This quiz on 'Data Communication and Network Security' tests knowledge on cryptographic systems like Blowfish, RSA, and digital signatures, focusing on core security principles. It is designed for learners looking to understand and apply security protocols in networking environments.
Intrusion Prevention System
Intrusion Private System
Intrusion Public System
Intrusion Detection System
Intrusion Protection System
Rate this question:
Discrete exponentiations
Factorization
Modular multiplications
Diffie-Hallman
Encryption
Rate this question:
Encrypting the message with the public key of the receiver; hashing the result; appending the hash to the encrypted message
Hashing the message; adding the hash to the message; encrypting the result with the private key of the receiver
Encrypting the message with the public key of the receiver; hashing the result; appending the hash to the original message
Hashing the message; encrypting the hash value with the private key of the sender; appending the result to the message
Hashing the message; encrypting the hash value with the public key of the receiver; appending the result to the message
Rate this question:
144
13
78
169
12
Rate this question:
Authentication, Confidentiality, and Key management
Authentication, Confidentiality, and Digital Signatures
Authentication, Error detection, and Error correction
Authentication, Key generation, and Certificate exchange
Encryption, Decryption, and Certificate validation
Rate this question:
Alternating Encryption System
Adversary Encapsulating System
Alternative Encipherment Solution
Adversary Encapsulating Solution
Advanced Encryption Standard
Rate this question:
Given H(x) it is hard to find x
Given one pair (x,y) where h=H(x)=H(y) it is hard to find another input z such that H(z)=h
It is hard to find any pair (x,y) such that H(x)=H(y)
Given input x it is hard to find h=H(x)
Given x it is hard to find y such that H(y)=H(x)
Rate this question:
The Authentication Server and the server in a network
The user/client and the server in a network
The Authentication Server (AS) and the user/client
The 2 servers in the network
None of the above
Rate this question:
10%
99%
1%
50%
90%
Rate this question:
A secret key using a public-key scheme based on hardness of integer factorization.
Both private and public keys using a public-key scheme based on hardness of integer factorization
A secret key using a public-key scheme based on discrete logarithms
Both private and public keys using a secret-key scheme based on discrete logarithms.
A public key using a secret-key scheme based on discrete logarithms.
Rate this question:
Looks for statistical deviations from the normal situation
Vulnerable for zero-days exploits
Must adapt to changes in user’s behaviour
Needs to define “normal” expected behaviour of a system
Is suitable to detect port scans
Rate this question:
The destination IP address and the security protocol identifier
The source IP address, the ICV and the security protocol identifier
The source IP address and the security protocol identifier
The source IP address
The source IP address and the Integrity Check Value (ICV)
Rate this question:
Encryption System Protection
Encapsulating System Parameters
Encapsulating Security Payload
Encapsulated Security Protocol
Encrypted Security Parameters
Rate this question:
In the tunnel mode a new IP header is attached
In transport mode the information is protected from source to destination host
In tunnel mode the mutable fields in the IP header are set to zero for the calculation of the Integrity Check Value (ICV)
Tunnel mode can be used for both AH and ESP
In transport mode the “next header” field is copied from the original IP header
Rate this question:
Ipsec
HMAC
Needham-Schroeder
RSA
X.509
Rate this question:
HIG
MIT
Stanford
Oxford
Cambridge
Rate this question:
Current Fail Backup mode
Cipher Forward Blocking mode
Crypto Fall Back mode
Crypto Final Block mode
Cipher Feed Back mode
Rate this question:
IKE is used to negotiate ESP keys for symmetric encryption for confidentiality
In aggressive mode the Initiator only suggest 1 set of SA for the communication
Oakley provides a framework for key exchange, but the actual key exchange is based on the ISAKMP protocol
The two IKE components are ISAKMP and Oakley
The ISAKMP SA is first established before AH or ESP SA’s are established
Rate this question:
A form of cryptosystem in which encryption and decryption are performed using the same key.
A form of cryptosystem in which encryption and decryption are symmetric according to the y-axis.
A form of cryptosystem in which encryption and decryption are symmetric according to the x-axis.
A form of cryptosystem that is based on groups of symmetry.
A mathematical procedure that is using a symmetric group.
Rate this question:
Padding and Pad length
Padding and Integrity Check Value (ICV)
Padding, Pad length, and Next header
Padding, Pad length, Next header, Security Parameter Index (SPI), and ICV
Padding, Pad length, Next header and ICV
A protocol based IDS
A firewall
An anomaly based IDS
A signature based IDS
An action based IDS
Rate this question:
Allows only for incoming connections to our SMTP server
Allows our network to be tracerouted
Allows DNS lookup as a client
Allows only outgoing connections to our SMTP server
Allows only outgoing connections to an external SMTP server
Rate this question:
Must, will, shall, or can
Know, Have, Are, or Will
Know, take, give, or are
Know, speak, touch, or see
Do, have, know, or are
Rate this question:
1
3
5
Depends on the IPsec version number
Depends on the user
Rate this question:
Quiz Review Timeline (Updated): Sep 6, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.