Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

_Network Security Exam 2

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
A _________ is a key used between entities for the purpose of distributing session keys.   show
🗑
A _________ is the client's choice for an encryption key to be used to protect this specific application session.   show
🗑
A __________ indicates the length of time for which a ticket is valid (e.g., eight hours).   show
🗑
A __________ is a set of managed nodes that share the same Kerberos database which resides on the Kerberos master computer system that is located in a physically secure room.   show
🗑
A __________ server issues tickets to users who have been authenticated to the authentication server.   show
🗑
A ___________ is a service or user that is known to the Kerberos system and is identified by its principal name.   show
🗑
A random value to be repeated to assure that the response is fresh and has not been replayed by an opponent is the __________ .   show
🗑
An __________ manages the creation and maintenance of attributes such as passwords and biometric information.   show
🗑
show signature  
🗑
Encryption in version 4 makes use of a nonstandard mode of DES known as ___________ .   show
🗑
show timestamp  
🗑
show ticket granting  
🗑
show IP address  
🗑
Once the authentication server accepts the user as authentic it creates an encrypted _________ which is sent back to the client   show
🗑
Rather than building elaborate authentication protocols at each server, _________ provides a centralized authentication server whose function is to authenticate users to servers and servers to users.   show
🗑
show policy mappings  
🗑
show certificate policies  
🗑
The __________ knows the passwords of all users and stores these in a centralized database and also shares a unique secret key with each server   show
🗑
The strength of any cryptographic system rests with the _________ technique, a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.   show
🗑
show password attacks  
🗑
show X.509  
🗑
When two end systems wish to communicate they establish a logical connection and, for the duration of that logical connection, all user data are encrypted with a one-time __________ which is destroyed at the end of the session.   show
🗑
show Data Consumers  
🗑
__________ defines a framework for the provision of authentication services by the X.500 directory to its users and defines alternative authentication protocols based on the use of public-key certificates.   show
🗑
show Identity management  
🗑
show Federation  
🗑
A WML _________ is similar to an HTML page in that it is identified by a URL and is the unit of content transmission.   show
🗑
Forming a hierarchy beginning with a master key from which other keys are derived dynamically and used for a limited period of time, __________ are used for communication between a pair of devices typically between a STA and an AP.   show
🗑
show secure key delivery  
🗑
show 4-way handshake  
🗑
show PTK  
🗑
show gateway  
🗑
The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake.   show
🗑
The __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.   show
🗑
show MSDU  
🗑
The __________ is used to convey WTLS-related alerts to the peer entity.   show
🗑
show logical link control  
🗑
show media access control layer  
🗑
The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________ .   show
🗑
The master session key is also known as the __________ key.   show
🗑
The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities.   show
🗑
The specification of a protocol along with the chosen key length is known as a __________ .   show
🗑
The term used for certified 802.11b products is ___________   show
🗑
show WTLS  
🗑
show WAP  
🗑
was designed to describe content and format for presenting data on devices with limited bandwidth, limited screen size, and limited user input capability and to work with telephone keypads/styluses, and other input devices common to mobile, wireless comm.   show
🗑
show distribution  
🗑
show IEEE 802.11i  
🗑
A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer, which is then encoded using base64 encoding.   show
🗑
show key legitimacy  
🗑
show Class 3  
🗑
show multipart/parallel  
🗑
Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication.   show
🗑
MIME is an extension to the ________ framework that is intended to address some of the problems and limitations of the use of SMTP.   show
🗑
show passphrase-based  
🗑
PGP provides authentication through the use of _________ .   show
🗑
show zip  
🗑
PGP provides e-mail compatibility using the __________ encoding scheme   show
🗑
S/MIME cryptographic algorithms use __________ to specify requirement level   show
🗑
show Content-Description  
🗑
show Mail Submission Agent  
🗑
The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters   show
🗑
show base64  
🗑
The _________ type refers to other kinds of data, typically either uninterpreted binary data or information to be processed by a mail-based application   show
🗑
show Content-ID  
🗑
show Content-Type  
🗑
show leading two octets of message digest  
🗑
The __________ subtype is used when the different parts are independent but are to be transmitted together. They should be presented to the receiver in the order that they appear in the mail message   show
🗑
show trust flag byte  
🗑
show radix-64  
🗑
show Message User Agent  
🗑
show MPEG  
🗑
__________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP.   show
🗑
show SA  
🗑
A __________ attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination   show
🗑
show Responder Cookie  
🗑
show certificate request  
🗑
Authentication applied to all of the packet except for the IP header is _________ .   show
🗑
Authentication applied to the entire original IP packet is _________ .   show
🗑
Authentication makes use of the _________ message authentication code   show
🗑
IKE key determination employs __________ to ensure against replay attacks   show
🗑
show confidentiality  
🗑
IPsec provides security services at the ________ layer by enabling a system to select required security protocols, determine the algorithms to use for the services and put in place any cryptographic keys required to provide the requested services   show
🗑
show confidentiality  
🗑
The _________ payload allows peers to identify packet flows for processing by IPsec services   show
🗑
The __________ facility is concerned with the secure exchange of keys.   show
🗑
show authentication  
🗑
The __________ payload contains either error or status information associated with this SA or this SA negotiation.   show
🗑
The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .   show
🗑
show SPD  
🗑
The selectors that determine a Security Policy Database are: Name, Local and Remote Ports, Next Layer Protocol, Remote IP Address, and _________ .   show
🗑
show digital signatures  
🗑
show ESP  
🗑
show IKE  
🗑
_________ identifies the type of data contained in the payload data field by identifying the first header in that payload.   show
🗑
_________ mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPsec.   show
🗑
show IPsec  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: ITSec_guy
Popular Computers sets