Chapter 10 Flashcards

1
Q
Any encryption that uses the same key for encryption and decryption is called?
A) Encoded Key
B) Symmetric Key
C) Single Key
D) Synthetic Key
A

B) Symmetric Key encrpytion uses the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
RC4 is a(n)\_\_\_\_ cipher
A) Block
B) Forwarding
C) Stream
D) Asymmetric
A

C) RC4 is an Stream Cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
In a PKI encryption method, which key encrypts the data?
A) Public
B) private
C) Both
D) Depends on who sends the data.
A

A) You send someone a public key that he or she in turn, uses to encrypt the data. The private key can decrypt data encrypted with the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
The process of verifying with a high degree of confidence that the sender is who the receiver thinks he or she should be called \_\_\_\_\_\_?
A) PKI
B) Authentication
C) Locking
D) non-repudiation
A

D) this is the definition of non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A hash function is by definition a \_\_\_\_\_\_\_\_?
A) Complex Function
B) PKI function
C) One-Way Function
D) systematic Function
A

C) Hash functions must be one-way. They should be complex but complexity is not a requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is a common hash function?
A) SHA-3
B) RC4
C) AES
D) BMX
A

A) Of the choices listed, Only SHA-3 is a hash function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
In order to have PKI you must have a(n)\_\_\_\_\_?
A) web server
B) Web of Trust
C) Root Authority
D) Unsigned Certificate
A

C) A PKI must have a root authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which type of access control requires a label to define its sensitivity?
A) MAC
B) DAC
C) RBAC
D) VAC
A

A) (MAC) Mandatory Access Control must use a label to define sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
If you saw some traffic running on UDP ports 1812 and 1813, what AAA standard would you know was running?
A) PPP
B) RADIUS
C) MS-CHAP
D) TACACS+
A

B) RADIUS uses UDP ports 1812 and 1813.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which authentication standard is highly time sensitive?
A) PAP
B) RADIUS
C) 802.1X
D) Kerberos
A

D) All Kerberos tickets are timestamped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A(n) \_\_\_\_ defines a user's access to a resource based on the roles the user plays in the network environment?
A) MAC
B) DAC
C) RBAC
D) VAC
A

C) A RBAC defines a user’s access to a resource based on the roles the user plays in the network environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A(n)\_\_\_\_\_ is based on the idea that a reasource has an owner who may at his or her discretion assign access to that resource.
A) MAC
B) DAC
C) RBAC
D) VAC
A

B) A DAC is based on the idea that a reasource has an owner who may at his or her discretion assign access to that resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which authentication offers more security?
A) PAP
B) CHAP
C) MS-CHAP
D) PPP
A

C) MS-CHAMP offers the most secruity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What port do Kerberos use by default?
A) 80
B) 88
C) 90
D) 98
A

B) 88. Kerberos uses UDP or TCP port 88 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
What port does SFTP use?
A) 23
B) 20
C) 21
D) 22
A

A) 23. SFTP uses TCP port 23.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
SNMP runs on UDP ports \_\_\_ and \_\_\_?
A) 80 - 88
B) 120 - 121
C) 161 - 162
D) 190 - 192
A

C) 161 - 162. SNMP runs on UDP ports 161 and 162?

17
Q
NTP uses UDP port \_\_\_?
A) 123
B) 163
C) 193
D) 83
A

A) 123 - NTP uses UDP port 123.