Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. In modern network communication, 2. A certificate authority (CA) 3. We must a

ID: 3759528 • Letter: 1

Question

1.

In modern network communication,

2.

A certificate authority (CA)

3.

We must assume that Trudy can do all of these except

4.

A firewall

5.

A VPN (Virtual Private Network)

6.

WEP (wired equivalency protocol)

7.

A modern crypto system relies on

8.

Intrusion detection systems

9.

SSL (Secure Sockets Layer)

10.

Access control lists (ACLs)

1.

In modern network communication,

A) the caesar cipher is used
B) only symmetric cryptography is used
C) only asymmetric cryptography is used
D) both symmetric and asymmetric cyptography are used together

2.

A certificate authority (CA)

A) keeps copies of the private keys of all entities (users)
B) binds a public key (certificate) to an entity (user)
C) gives each pair of users wishing to communicate a private key they can use as a session key
D) publishes the private keys of all entities (users)

3.

We must assume that Trudy can do all of these except

A) attempt to impersonate either Bob or Alice
B) hijack or take over a connection between Bob and Alice
C) evesdrop or intercept messages between Bob and Alice
D) know Bob or Alice's private key

4.

A firewall

A) isolates an organization's internal network from the larger internet
B) is all that is ever needed for a secure network
C) never allows packets to flow outward unless they are requested from the outside network
D) always allows packets to flow inward

5.

A VPN (Virtual Private Network)

A) provides a secure tunnel between a website and a client browser between the application layer and transport layer
B) Uses protocols like IPSec to provide security at the network layer
C) uses WEP to secure the wireless channel
D) requires the user to set up a virtual circuit to the other endpoint

6.

WEP (wired equivalency protocol)

A) is better than WPA
B) Is a flawed security protocol that was poorly designed
C) is more secure than the AES standard
D) uses a 56 bit key over a 64 bit packet, and encrypts 3 times

7.

A modern crypto system relies on

A) a secret code that only the sender and receiver know
B) Bob and Alice not sharing their passwords
C) mathematical methods that are impossible to crack without long periods of time
D) Trudy being dumb

8.

Intrusion detection systems

A) operate on the TCP/IP headers only
B) take corrective action to prevent malware from infecting routers
C) often result in "false alerts" that require system administrators to investigate
D) conduct deep packet inspection to alert on potentially harmful traffic

9.

SSL (Secure Sockets Layer)

A) secures the communication at the data-link layer
B) provides a secure API between the application layer and transport layer
C) secures the wireless signal by adding security to the physical layer
D) requires the user to enter their special SSL password

10.

Access control lists (ACLs)

A) prevent malware from infecting computers
B) prevent all traffic except what is desired
C) are rules configured by network administrators that firewalls use to determine what traffic is allowed
D) blocks viruses from getting into the network

Explanation / Answer

1.

Hence the correct Option is D.

------------------------------------------------------------------------------------------------------

2.

Hence the correct Option is B.

------------------------------------------------------------------------------------------------------

3.

Hence the correct Option is D.

------------------------------------------------------------------------------------------------------

4.

Hence the correct Option is A.

------------------------------------------------------------------------------------------------------

5.

------------------------------------------------------------------------------------------------------
6.

Hence the correct Option is B.

------------------------------------------------------------------------------------------------------
7.

Hence the correct Option is C.

------------------------------------------------------------------------------------------------------
8.

Hence the correct Option is D.

------------------------------------------------------------------------------------------------------

9.


Hence the correct Option is B.

------------------------------------------------------------------------------------------------------
10.

Hence the correct Option is C.