Deck 10: Cybersecurity: Data Protection

ملء الشاشة (f)
exit full mode
سؤال
Choose a CORRECT statement regarding the VPN (virtual private network) technology.

A) VPN generally costs high on network maintenance and administration.
B) VPN allows anywhere, anytime, and any-to-any connectivity because of the Internet's ubiquity.
C) VPN lacks flexibility in adding suppliers or customers of a firm to its enterprise network.
D) VPN offers reliable quality of services (QoS) for mission-critical applications over the Internet.
E) VPN is generally safer than leased lines in transporting sensitive data.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When a company tries to connect its suppliers through site-to-site VPNs to exchange invoices electronically, the _____ standard would be the most secure choice.

A) PPTP
B) IPsec
C) SSL
D) PPP
E) DES
سؤال
When IPv6 is in full swing, ________ technology is expected to become a requirement to protect data communications.

A) PPTP
B) IPsec
C) SSL
D) PPP
E) DES
سؤال
When IPsec and SSL technologies are compared:

A) IPsec and SSL technologies are defined at the internet layer
B) IPsec software should be installed in each user station in the "tunnel" mode, but SSL software is built into the web browser.
C) SSL has higher overhead than IPsec in setup, maintenance and update.
D) SSL is considered as secure as IPsec.
E) IPsec is considered technically more complex than SSL in implementing VPN.
سؤال
When the IPsec standard is used for VPN, both communicating parties exchange a(n) _____ for mutual authentication.

A) digital certificate
B) digital signature
C) IPsec gateway
D) IPsec-enabled web browser
E) session key
سؤال
The IPsec technology can be deployed in __________ modes.

A) site-to-site and remote access
B) tunnel and transport
C) tunnel and site-to-site
D) transport and remote access
E) site-to-site and transport
سؤال
Choose a CORRECT statement regarding SSL.

A) The technology is defined in the internetwork layer
B) Its usage requires that necessary software be separately purchased and installed.
C) It generally provides a higher level of security than IPsec.
D) It can be used for both site-to-site and remote access VPNs.
E) The software should be installed and maintained in each user station.
سؤال
The following are descriptions of IPsec tunnel mode EXCEPT:

A) IPsec servers are placed at the boundary of local sites securing all inter-site transactions.
B) Internal hosts are unaware of the IPsec server's existence, making it transparent to the hosts.
C) Packets inside of a corporate network remain unencrypted.
D) The tunnel mode is popular in implementing both remote access and site-to-site VPNs.
E) It provides end-to-end (or host-to-host) security.
سؤال
Which information may NOT be contained in the digital certificate?

A) Owner's name or alias
B) Owner's public key
C) Issuer's name
D) Owner's private key
E) Issuer's digital signature
سؤال
Which reflects a correct sequence of security standards from weak to strong?

A) WPA, WEP, WPA2
B) WPA2, WEP, WPA
C) WEP, WPA2, WPA
D) WEP, WPA, WPA2
E) WPA, WPA2, WEP
سؤال
The main components of a cryptography system include the following EXCEPT:

A) Plaintext
B) Ciphertext
C) Digital signature
D) Key value
E) Encryption algorithm
سؤال
The hash function is used to derive a __________ from an original message.

A) message digest
B) digital certificate
C) session key
D) public key
E) private key
سؤال
X.509 issued by ITU (International Telecommunications Union) defines a ____ standard.

A) digital signature
B) digital certificate
C) public key
D) message digest
E) access control list
سؤال
The following figure summarizes information items included in the ________. <strong>The following figure summarizes information items included in the ________.  </strong> A) Digital signature B) Digital certificate C) Public key D) Message digest E) Access control list <div style=padding-top: 35px>

A) Digital signature
B) Digital certificate
C) Public key
D) Message digest
E) Access control list
سؤال
Web browsers including Internet Explorer and Firefox have a built-in support for _____.

A) Packet Sniffing Detection
B) IP Spoofing Prevention
C) IP Spoofing Detection
D) Access Control List
E) SSL/TLS
سؤال
MD5 and SHA-1 are standards of:

A) encryption technologies
B) hashing algorithms (or functions)
C) digital certificate standards
D) well-known worms
E) well-known Trojan horses
سؤال
Choose an INCORRECT statement about the digital signature.

