Data Communication And Network Security

  • ISO/IEC 27001
  • NIST SP 800-53
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ynos82
Y
Ynos82
Community Contributor
Quizzes Created: 1 | Total Attempts: 368
| Attempts: 368 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. What does IPS mean?

Explanation

IPS stands for Intrusion Prevention System. It is a security technology that monitors network traffic and actively blocks any malicious activity or unauthorized access attempts. Unlike an Intrusion Detection System (IDS), which only detects and alerts about potential threats, an IPS goes a step further by actively preventing these threats from entering the network. It acts as a barrier between the internal network and external threats, helping to protect against various types of attacks such as malware, DDoS attacks, and unauthorized access attempts.

Submit
Please wait...
About This Quiz
Data Communication And Network Security - Quiz

This quiz on 'Data Communication and Network Security' tests knowledge on cryptographic systems like Blowfish, RSA, and digital signatures, focusing on core security principles. It is designed for learners looking to understand and apply security protocols in networking environments.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What does AES mean?

Explanation

The correct answer is "Advanced Encryption Standard". AES is a widely used encryption algorithm that is used to secure sensitive data. It is a symmetric key algorithm, meaning that the same key is used for both encryption and decryption. AES is considered to be highly secure and is used by governments, organizations, and individuals to protect their data from unauthorized access or tampering.

Submit
3. Where was the Kerberos protocol developed?

Explanation

The Kerberos protocol was developed at MIT.

Submit
4. What is symmetric encryption?

Explanation

Symmetric encryption is a form of cryptosystem where the same key is used for both encryption and decryption. This means that the sender and the receiver both have the same key, and they use it to encrypt and decrypt the message. This type of encryption is efficient and fast, as it does not require complex mathematical operations. However, the main drawback is that the key needs to be securely shared between the sender and the receiver, as anyone who gets hold of the key can decrypt the message.

Submit
5. Which three functional areas are provided by IPSec?

Explanation

IPSec provides three functional areas: authentication, confidentiality, and key management. Authentication ensures the identity of the communicating parties, confidentiality ensures that the data is encrypted and cannot be accessed by unauthorized parties, and key management involves the generation, distribution, and management of cryptographic keys used for encryption and decryption.

Submit
6. What does the abbreviation "CFB mode" stand for?

Explanation

The abbreviation "CFB mode" stands for Cipher Feed Back mode. This mode is a method of encrypting data in block ciphers, where the output of the encryption process is fed back into the encryption algorithm to encrypt the next block of data. This mode provides a way to encrypt data in smaller units, rather than encrypting the entire message at once.

Submit
7. Which of the following statements is NOT TRUE in IPSec:

Explanation

In tunnel mode, the mutable fields in the IP header are not set to zero for the calculation of the Integrity Check Value (ICV). The mutable fields are left unchanged during the calculation of the ICV.

Submit
8. The 4 general means of authentication are by something you:

Explanation

The correct answer is "Do, have, know, or are." This answer accurately identifies the four general means of authentication. "Do" refers to authentication through actions or behaviors, such as providing a fingerprint or entering a password. "Have" refers to authentication through possession of something, such as a key card or a mobile device. "Know" refers to authentication through knowledge, such as a PIN or a secret question. "Are" refers to authentication through biometric characteristics, such as facial recognition or fingerprint scanning.

Submit
9. If a hash function H is said to have strong collision resistance, then:

Explanation

The correct answer suggests that if a hash function has strong collision resistance, it is difficult to find any pair of inputs (x, y) that will result in the same hash value. This means that the hash function is designed in such a way that it minimizes the chances of two different inputs producing the same hash value, making it highly unlikely to find any such pair.

Submit
10. Suppose a firewall has the following rules implemented: What will this firewall do?  

Explanation

The firewall will allow DNS lookup as a client. This means that the firewall will allow the network to make DNS requests to external DNS servers in order to resolve domain names to IP addresses. However, it will not allow any other type of incoming or outgoing connections, such as incoming connections to the SMTP server or outgoing connections to external SMTP servers.

Submit
11. Blowfish is an example of a _________-structure

Explanation

Blowfish is an example of a Feistel structure. Feistel structure is a cryptographic structure that uses repeated rounds of encryption and decryption to achieve security. Blowfish, a symmetric key block cipher, uses a Feistel structure with a variable number of rounds to encrypt and decrypt data.

Submit
12. Which is NOT TRUE for an anomaly detection IDS system:

Explanation

An anomaly detection IDS system is not vulnerable to zero-day exploits. Zero-day exploits refer to vulnerabilities or weaknesses in a system that are unknown to the software vendor or developers. Anomaly detection IDS systems are designed to detect deviations from normal behavior, so they may be able to identify and flag suspicious activity related to zero-day exploits. However, they are not inherently vulnerable to these exploits themselves.

Submit
13. There exist ___ versions of the X.509 certificate:

Explanation

The correct answer is 3. This means that there are three versions of the X.509 certificate.

Submit
14. Snort is an example of:

Explanation

Snort is an example of a signature-based IDS. Signature-based IDS systems detect and prevent attacks by comparing network traffic against a database of known attack signatures. Snort uses a set of rules to analyze network packets and identify patterns that match known attack signatures. When a match is found, Snort can generate alerts or take action to block the suspicious traffic. This approach is effective in detecting known attacks but may struggle with detecting new or unknown threats.

