change in the input will result in a significantly different hash value. Therefore, it becomes challenging for an attacker to create a forged message with the same hash value as the original message.
4.
_____ is a trusted third party that assigns a symmetric key to two parties.
Correct Answer
B. KDC
Explanation
A Key Distribution Center (KDC) is a trusted third party that assigns a symmetric key to two parties. The KDC acts as a central authority that generates and distributes the symmetric key to both parties involved in the communication. This ensures that the key is securely shared between the parties, allowing them to establish a secure and encrypted communication channel. The KDC plays a crucial role in facilitating secure communication between the two parties by securely distributing the symmetric key.
5.
Digital signature cannot provide ________ for the message
Correct Answer
B. Confidentiality
Explanation
A digital signature is a cryptographic technique used to ensure the authenticity and integrity of a message. It provides a way to verify that the message has not been tampered with and that it was indeed sent by the claimed sender. However, it does not provide confidentiality, which means that it does not protect the message from being accessed or read by unauthorized parties. Therefore, the correct answer is confidentiality.
6.
IPSec defines two protocols: _______ and ________.
Correct Answer
C. AH, ESP
Explanation
IPSec (Internet Protocol Security) is a protocol suite that provides secure communication over IP networks. It defines two protocols: AH (Authentication Header) and ESP (Encapsulating Security Payload). AH provides integrity and authentication of IP packets, while ESP provides confidentiality, integrity, and authentication. Together, AH and ESP ensure secure and protected communication between network devices.
7.
A ______ provides privacy for LANs that must communicate
through the global Internet.
Correct Answer
C. VPN
Explanation
A VPN (Virtual Private Network) provides privacy for LANs that must communicate through the global Internet. It creates a secure and encrypted connection between the LANs, allowing data to be transmitted securely over public networks. This ensures that the communication remains private and protected from unauthorized access or interception. VPNs are commonly used by businesses to securely connect remote offices or remote workers to the corporate network.
8.
IPSec in the ______ mode does not protect the IP header.
Correct Answer
D. Transport
Explanation
In Transport mode, IPSec only protects the payload of the IP packet and not the IP header itself. This means that the original IP header is not encrypted or authenticated, leaving it vulnerable to potential attacks. In contrast, in Tunnel mode, both the IP header and the payload are protected by IPSec. Therefore, the correct answer is Transport.
9.
IP Security operates in which layer of the OSI mode
Correct Answer
A. Network
Explanation
IP Security operates in the Network layer of the OSI model. This layer is responsible for routing and forwarding data packets between different networks. IP Security (IPSec) provides secure communication over IP networks by encrypting and authenticating IP packets. It ensures the confidentiality, integrity, and authenticity of data transmitted over IP networks. By operating at the Network layer, IPSec can protect all traffic passing through the network, regardless of the higher-layer protocols being used.
10.
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
Correct Answer
A. Kerberos V5
Explanation
Kerberos V5 is the correct answer because it is an authentication protocol that can be used with IPsec to secure the authentication of computers. It provides strong mutual authentication between clients and servers, ensuring that only authorized entities can access the network resources. SHA and MD5, on the other hand, are cryptographic hash functions and not encryption protocols. They are used for data integrity and message authentication, but not for securing the authentication of computers using IPsec.
11.
For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principals’ associated “secret keys”.
Correct Answer
A. Realm
Explanation
The correct answer is "realm". In the context of Kerberos, a realm refers to a specific domain or administrative boundary. The Kerberos Key Distribution Center (KDC) maintains a database of the realm's principal, which represents a user or service, and their associated "secret keys". These secret keys are used for authentication and encryption purposes within the realm.
12.
Which type of authentication should a company that has all computers in one domain use to ensure authentication of all clients and servers with the least administrative effort? Assume that all client computers run Windows XP Professional and all servers run Windows Server 2003.
Correct Answer
C. Kerberos V5
Explanation
Kerberos V5 is the recommended type of authentication for a company that has all computers in one domain. It ensures authentication of all clients and servers with the least administrative effort. Kerberos V5 is a network authentication protocol that uses tickets to authenticate users and encrypts the communication between clients and servers. It provides a centralized authentication system, simplifying the management of user accounts and passwords. Additionally, Kerberos V5 is integrated into Windows XP Professional and Windows Server 2003, making it the most suitable choice for this scenario.