A) The message digest is a short message calculated from an original message.
B) A hash function is generally used to produce a message digest from the original message.
C) The message digest is encrypted with a receiver's public key, resulting in a digital signature.
D) The receiver computer decrypts the sender's digital signature using the sender's public key.
E) The receiver computer produces its own message digest based on the delivered message for comparison purpose.
سؤال
Choose the LEAST accurate statement of the public key encryption.

A) When A sends a message to B, A encrypts it with B's public key.
B) After A encrypts a message with B's public key, A can decrypt it using the same B's public key.
C) When A needs authentication to B, A encrypts a message with A's private key.
D) If A and B send messages to each other, each encrypts with the other's public key.
E) If A encrypts a message with B's public key, B's private key will decrypt it.
سؤال
Choose a CORRECT statement regarding Wi-Fi standards.

A) WPA is an official IEEE standard.
B) WPA and WPA2 rely on the same encryption standard.
C) With WPA, the pre-shared key is permanently used making it vulnerable for password cracking.
D) The home network relies on centralized authentication between hosts and an authentication server.
E) To derive pre-shared keys in WEP or WPA-PSK, passwords/passphrases are heavily used.
سؤال
In total, how many different keys should be used for secure communication between two parties when it relies on the asymmetric key encryption?

A) 0
B) 1
C) 2
D) 4
E) 8
سؤال
The PKI servers of a certificate authority perform the following functions except:

A) create digital certificates
B) maintain a certificate revocation list
C) distribute digital certificates
D) securely distribute private keys
E) perform security testing of a business system
سؤال
The cipher text is _________.

A) a message digest produced from an original text
B) a message digest produced from an encrypted text
C) an original text to be encrypted.
D) an encrypted text
E) an encrypted text that has been compromised.
سؤال
How to combine asymmetric and symmetric key encryptions to make the most of their strengths? Choose the LEAST accurate statement in describing the procedure from A to E.

A) Party A creates a single key for a session (called session key).
B) Party A encrypts the session key using Party B's private key and sends it to Party B.
C) Party B decrypts that secret session key with Party B's private key.
D) Both parties now encrypt data with the session key.
E) With the session key, encryption and decryption are faster than using the asymmetric key system.
سؤال
Which is CORRECT about hashing?

A) Hashing takes an input of any lengths and produces a variable-length hash value.
B) The hash function is also known as a message digest.
C) A dataset cannot be created in order to produce a predefined hash value.
D) The probability of different messages to produce the same hash value is zero.
E) A hash value can be reversed to restore the original input.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Cybersecurity: Data Protection
1
Choose a CORRECT statement regarding the VPN (virtual private network) technology.

A) VPN generally costs high on network maintenance and administration.
B) VPN allows anywhere, anytime, and any-to-any connectivity because of the Internet's ubiquity.
C) VPN lacks flexibility in adding suppliers or customers of a firm to its enterprise network.
D) VPN offers reliable quality of services (QoS) for mission-critical applications over the Internet.
E) VPN is generally safer than leased lines in transporting sensitive data.
B
2
When a company tries to connect its suppliers through site-to-site VPNs to exchange invoices electronically, the _____ standard would be the most secure choice.

A) PPTP
B) IPsec
C) SSL
D) PPP
E) DES
B
3
When IPv6 is in full swing, ________ technology is expected to become a requirement to protect data communications.

A) PPTP
B) IPsec
C) SSL
D) PPP
E) DES
B
4
When IPsec and SSL technologies are compared:

A) IPsec and SSL technologies are defined at the internet layer
B) IPsec software should be installed in each user station in the "tunnel" mode, but SSL software is built into the web browser.
C) SSL has higher overhead than IPsec in setup, maintenance and update.
D) SSL is considered as secure as IPsec.
E) IPsec is considered technically more complex than SSL in implementing VPN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
5
When the IPsec standard is used for VPN, both communicating parties exchange a(n) _____ for mutual authentication.

A) digital certificate
B) digital signature
C) IPsec gateway
D) IPsec-enabled web browser
E) session key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
6
The IPsec technology can be deployed in __________ modes.

A) site-to-site and remote access
B) tunnel and transport
C) tunnel and site-to-site
D) transport and remote access
E) site-to-site and transport
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
7
Choose a CORRECT statement regarding SSL.

A) The technology is defined in the internetwork layer
B) Its usage requires that necessary software be separately purchased and installed.
C) It generally provides a higher level of security than IPsec.
D) It can be used for both site-to-site and remote access VPNs.
E) The software should be installed and maintained in each user station.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
8
The following are descriptions of IPsec tunnel mode EXCEPT:

A) IPsec servers are placed at the boundary of local sites securing all inter-site transactions.
B) Internal hosts are unaware of the IPsec server's existence, making it transparent to the hosts.
C) Packets inside of a corporate network remain unencrypted.
D) The tunnel mode is popular in implementing both remote access and site-to-site VPNs.
E) It provides end-to-end (or host-to-host) security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which information may NOT be contained in the digital certificate?

A) Owner's name or alias
B) Owner's public key
C) Issuer's name
D) Owner's private key
E) Issuer's digital signature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which reflects a correct sequence of security standards from weak to strong?

A) WPA, WEP, WPA2
B) WPA2, WEP, WPA
C) WEP, WPA2, WPA
D) WEP, WPA, WPA2
E) WPA, WPA2, WEP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
11
The main components of a cryptography system include the following EXCEPT:

A) Plaintext
B) Ciphertext
C) Digital signature
D) Key value
E) Encryption algorithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
12
The hash function is used to derive a __________ from an original message.

A) message digest
B) digital certificate
C) session key
D) public key
E) private key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
13
X.509 issued by ITU (International Telecommunications Union) defines a ____ standard.

A) digital signature
B) digital certificate
C) public key
D) message digest
E) access control list
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
14
The following figure summarizes information items included in the ________. <strong>The following figure summarizes information items included in the ________.  </strong> A) Digital signature B) Digital certificate C) Public key D) Message digest E) Access control list

A) Digital signature
B) Digital certificate
C) Public key
D) Message digest
E) Access control list
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
15
Web browsers including Internet Explorer and Firefox have a built-in support for _____.

A) Packet Sniffing Detection
B) IP Spoofing Prevention
C) IP Spoofing Detection
D) Access Control List
E) SSL/TLS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
16
MD5 and SHA-1 are standards of:

A) encryption technologies
B) hashing algorithms (or functions)
C) digital certificate standards
D) well-known worms
E) well-known Trojan horses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
17
Choose an INCORRECT statement about the digital signature.

A) The message digest is a short message calculated from an original message.
B) A hash function is generally used to produce a message digest from the original message.
C) The message digest is encrypted with a receiver's public key, resulting in a digital signature.
D) The receiver computer decrypts the sender's digital signature using the sender's public key.
E) The receiver computer produces its own message digest based on the delivered message for comparison purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
18
Choose the LEAST accurate statement of the public key encryption.

A) When A sends a message to B, A encrypts it with B's public key.
B) After A encrypts a message with B's public key, A can decrypt it using the same B's public key.
C) When A needs authentication to B, A encrypts a message with A's private key.
D) If A and B send messages to each other, each encrypts with the other's public key.
E) If A encrypts a message with B's public key, B's private key will decrypt it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
19
Choose a CORRECT statement regarding Wi-Fi standards.

A) WPA is an official IEEE standard.
B) WPA and WPA2 rely on the same encryption standard.
C) With WPA, the pre-shared key is permanently used making it vulnerable for password cracking.
D) The home network relies on centralized authentication between hosts and an authentication server.
E) To derive pre-shared keys in WEP or WPA-PSK, passwords/passphrases are heavily used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
20
In total, how many different keys should be used for secure communication between two parties when it relies on the asymmetric key encryption?

A) 0
B) 1
C) 2
D) 4
E) 8
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
21
The PKI servers of a certificate authority perform the following functions except:

A) create digital certificates
B) maintain a certificate revocation list
C) distribute digital certificates
D) securely distribute private keys
E) perform security testing of a business system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
22
The cipher text is _________.

A) a message digest produced from an original text
B) a message digest produced from an encrypted text
C) an original text to be encrypted.
D) an encrypted text
E) an encrypted text that has been compromised.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
23
How to combine asymmetric and symmetric key encryptions to make the most of their strengths? Choose the LEAST accurate statement in describing the procedure from A to E.

A) Party A creates a single key for a session (called session key).
B) Party A encrypts the session key using Party B's private key and sends it to Party B.
C) Party B decrypts that secret session key with Party B's private key.
D) Both parties now encrypt data with the session key.
E) With the session key, encryption and decryption are faster than using the asymmetric key system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which is CORRECT about hashing?

A) Hashing takes an input of any lengths and produces a variable-length hash value.
B) The hash function is also known as a message digest.
C) A dataset cannot be created in order to produce a predefined hash value.
D) The probability of different messages to produce the same hash value is zero.
E) A hash value can be reversed to restore the original input.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.