What provides integrity for certificates

Assignment Help Computer Network Security
Reference no: EM131250906

PROBLEM 1 - General questions

a) Which of the following is considered the first line of defense against human behavior? Explain.
A) Policies
B) Cryptography
C) Physical security
D) Business continuity planning

b) Select from the following the best definition of security risk analysis:
A) Risk analysis looks at the probability that a vulnerability exists in your system.
B) Risk analysis looks at the probability that your security measures won't stop a hacker breaking in to your system.
C) Risk analysis looks at the probability that a hacker may break in to your system.
D) Risk analysis determines what resources you need to protect and quantifies the costs of not protecting them.
E) Risk analysis looks at the consequences of being connected to the Internet.

C) Which answer governs how a network might be configured and operated as well as how people are expected to behave on it? Explain.
A) Network documentation
B) Regulations
C) Procedures
D) Policies

Which answer is one that contains actions to be taken in a certain situation like how long before users must change passwords, actions to take if an infiltration takes place or a user's steals corporate date? Explain.
A) Policies
B) Documentation
C) Regulations
D) Procedures

PROBLEM 2 - Networking Fundamentals

a) While using which type of networking device would each host 'see' all other traffic on the network? Explain.
A) Network Switch
B) Network Router
C) Network Hub
D) Token Ring Network

b) Which type of network device divides broadcast domains? Explain.
A) Switches
B) Hubs
C) Routers
D) Bridges

c) What destination MAC Address would be added to a packet on the route to a remote computer? Explain.
A) MAC Address of the far side of the default gateway
B) MAC Address of your computer
C) Exterior MAC Address of the remote Server
D) Interior MAC address of default gateway

d) You have two network segments separated by a router. A host on one segment does an ARP request for a certain IP Address. Would that request cross the router? Explain.
A) Yes, because routers forward broadcasts
B) Yes, if there is a hub between segments
C) Only if you have a Caching Engine
D) No, routers do not forward broadcasts

PROBLEM 3 - Cryptography Fundamentals

a) Users in your organization sign their emails with digital signatures. What provides integrity for these certificates? Explain.
A) Hashing
B) Encryption
C) Non-repudiation
D) Private key

b) Bob wants to send a secure email to Alice so he decides to encrypt it. Bob wants to ensure that Alice can verify that he sent it. Which of the following does Alice need to verify the certificate that Bob used in this process is valid? Explain.
A) Alice's public key
B) Alice's private key
C) Bob's private key
D) Bob's public key
E) The CA's private key
F) The CA's public key

c) Which cryptographic system provides both data security and non-repudiation? Explain.
A) 3DES - Triple Data Encryption Standard
B) PKI - Public Key Infrastructure
C) DES - Data Encryption Standard
D) AES - Advanced Encryption Standard

d) When a user needs to provide message integrity, what options may be the best?
A) Send a digital signature of the message to the recipient
B) Encrypt the message with a symmetric algorithm and send it
C) Create a checksum, append it to the message, encrypt the message, then send it to the recipient
D) Encrypt the message with a private key so the recipient can decrypt with the corresponding public key

PROBLEM 4 - Network Vulnerabilities, Attacks and Countermeasures

a) Which of the following is not to be considered a cyber attack? Explain.
A) A nuclear electromagnetic pulse (EMP) that knocks out all electronic devices.
B) Trust exploitation.
C) Access control.
D) Port redirection.
E) Man-in-the-middle.

b) Which denial of service attack involves sending crafted ICMP packets which have a source address of the victim and all responses go to the victim?
A) Macro Virus
B) SYN Flood
C) Smurf Attack
D) Buffer Overflow

c) Security experts at your organization have determined that your network has been repeatedly attacked from multiple entities in a foreign country. Research indicates these are coordinated and sophisticated attacks. What best describes this activity?
A) Targeted attack
B) Sniffing
C) Spear phishing
D) Advanced persistent threat

d) Which component of an effective penetration test involves contacting users and asking questions about the corporate network in an attempt to gather intelligence? Explain.
A) Man-in-the-Middle Attack
B) Phishing
C) Spear Phishing
D) Social Engineering

PROBLEM 5 - Authentication and Authorization Controls

a) Consider the following protocol that involves both RSA public-key operations and DES. Suppose that A has an RSA private key prv(A) and an RSA public key pub(A). Suppose that B has an RSA private key prv(B) and an RSA public key pub(B). Assume both A and B knows each other's public key. A wants to send B some message M. A selects random DES key K and send B the following two messages:
-- Epub(B)( K, Sigprv(A)(K))
-- EK(M)
"E" means encryption and "Sig" means digital signature. Which of the following statement(s) is true? Briefly explain why or why not.
(A) Only B can decipher the contents of the message M
(B) B is certain that the message M is from A
(C) B can prove to a third party that the message M arrived from A.

b) The security manager at your company recently updated the security policy. One of the changes requires dual-factor authentication. Which of the following will meet this requirement? Explain.
A) Fingerprint scan and retina scan
B) Password and PIN
C) Hardware token and PIN
D) Smart card

c) Apart from having strong passwords, what can mitigate brute force logon attempts? Explain.
A) Automatic Account Lockouts
B) Renaming Administrator Accounts
C) Disable the Administrator Account
D) Security Audits

d) A network includes a ticket-granting ticket server. Which of the following choices is the primary purpose of this server? Explain.
A) Access control
B) Authentication
C) Authorization
D) Identification

Verified Expert

This sample paper is about the basic concepts of networking and security issues that may arise. It has five portions. First portion deals with the general procedures that applied within an organization i.e. policies regulations etc. Second portion gives the details about the basic network devices like switch, router etc. Third portion includes the techniques of encryption i.e. cryptography and digital signatures. In fourth portion it clearly defines the types of attacks that a network may be a victim of. Fifth portion provides the ways to protect from such network attacks.

Reference no: EM131250906

Questions Cloud

What are the pros and cons of the policies or practices : Is the educational policy, if any, effective? Are there any contradictory policies or practices? What are the pros and cons of these policies or practices?
What amount will be in the fund six years from now : Bahee Corporation currently has $2,000,000 in its plant expansion fund. Assuming this fund is earning 10% interest each year, what amount will be in the fund 6 years from now?
Discuss the main reasons why this perspective is relevant : Compare your perception of your area's per capita and the actual per capita for your area. If you were close, provide a rationale for your speculation. If there was a major discrepancy between your speculation and the actual per capita, suggest a ..
Fallen in love with the perfect mate : Assume it is January 1, 2008 and you have just fallen in love with the perfect mate. The only problem is that s/he has a eight year old son from a previous marriage who you will have to send to college. Assuming a 10% interest rate, how much will you..
What provides integrity for certificates : What destination MAC Address would be added to a packet on the route to a remote computer? Explain - You have two network segments separated by a router. A host on one segment does an ARP request for a certain IP Address. Would that request cross t..
Actual manufacturing overhead for the year amounted : Bakker Corporation applies manufacturing overhead on the basis of direct labor-hours. At the beginning of the most recent year, the company based its predetermined overhead rate on total estimated overhead of $83,970 and 2,700 estimated direct labor-..
What would be the payoff for value jet : If Value Jet and Delta choose their strategies simultaneously, what strategies would the two firms choose at the Nash equilibrium, and what would be the payoff for Value Jet? Explain.
Review the media scenario titled adult learning contexts : To prepare for this Discussion, review the media scenario titled, "Adult Learning Contexts: Open Courses." in the Grand City Community at the Grand City University, Office of Adult Education. Consider the experiences of an adult learner and assume..
What is the asked price of this bond in dollars : In the above table, find the Treasury bond that matures in May 2039. What is the asked price of this bond in dollars?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify url of the website and your assigned business model

Identify the URL of the website and your assigned business model/category in the first part of the report. Describe the website structure and the purpose of each element (include snapshots and diagrams where appropriate).

  Brief statement describing an it acquisition

Write a brief statement describing an IT acquisition by an organization about which you have knowledge. State whether the organization believes the acquisition met its objectives (e.g., improved the performance of the organization). State why you ..

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  Context of a systems development project

Outline the issues that Susan should consider which would support the purchase of a software package. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your..

  Outline security threats and vulnerabilities

Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The topc and title is security threats and vulnerabilities

  Does the resulting scheme satisfy perfect secrecy

Consider the one time pad encryption scheme to encrypt a 1-bit message m with a 1-bit key k. Replace the XOR operation with another operation X. For which X(m,k) does the resulting scheme satisfy perfect secrecy?

  Goals of computer security

Computer security as a whole comprises six goals, but not every goal is important to every application. All Web sites are concerned with access control and availability.

  Understanding of cryptography and its role to n/w security

Critical views on the advantages and disadvantages of technical solutions to security.

  Explain the site for marketing and site design purposes

Using the library, the Internet, and any other materials, prepare a PowerPoint presentation that outlines the following items

  How can one remove a rootkit from a computer

Explain in your words what a rootkits is, what harm it does, and why it is so difficult to remove and how can one remove a rootkit from a computer?

  Describe how bob can recover the message

FIT3031 - Information & Network Security - Is it possible to perform encryption operations in parallel on multiple blocks of plaintext in CBC mode and describe how Bob can recover the message m from (v || c) using k.

  What role does this play in international competitiveness

Can political risk be "managed"? If so, what methods can be used to manage such risk, and how effective are they? Discuss the lengths to which you would go to manage political risk relative to the kinds of returns you would expect to gain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd