Ask Computer Network & Security Expert

Question 1 : Which of the following is NOT TRUE relating to rule-based detection system?
 
It detects deviation from previous usage patterns.

It uses historical audit records.

It defines thresholds.

It makes use of expert system.

Question 2: Demilitarized zone (DMZ) can be found in which firewall configuration?
 
screened host firewall, single-homed bastion

screened host firewall, dual-homed bastion

Single bastion T

screened subnet firewall

Question 3: Asymmetric cryptography ensures that:
 
encryption and authentication can take place without sharing private keys.

encryption of the secret key is performed with the fastest algorithm available.

encryption occurs only when both parties have been authenticated.

confidentiality is provided using public key.

Question 4: A computer virus has the following parts:

Idle, Spread & Infect

Dormant, Propagation, Triggering & Execution

Infect, Spread & Trigger

Infection mechanism, Trigger & Payload

Question 5: Which of the following is TRUE relating to security service?

Denial of service is an example of security service.

Security services implement security policies.

Security services are services designed to detect, prevent or recover from an attack.

It includes notarization service.

Question 6: Which of the following is an example of a passive attack?
 
sniffing of message

masquerade

replay attack

denial of service

Question 7: The followings are steps to perform digital envelope:
 
Compute the hash value H of the message; Sign H using sender's private key; Send out the message

Compute the hash value H of the message; Sign H using receiver's public key; Send out the message

Compute the session key; Encrypt the session key with the receiver's private key; Encrypt the message with the session key; Append the encrypted session key to the ciphertext; Send out the message

Compute the session key; Encrypt the message with the session key; Encrypt the session key with the receiver's public key, Append the encrypted session key to the ciphertext; Send out the message

Question 8: The salt used in the UNIX password system is _______.
 
to increase the length of the password

to allow the user to change the password

to store the password file

to enable ease of encryption

Question 9: Which of the following is FALSE relating to RC4 algorithm?
 
It is based on stream cipher

Both the key size must be 128 bits

It is also used in the Wired Equivalent Privacy (WEP) protocol and the WiFi Protected Access (WPA) protocol

It makes use of permutation operation

Question 10: In the following viruses, which one can hide itself from detection by antivirus software?
 
parasitic virus

stealth virus

boot sector virus

macro virus

Question 11: Which of the following is FALSE relating to firewall?
 
Bastion host executes a secure version of its operating systems.

Tiny fragment attack is an attack that deter the firewall from properly inspecting the headers.

A stateful inspection firewall reviews the same packet information as a packet filtering firewall, but also records information about TCP connections.

Most packet filter firewalls support advanced user authentication mechanisms.

Question 12: Which of the following in NOT TRUE related to intrusion detection systems?
 
Intrusion detection is based on the assumption that the behaviour of the intruder differs from that of a legitimate user.

False positive means that intruders are not identified as intruders

Intrusion detection enables the collection of information about intrusion techniques

Honeypots are designed to encourage the attacker to stay on the system long enough for administrators to respond.

Question 13: Fabrication is a security attack against ________.
 
integrity

non-repudiation

authentication

modification

Question 14: The following is associated with public key certificates.
 
Public key certificates are encrypted by the certificate authority (CA)'s secret key.

Public key certificate consists of information such as User ID, public and private keys.

Certificates can only be issued by a third party.

Public key certificates are used in network applications such as SSL and S/MIME.

Question 15: Which of the following is FALSE?
 
Between internal and external firewalls are one or more networked devices in a region referred to as a DMZ (demilitarized zone) network.

Asymmetric key cryptography can use private key to encrypt the message and public key to decrypt the encrypted message.

The objective of the digital immune system is to provide rapid response time so that viruses can be stamped out almost as soon as they are introduced.

A hash code can be computed from the source message, encrypted using asymmetric encryption and a secret key, and appended to the message

Question 16: Which of the following is NOT one of the properties of hash function?

It produces a fixed size length.

From the hash value, it is not possible to find its original message.

It is possible to find an alternative message with the same hash value as a given message.

Message can be of variable length.

Question 17: Which of the following is FALSE relating to malware software?

Malicious software is software that is intentionally included or inserted in a system for a harmful purpose.

A virus is a program that can replicate itself and send copies from computer to computer across network connections

Flooders are types of malware that are used to attack networked computer systems with a large volume of traffic

Logic Bomb is one of the oldest types of malware program.

Question 18: If a user wish to obtain a certificate from a trusted CA (Certificate Authority), the user must present proof of identity and a:

Private key

Public key

Session key

Secret key

Question 19: Which one of the following default policy would permit those packets stated in the policy rule of the firewall?
 
Discard

Forward

Block

Allow

Question 20: Ali needs to send a private e-mail to Farida. Ali does not want anyone to have the ability to read the e-mail except for Farida. Which tenet of information security is concerned about?
 
Authentication

Integrity

Confidentiality

Non repudiation.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91311899
  • Price:- $20

Guranteed 24 Hours Delivery, In Price:- $20

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As