Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Chapter 4 Q&A

1:

How many possible keys are there for an 8-bit key?

  1. 8

  2. 82

  3. 28

  4. 65,536

A1:

Answer: c. There are 8 bits in that key, and all those bits can have two different values. To calculate the possible keys, multiply 2 by 2 by 2one time for every bit, or 28.

2:

Which type of cipher typically acts on small units of data?

  1. Block cipher

  2. Stream cipher

A2:

Answer: b. Stream ciphers encrypt the bits of the message one at a time, and block ciphers take a number of bits and encrypt them as a single unit.

3:

What is the maximum key length available with 3DES?

  1. 56 bits

  2. 168 bits

  3. 160 bits

  4. 112 bits

  5. 128 bits

A3:

Answer: b. The maximum key length available with 3DES is 168 bits.

4:

The AES has a variable key length. True or False?

A4:

Answer: True. AES can use 128-, 192-, or 256-bit keys to encrypt data blocks.

5:

The security of the Diffie-Hellman algorithm is based on which of the following?

  1. The secrecy of public values

  2. The extreme amount of time required to perform exponentiation

  3. The difficulty of factoring large primes

  4. The secrecy of g and p values

A5:

Answer: c. The security of the Diffie-Hellman algorithm is based on the difficulty of factoring large primes.

6:

What is the length of MD5 output (hash)?

  1. 64 bits

  2. 128 bits

  3. 160 bits

  4. 168 bits

  5. 256 bits

A6:

Answer: b. The length of MD5 output (hash) is 128 bits.

7:

What is the length of SHA-1 output (hash)?

  1. 64 bits

  2. 128 bits

  3. 160 bits

  4. 168 bits

  5. 256 bits

A7:

Answer: c. The length of SHA-1 output (hash) is 160 bits.

8:

What is eavesdropping?

  1. An intruder gains illegitimate access by posing as an individual who actually can access secured resources.

  2. An intruder "sniffs" the data transmission between two parties during communications over a public medium.

  3. An intruder interrupts a dialogue and modifies the data between the two parties. The intruder would take over the entire session in an extreme case.

A8:

Answer: b. Eavesdropping is when an intruder "sniffs" the data transmission between two parties during communications over a public medium.

9:

Which protocols can be layered on top of SSL? (Multiple answers are possible.)

  1. HTTP

  2. OSPF

  3. FTP

  4. Telnet

  5. TFTP

A9:

Answer: a, c, and d. HTTP, FTP, and Telnet can be layered on top of SSL.

10:

Name the three primary security vulnerabilities for communication over a public network.A10:

Answer: Identity theft, eavesdropping, and man-in-the-middle are the three primary security vulnerabilities for communication over a public network.


/ 196