Demilitarized zone

Assignment Help Computer Networking
Reference no: EM13753599

Question 1 : Which of the following is NOT TRUE relating to rule-based detection system?
 
It detects deviation from previous usage patterns.

It uses historical audit records.

It defines thresholds.

It makes use of expert system.

Question 2: Demilitarized zone (DMZ) can be found in which firewall configuration?
 
screened host firewall, single-homed bastion

screened host firewall, dual-homed bastion

Single bastion T

screened subnet firewall

Question 3: Asymmetric cryptography ensures that:
 
encryption and authentication can take place without sharing private keys.

encryption of the secret key is performed with the fastest algorithm available.

encryption occurs only when both parties have been authenticated.

confidentiality is provided using public key.

Question 4: A computer virus has the following parts:

Idle, Spread & Infect

Dormant, Propagation, Triggering & Execution

Infect, Spread & Trigger

Infection mechanism, Trigger & Payload

Question 5: Which of the following is TRUE relating to security service?

Denial of service is an example of security service.

Security services implement security policies.

Security services are services designed to detect, prevent or recover from an attack.

It includes notarization service.

Question 6: Which of the following is an example of a passive attack?
 
sniffing of message

masquerade

replay attack

denial of service

Question 7: The followings are steps to perform digital envelope:
 
Compute the hash value H of the message; Sign H using sender's private key; Send out the message

Compute the hash value H of the message; Sign H using receiver's public key; Send out the message

Compute the session key; Encrypt the session key with the receiver's private key; Encrypt the message with the session key; Append the encrypted session key to the ciphertext; Send out the message

Compute the session key; Encrypt the message with the session key; Encrypt the session key with the receiver's public key, Append the encrypted session key to the ciphertext; Send out the message

Question 8: The salt used in the UNIX password system is _______.
 
to increase the length of the password

to allow the user to change the password

to store the password file

to enable ease of encryption

Question 9: Which of the following is FALSE relating to RC4 algorithm?
 
It is based on stream cipher

Both the key size must be 128 bits

It is also used in the Wired Equivalent Privacy (WEP) protocol and the WiFi Protected Access (WPA) protocol

It makes use of permutation operation

Question 10: In the following viruses, which one can hide itself from detection by antivirus software?
 
parasitic virus

stealth virus

boot sector virus

macro virus

Question 11: Which of the following is FALSE relating to firewall?
 
Bastion host executes a secure version of its operating systems.

Tiny fragment attack is an attack that deter the firewall from properly inspecting the headers.

A stateful inspection firewall reviews the same packet information as a packet filtering firewall, but also records information about TCP connections.

Most packet filter firewalls support advanced user authentication mechanisms.

Question 12: Which of the following in NOT TRUE related to intrusion detection systems?
 
Intrusion detection is based on the assumption that the behaviour of the intruder differs from that of a legitimate user.

False positive means that intruders are not identified as intruders

Intrusion detection enables the collection of information about intrusion techniques

Honeypots are designed to encourage the attacker to stay on the system long enough for administrators to respond.

Question 13: Fabrication is a security attack against ________.
 
integrity

non-repudiation

authentication

modification

Question 14: The following is associated with public key certificates.
 
Public key certificates are encrypted by the certificate authority (CA)'s secret key.

Public key certificate consists of information such as User ID, public and private keys.

Certificates can only be issued by a third party.

Public key certificates are used in network applications such as SSL and S/MIME.

Question 15: Which of the following is FALSE?
 
Between internal and external firewalls are one or more networked devices in a region referred to as a DMZ (demilitarized zone) network.

Asymmetric key cryptography can use private key to encrypt the message and public key to decrypt the encrypted message.

The objective of the digital immune system is to provide rapid response time so that viruses can be stamped out almost as soon as they are introduced.

A hash code can be computed from the source message, encrypted using asymmetric encryption and a secret key, and appended to the message

Question 16: Which of the following is NOT one of the properties of hash function?

It produces a fixed size length.

From the hash value, it is not possible to find its original message.

It is possible to find an alternative message with the same hash value as a given message.

