_Network Security Exam 2
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
A _________ is a key used between entities for the purpose of distributing session keys. | show 🗑
|
||||
A _________ is the client's choice for an encryption key to be used to protect this specific application session. | show 🗑
|
||||
A __________ indicates the length of time for which a ticket is valid (e.g., eight hours). | show 🗑
|
||||
A __________ is a set of managed nodes that share the same Kerberos database which resides on the Kerberos master computer system that is located in a physically secure room. | show 🗑
|
||||
A __________ server issues tickets to users who have been authenticated to the authentication server. | show 🗑
|
||||
A ___________ is a service or user that is known to the Kerberos system and is identified by its principal name. | show 🗑
|
||||
A random value to be repeated to assure that the response is fresh and has not been replayed by an opponent is the __________ . | show 🗑
|
||||
An __________ manages the creation and maintenance of attributes such as passwords and biometric information. | show 🗑
|
||||
show | signature
🗑
|
||||
Encryption in version 4 makes use of a nonstandard mode of DES known as ___________ . | show 🗑
|
||||
show | timestamp
🗑
|
||||
show | ticket granting
🗑
|
||||
show | IP address
🗑
|
||||
Once the authentication server accepts the user as authentic it creates an encrypted _________ which is sent back to the client | show 🗑
|
||||
Rather than building elaborate authentication protocols at each server, _________ provides a centralized authentication server whose function is to authenticate users to servers and servers to users. | show 🗑
|
||||
show | policy mappings
🗑
|
||||
show | certificate policies
🗑
|
||||
The __________ knows the passwords of all users and stores these in a centralized database and also shares a unique secret key with each server | show 🗑
|
||||
The strength of any cryptographic system rests with the _________ technique, a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key. | show 🗑
|
||||
show | password attacks
🗑
|
||||
show | X.509
🗑
|
||||
When two end systems wish to communicate they establish a logical connection and, for the duration of that logical connection, all user data are encrypted with a one-time __________ which is destroyed at the end of the session. | show 🗑
|
||||
show | Data Consumers
🗑
|
||||
__________ defines a framework for the provision of authentication services by the X.500 directory to its users and defines alternative authentication protocols based on the use of public-key certificates. | show 🗑
|
||||
show | Identity management
🗑
|
||||
show | Federation
🗑
|
||||
A WML _________ is similar to an HTML page in that it is identified by a URL and is the unit of content transmission. | show 🗑
|
||||
Forming a hierarchy beginning with a master key from which other keys are derived dynamically and used for a limited period of time, __________ are used for communication between a pair of devices typically between a STA and an AP. | show 🗑
|
||||
show | secure key delivery
🗑
|
||||
show | 4-way handshake
🗑
|
||||
show | PTK
🗑
|
||||
show | gateway
🗑
|
||||
The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake. | show 🗑
|
||||
The __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs. | show 🗑
|
||||
show | MSDU
🗑
|
||||
The __________ is used to convey WTLS-related alerts to the peer entity. | show 🗑
|
||||
show | logical link control
🗑
|
||||
show | media access control layer
🗑
|
||||
The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________ . | show 🗑
|
||||
The master session key is also known as the __________ key. | show 🗑
|
||||
The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities. | show 🗑
|
||||
The specification of a protocol along with the chosen key length is known as a __________ . | show 🗑
|
||||
The term used for certified 802.11b products is ___________ | show 🗑
|
||||
show | WTLS
🗑
|
||||
show | WAP
🗑
|
||||
was designed to describe content and format for presenting data on devices with limited bandwidth, limited screen size, and limited user input capability and to work with telephone keypads/styluses, and other input devices common to mobile, wireless comm. | show 🗑
|
||||
show | distribution
🗑
|
||||
show | IEEE 802.11i
🗑
|
||||
A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer, which is then encoded using base64 encoding. | show 🗑
|
||||
show | key legitimacy
🗑
|
||||
show | Class 3
🗑
|
||||
show | multipart/parallel
🗑
|
||||
Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication. | show 🗑
|
||||
MIME is an extension to the ________ framework that is intended to address some of the problems and limitations of the use of SMTP. | show 🗑
|
||||
show | passphrase-based
🗑
|
||||
PGP provides authentication through the use of _________ . | show 🗑
|
||||
show | zip
🗑
|
||||
PGP provides e-mail compatibility using the __________ encoding scheme | show 🗑
|
||||
S/MIME cryptographic algorithms use __________ to specify requirement level | show 🗑
|
||||
show | Content-Description
🗑
|
||||
show | Mail Submission Agent
🗑
|
||||
The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters | show 🗑
|
||||
show | base64
🗑
|
||||
The _________ type refers to other kinds of data, typically either uninterpreted binary data or information to be processed by a mail-based application | show 🗑
|
||||
show | Content-ID
🗑
|
||||
show | Content-Type
🗑
|
||||
show | leading two octets of message digest
🗑
|
||||
The __________ subtype is used when the different parts are independent but are to be transmitted together. They should be presented to the receiver in the order that they appear in the mail message | show 🗑
|
||||
show | trust flag byte
🗑
|
||||
show | radix-64
🗑
|
||||
show | Message User Agent
🗑
|
||||
show | MPEG
🗑
|
||||
__________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP. | show 🗑
|
||||
show | SA
🗑
|
||||
A __________ attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination | show 🗑
|
||||
show | Responder Cookie
🗑
|
||||
show | certificate request
🗑
|
||||
Authentication applied to all of the packet except for the IP header is _________ . | show 🗑
|
||||
Authentication applied to the entire original IP packet is _________ . | show 🗑
|
||||
Authentication makes use of the _________ message authentication code | show 🗑
|
||||
IKE key determination employs __________ to ensure against replay attacks | show 🗑
|
||||
show | confidentiality
🗑
|
||||
IPsec provides security services at the ________ layer by enabling a system to select required security protocols, determine the algorithms to use for the services and put in place any cryptographic keys required to provide the requested services | show 🗑
|
||||
show | confidentiality
🗑
|
||||
The _________ payload allows peers to identify packet flows for processing by IPsec services | show 🗑
|
||||
The __________ facility is concerned with the secure exchange of keys. | show 🗑
|
||||
show | authentication
🗑
|
||||
The __________ payload contains either error or status information associated with this SA or this SA negotiation. | show 🗑
|
||||
The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ . | show 🗑
|
||||
show | SPD
🗑
|
||||
The selectors that determine a Security Policy Database are: Name, Local and Remote Ports, Next Layer Protocol, Remote IP Address, and _________ . | show 🗑
|
||||
show | digital signatures
🗑
|
||||
show | ESP
🗑
|
||||
show | IKE
🗑
|
||||
_________ identifies the type of data contained in the payload data field by identifying the first header in that payload. | show 🗑
|
||||
_________ mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPsec. | show 🗑
|
||||
show | IPsec
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
ITSec_guy
Popular Computers sets