Submit
15. Assume that 1 in 10.000 network packets are related to an attack. Assume our IDS system will detect malicious (attack) packets with 99% certainty and will wrongly mark 1% of the normal traffic as an attack packet. If the IDS classifies a particular packet as malicious, then the possibility that this is a wrong decision is approximately:

Explanation

The given question is asking for the possibility that the IDS system makes a wrong decision when classifying a particular packet as malicious. The question states that the IDS system detects malicious packets with 99% certainty, meaning that it correctly identifies 99% of the attack packets. However, it also wrongly marks 1% of the normal traffic as an attack packet. Therefore, if the IDS classifies a particular packet as malicious, there is a 1% chance that this is a wrong decision.

Submit
16. What does the Diffie-Hellman key exchange protocol enable two users to establish?

Explanation

The Diffie-Hellman key exchange protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms. This means that the two users can securely communicate and share information without anyone else being able to intercept or decipher their messages. The protocol relies on the mathematical difficulty of solving discrete logarithm problems to ensure the security of the exchanged key.

Submit
17. The security of RSA is based on the difficulty of:

Explanation

The security of RSA is based on the difficulty of factorization. This means that it is computationally difficult to factorize large numbers into their prime factors. The RSA algorithm relies on the assumption that it is easy to multiply two large prime numbers together to obtain a large composite number, but it is extremely difficult to factorize that composite number back into its original prime factors. This difficulty forms the basis of the security of RSA, as it makes it impractical for an attacker to determine the private key from the public key.

Submit
18. How many keys are used in symmetric crypto in case we have 13 users?

Explanation

In symmetric cryptography, the same key is used for both encryption and decryption. In this case, since there are 13 users, each user will need to have a unique key to communicate securely with the others. To calculate the number of keys needed, we can use the formula n*(n-1)/2, where n is the number of users. Plugging in 13 for n, we get 13*(13-1)/2 = 78. Therefore, 78 keys are needed for symmetric cryptography with 13 users.

Submit
19. Which of the following statements is NOT TRUE in IKE:

Explanation

Oakley provides a framework for key exchange, but the actual key exchange is based on the ISAKMP protocol.

Submit
20. The Ticket Granting Server (TGS) in a Kerberos system has 2 pre-shared keys. These are shared with:

Explanation

The Ticket Granting Server (TGS) in a Kerberos system has 2 pre-shared keys, one shared with the Authentication Server (AS) and the other shared with the server in a network. These pre-shared keys are used for authentication and encryption purposes. The TGS uses the key shared with the AS to verify the authenticity of the user/client, and the key shared with the server to establish a secure communication channel between the user/client and the server. This ensures secure authentication and data protection within the Kerberos system.

Submit
21. Kerberos is using an authentication protocol that is based on the following protocol:

Explanation

Kerberos is using the Needham-Schroeder protocol for authentication. The Needham-Schroeder protocol is a key distribution protocol that allows two parties to securely exchange keys over an insecure network. It ensures that the parties involved are who they claim to be and prevents replay attacks. Kerberos uses this protocol to authenticate users and provide secure access to network resources.

Submit
22. A digital signature is created as follows:

Explanation

The correct answer is hashing the message; encrypting the hash value with the private key of the sender; appending the result to the message. This process ensures the integrity and authenticity of the message. By hashing the message, a unique hash value is generated. This hash value is then encrypted using the sender's private key, which can only be decrypted using the corresponding public key. Appending the encrypted hash to the message allows the receiver to verify the integrity of the message by decrypting the hash value and comparing it with the calculated hash of the received message.

Submit
23. A Security Association can uniquely be identified by the Security Parameter Index (SPI) and:

Explanation

A Security Association can uniquely be identified by the Security Parameter Index (SPI) and the destination IP address and the security protocol identifier. The SPI is used to differentiate between multiple security associations on the same device, while the destination IP address and the security protocol identifier are used to uniquely identify a specific security association between two devices.

Submit
24. What does ESP mean?

Explanation

ESP stands for Encapsulating Security Payload. It is a protocol used in computer networks to provide confidentiality, integrity, and authentication of data packets. ESP encapsulates the data being transmitted and adds a header that includes security information, such as encryption algorithms and keys. This ensures that the data is protected from unauthorized access or tampering.

Submit
25. An ESP trailer contains:

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Sep 6, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 06, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 01, 2014
    Quiz Created by
    Ynos82
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What does IPS mean?
What does AES mean?
Where was the Kerberos protocol developed?
What is symmetric encryption?
Which three functional areas are provided by IPSec?
What does the abbreviation "CFB mode" stand for?
Which of the following statements is NOT TRUE in IPSec:
The 4 general means of authentication are by something you:
If a hash function H is said to have strong collision resistance,...
Suppose a firewall has the following rules implemented: ...
Blowfish is an example of a _________-structure
Which is NOT TRUE for an anomaly detection IDS system:
There exist ___ versions of the X.509 certificate:
Snort is an example of:
Assume that 1 in 10.000 network packets are related to an attack....
What does the Diffie-Hellman key exchange protocol enable two users to...
The security of RSA is based on the difficulty of:
How many keys are used in symmetric crypto in case we have 13 users?
Which of the following statements is NOT TRUE in IKE:
The Ticket Granting Server (TGS) in a Kerberos system has 2 pre-shared...
Kerberos is using an authentication protocol that is based on the...
A digital signature is created as follows:
A Security Association can uniquely be identified by the Security...
What does ESP mean?
An ESP trailer contains:
Alert!

Advertisement