Message can be of variable length.

Question 17: Which of the following is FALSE relating to malware software?

Malicious software is software that is intentionally included or inserted in a system for a harmful purpose.

A virus is a program that can replicate itself and send copies from computer to computer across network connections

Flooders are types of malware that are used to attack networked computer systems with a large volume of traffic

Logic Bomb is one of the oldest types of malware program.

Question 18: If a user wish to obtain a certificate from a trusted CA (Certificate Authority), the user must present proof of identity and a:

Private key

Public key

Session key

Secret key

Question 19: Which one of the following default policy would permit those packets stated in the policy rule of the firewall?
 
Discard

Forward

Block

Allow

Question 20: Ali needs to send a private e-mail to Farida. Ali does not want anyone to have the ability to read the e-mail except for Farida. Which tenet of information security is concerned about?
 
Authentication

Integrity

Confidentiality

Non repudiation.

Reference no: EM13753599

Questions Cloud

Research studies of interest : Find three research studies of interest to you that provide proper usage of the one-way, repeated measures, and factorial ANOVA.
How do the people of umuofia react to change : How does Achebe use characters like Obierika, Okonkwo, and Nwoye to offer such social criticism of Igbo society? How do the people of Umuofia react to change?
Which was important factor in countrys commercial revolution : Which was an important factor in the Low Countries' commercial revolution
Initial public offering of stock : As we learned within this module, the primary market is where a company first sells its stock to the general public. Perform an online search for a company that had its initial public offering (IPO) of stock within the last year and analyze its st..
Demilitarized zone : Demilitarized zone (DMZ) can be found in which firewall configuration
Explain how you feel these levels of both m1 and m2 : You have found this information, begin to think like an economist and explain how you feel these levels of both M1 and M2 have affected GDP during the same time period.
Write a paper that explain racism in russia : Write a paper that Explain Racism in Russia.
Write a paper on the future for us all : Write a paper on The Future for Us All" is an interesting one. Identify and discuss 1 historical challenge to national collectivity and issues it brings.
Impact the market or solve the economic problem : Analyze the economic theory used to complete the policy solution and determine the impact on the appropriate stakeholders - Analyze how the economic policy proposed would impact the market or solve the economic problem.

Reviews

Write a Review

Computer Networking Questions & Answers

  A company wants to create 4 separate ofces across the

a company wants to create 4 separate of?ces across the globe. the managers want to be able to connect these of?ces

  Explain the difference among client-server architecture

list and describe the four primary functional components of a software application and the three primary hardware

  How rdp file includes settings you configured in client

How can you tell from this experience that the RDP file includes the settings you configured in the client before you created the RDP file?

  Self regulating norms of social networking business model

Do you think that the current Social Networking business model can sustain, given these generally self regulating norms?

  Describe cost factor for hardware and software components

Create eight IP subnets and each IP subnet should suffice for twenty-two users. Use the class B private IP addresses. Also, define the broadcast address for the fourth subnet.

  What is transmission time for one cell through one switch

Consider compressed video transmission in an ATM network. Suppose standard ATM cells must be transmitted through five switches. The data rate is 43Mbps. What is the transmission time for one cell through one switch?

  Define current and emerging networking technology

ITC233 - Network Engineering, This subject is designed to provide students with experience in current and emerging networking technology. The subject provides students with the skills and practice needed to design, build and maintain small to mediu..

  Professional nursing organizations in networking

Explain the value that professional nursing organizations in networking and in the legislative process.

  Kind of networking hardware used-dsl for internet connection

Most homeowners select to install a DSL for Internet connection what kind of networking hardware would you suggest?

  Data transmission protocol

A certain data transmission protocol the parity error detection concept is used. what does this mean?

  Project 1 bull in your own words what rfc gives

project 1 bull in your own words what rfc gives the protocol and specifications a news server must use to

  How to interconnect two areas using tenbaset

Given that both engineering and front office areas use 10BaseT (twisted-pair Ethernet), how might you interconnect those two areas? Explain what meduim guarantees immunity from interference?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd