Demilitarized zone

Assignment Help Computer Networking
Reference no: EM13753599

Question 1 : Which of the following is NOT TRUE relating to rule-based detection system?
 
It detects deviation from previous usage patterns.

It uses historical audit records.

It defines thresholds.

It makes use of expert system.

Question 2: Demilitarized zone (DMZ) can be found in which firewall configuration?
 
screened host firewall, single-homed bastion

screened host firewall, dual-homed bastion

Single bastion T

screened subnet firewall

Question 3: Asymmetric cryptography ensures that:
 
encryption and authentication can take place without sharing private keys.

encryption of the secret key is performed with the fastest algorithm available.

encryption occurs only when both parties have been authenticated.

confidentiality is provided using public key.

Question 4: A computer virus has the following parts:

Idle, Spread & Infect

Dormant, Propagation, Triggering & Execution

Infect, Spread & Trigger

Infection mechanism, Trigger & Payload

Question 5: Which of the following is TRUE relating to security service?

Denial of service is an example of security service.

Security services implement security policies.

Security services are services designed to detect, prevent or recover from an attack.

It includes notarization service.

Question 6: Which of the following is an example of a passive attack?
 
sniffing of message

masquerade

replay attack

denial of service

Question 7: The followings are steps to perform digital envelope:
 
Compute the hash value H of the message; Sign H using sender's private key; Send out the message

Compute the hash value H of the message; Sign H using receiver's public key; Send out the message

Compute the session key; Encrypt the session key with the receiver's private key; Encrypt the message with the session key; Append the encrypted session key to the ciphertext; Send out the message

Compute the session key; Encrypt the message with the session key; Encrypt the session key with the receiver's public key, Append the encrypted session key to the ciphertext; Send out the message

Question 8: The salt used in the UNIX password system is _______.
 
to increase the length of the password

to allow the user to change the password

to store the password file

to enable ease of encryption

Question 9: Which of the following is FALSE relating to RC4 algorithm?
 
It is based on stream cipher

Both the key size must be 128 bits

It is also used in the Wired Equivalent Privacy (WEP) protocol and the WiFi Protected Access (WPA) protocol

It makes use of permutation operation

Question 10: In the following viruses, which one can hide itself from detection by antivirus software?
 
parasitic virus

stealth virus

boot sector virus

macro virus

Question 11: Which of the following is FALSE relating to firewall?
 
Bastion host executes a secure version of its operating systems.

Tiny fragment attack is an attack that deter the firewall from properly inspecting the headers.

A stateful inspection firewall reviews the same packet information as a packet filtering firewall, but also records information about TCP connections.

Most packet filter firewalls support advanced user authentication mechanisms.

Question 12: Which of the following in NOT TRUE related to intrusion detection systems?
 
Intrusion detection is based on the assumption that the behaviour of the intruder differs from that of a legitimate user.

False positive means that intruders are not identified as intruders

Intrusion detection enables the collection of information about intrusion techniques

Honeypots are designed to encourage the attacker to stay on the system long enough for administrators to respond.

Question 13: Fabrication is a security attack against ________.
 
integrity

non-repudiation

authentication

modification

Question 14: The following is associated with public key certificates.
 
Public key certificates are encrypted by the certificate authority (CA)'s secret key.

Public key certificate consists of information such as User ID, public and private keys.

Certificates can only be issued by a third party.

Public key certificates are used in network applications such as SSL and S/MIME.

Question 15: Which of the following is FALSE?
 
Between internal and external firewalls are one or more networked devices in a region referred to as a DMZ (demilitarized zone) network.

Asymmetric key cryptography can use private key to encrypt the message and public key to decrypt the encrypted message.

The objective of the digital immune system is to provide rapid response time so that viruses can be stamped out almost as soon as they are introduced.

A hash code can be computed from the source message, encrypted using asymmetric encryption and a secret key, and appended to the message

Question 16: Which of the following is NOT one of the properties of hash function?

It produces a fixed size length.

From the hash value, it is not possible to find its original message.

It is possible to find an alternative message with the same hash value as a given message.

Message can be of variable length.

Question 17: Which of the following is FALSE relating to malware software?

Malicious software is software that is intentionally included or inserted in a system for a harmful purpose.

A virus is a program that can replicate itself and send copies from computer to computer across network connections

Flooders are types of malware that are used to attack networked computer systems with a large volume of traffic

Logic Bomb is one of the oldest types of malware program.

Question 18: If a user wish to obtain a certificate from a trusted CA (Certificate Authority), the user must present proof of identity and a:

Private key

Public key

Session key

Secret key

Question 19: Which one of the following default policy would permit those packets stated in the policy rule of the firewall?
 
Discard

Forward

Block

Allow

Question 20: Ali needs to send a private e-mail to Farida. Ali does not want anyone to have the ability to read the e-mail except for Farida. Which tenet of information security is concerned about?
 
Authentication

Integrity

Confidentiality

Non repudiation.

Reference no: EM13753599

Questions Cloud

Research studies of interest : Find three research studies of interest to you that provide proper usage of the one-way, repeated measures, and factorial ANOVA.
How do the people of umuofia react to change : How does Achebe use characters like Obierika, Okonkwo, and Nwoye to offer such social criticism of Igbo society? How do the people of Umuofia react to change?
Which was important factor in countrys commercial revolution : Which was an important factor in the Low Countries' commercial revolution
Initial public offering of stock : As we learned within this module, the primary market is where a company first sells its stock to the general public. Perform an online search for a company that had its initial public offering (IPO) of stock within the last year and analyze its st..
Demilitarized zone : Demilitarized zone (DMZ) can be found in which firewall configuration
Explain how you feel these levels of both m1 and m2 : You have found this information, begin to think like an economist and explain how you feel these levels of both M1 and M2 have affected GDP during the same time period.
Write a paper that explain racism in russia : Write a paper that Explain Racism in Russia.
Write a paper on the future for us all : Write a paper on The Future for Us All" is an interesting one. Identify and discuss 1 historical challenge to national collectivity and issues it brings.
Impact the market or solve the economic problem : Analyze the economic theory used to complete the policy solution and determine the impact on the appropriate stakeholders - Analyze how the economic policy proposed would impact the market or solve the economic problem.

Reviews

Write a Review

Computer Networking Questions & Answers

  1 thermostats are subjected to rigorous testing before they

1. thermostats are subjected to rigorous testing before they are shipped to air conditioning technicians around the

  Question 1a list and illustrate seven security conceptsb

question 1a list and illustrate seven security concepts.b give explanation of the following eight common threats facing

  Determine the correct subnet mask for network

Router on one of the subnets will connect network to Internet. All computers on network will require access to the Internet. Determine the correct subnet mask for network?

  Calculating higher data rate in atm line

Dog can travel to your side, wherever you may be, at 18 km/hour. For what range of distances does dog have a higher data rate than 155 Mbps ATM line?

  Write down steps to browse site ausing same url

Employees will open their Web browser and enter personnel.mycompany.com in URL address box to browse this Web site. Write down steps which you take so that each computer in company can browse site using this URL?

  Different routing protocols into a new network design

Design a plan to integrate the different routing protocols into a new network design for Genome4U's lab and identify the information you will redistribute between routing protocols.

  Develop server-side dynamic webpages

A company is warned by its credit card companies that it will be classified as a high-risk firm unless it immediately reduces the number of fraudulent purchases made by its e-commerce clients. Come up with a plan to avoid this outcome.

  What frames are in sender-s window range

Then the sender learns of acknowledgment of 0,1,2,5. What frames are in sender's window range just after this event?

  Your senior network architect suddenly left company which

your senior network architect suddenly left the company that you work for and you are left alone with your manager and

  The senior network administrator would like you to get

you are a networking intern at richman investments. you recently developed a design for a remote access control policy

  One-way to solidify the concepts of clientserver computing

one-way to solidify the concepts of clientserver computing and interprocess communication is to develop the

  Harrison ruzzo and ullman in their paper protection in

harrison ruzzo and ullman in their paper protection in operating systems have discussed the safety problem.how do they

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd