Deck 5: Network Security and Cryptographic Protocols

Full screen (f)
exit full mode
Question
______________is used for encrypting data at network level

A)ipsec
B)https
C)smtp
D)s/mime
Use Space or
up arrow
down arrow
to flip the card.
Question
WPA2 is used for security in ____________________________   

A)ethernet
B)wi-fi
C)bluetooth
D)e-mail
Question
Which of the following is not a strong security protocol

A)ssl
B)httpl
C)smtp
D)sftp
Question
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
Question
IPSec operates in..... different modes

A)3
B)2
C)4
D)5
Question
length of the IPv4 address is ....

A)32 bits
B)64 bits
C)16 bits
D)128 bit
Question
Internet Key Exchange has .... phases and modes of operations

A)4
B)3
C)2
D)5
Question
PGP is abbreviated as

A)pretty good privacy
B)pretty good policy
C)policy good privacy
D)pretty good protection
Question
SET stands for

A)set electronic transaction
B)secure electronic transaction
C)simple electronic transaction
D)none of the above
Question
Transport layer Protocol consists of ... main components

A)2
B)1
C)3
D)4
Question
SSL provides .

A)message integrity
B)confidentiality
C)compression
D)all of the above
Question
IPSec provides ....protocols for network layer

A)7
B)3
C)1
D)4
Question
length of the IPv6 header is....

A)64 bits
B)16 bits
C)32 bits
D)8 bits
Question
According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

A)confidentiality
B)integrity
C)authenticity
D)availability
Question
CIA triad is also known as ____________________________   

A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
Question
____________________________ of information means, only authorised users are capable of accessing the information.

A)confidentiality
B)integrity
C)non-repudiation
D)availability
Question
____________________________  means the protection of data from modification by unknown users.

A)confidentiality
B)integrity
C)authentication
D)non-repudiation
Question
When you use the word it means you are protecting your data from getting disclosed.

A)confidentiality
B)integrity
C)authentication
D)availability
Question
When integrity is lacking in a security system, __________________________________________  occurs.

A)database hacking
B)data deletion
C)data tampering
D)data leakage
Question
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
Question
This helps in identifying the origin of information and authentic user. This referred to here as __________________________________________

A)confidentiality
B)integrity
C)authenticity
D)availability
Question
Data is used to ensure confidentiality.

A)encryption
B)locking
C)deleting
D)backup
Question
Data integrity gets compromised when and are taken control off.

A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
Question
____________________________ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A)network security
B)database security
C)information security
D)physical security
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Network Security and Cryptographic Protocols
1
______________is used for encrypting data at network level

A)ipsec
B)https
C)smtp
D)s/mime
ipsec
2
WPA2 is used for security in ____________________________   

A)ethernet
B)wi-fi
C)bluetooth
D)e-mail
wi-fi
3
Which of the following is not a strong security protocol

A)ssl
B)httpl
C)smtp
D)sftp
smtp
4
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
IPSec operates in..... different modes

A)3
B)2
C)4
D)5
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
length of the IPv4 address is ....

A)32 bits
B)64 bits
C)16 bits
D)128 bit
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Internet Key Exchange has .... phases and modes of operations

A)4
B)3
C)2
D)5
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
PGP is abbreviated as

A)pretty good privacy
B)pretty good policy
C)policy good privacy
D)pretty good protection
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
SET stands for

A)set electronic transaction
B)secure electronic transaction
C)simple electronic transaction
D)none of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
Transport layer Protocol consists of ... main components

A)2
B)1
C)3
D)4
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
SSL provides .

A)message integrity
B)confidentiality
C)compression
D)all of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
IPSec provides ....protocols for network layer

A)7
B)3
C)1
D)4
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
length of the IPv6 header is....

A)64 bits
B)16 bits
C)32 bits
D)8 bits
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

A)confidentiality
B)integrity
C)authenticity
D)availability
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
CIA triad is also known as ____________________________   

A)nic (non-repudiation, integrity, confidentiality)
B)aic (availability, integrity, confidentiality)
C)ain (availability, integrity, non-repudiation)
D)aic (authenticity, integrity, confidentiality)
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
____________________________ of information means, only authorised users are capable of accessing the information.

A)confidentiality
B)integrity
C)non-repudiation
D)availability
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
____________________________  means the protection of data from modification by unknown users.

A)confidentiality
B)integrity
C)authentication
D)non-repudiation
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
When you use the word it means you are protecting your data from getting disclosed.

A)confidentiality
B)integrity
C)authentication
D)availability
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
When integrity is lacking in a security system, __________________________________________  occurs.

A)database hacking
B)data deletion
C)data tampering
D)data leakage
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A)they help understanding hacking better
B)they are key elements to a security breach
C)they help understands security and its components better
D)they help to understand the cyber-crime better
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
This helps in identifying the origin of information and authentic user. This referred to here as __________________________________________

A)confidentiality
B)integrity
C)authenticity
D)availability
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
Data is used to ensure confidentiality.

A)encryption
B)locking
C)deleting
D)backup
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
Data integrity gets compromised when and are taken control off.

A)access control, file deletion
B)network, file permission
C)access control, file permission
D)network, system
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
____________________________ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A)network security
B)database security
C)information security
D)physical security
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.