Chapter 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is not one of the four common goals of cryptography?

/Availability Authentication Privacy Integrity The four common goals of cryptography include privacy, authentication, integrity, and non-repudiation.

DES does how many rounds during the encryption process?

16 DES does 16 rounds of substitution and transposition during the encryption process.

An IPv4 header has a default length of _______________ .

20 bytes IPv4 has a 20 byte default header length and can be 60 bytes maximum with options.

What TCP port does SMTP use?

25 SMTP uses TCP port 25

3DES does how many rounds during the encryption process?

48 3DES does 48 rounds of substitution and transposition during the encryption process.

What UDP port does TFTP use?

69 UDP port 69 is used for TFTP.

Which of the following is known as a ROT 3 cipher:

Caesar Caesar cipher is an early form of encryption and is also known as a ROT3 cipher.

Which of the following makes use of a stream cipher process?

RC4 RC4 is considered a stream cipher whereas DES ECB, RC5, and RC6 are block ciphers.

Which of the following is not a symmetric algorithm?

RSA/ CAST RC5 DES Example of symmetric encryption techniques include CAST, DES, and RC5. RSA is a asymmetric algorithm

DES has an effective key length of?

56 The DES key size is 56- bits, and DES has four primary modes of operation

SAFER uses ___ blocks of data?

64 Secure and Fast Encryption Routine is a block-based cipher that processes data in blocks of 64 and 128 bits.

This protocol is no longer used in IPv6?

ARP Say goodbye to ARP. While ARP is an integral part of IPv4, it is not used with IPv6. IPV6 makes use of NDP, the neighbor discovery protocol (NDP).

HTTP functions at which layer of the TCP model?

Application HTTP, and other protocols like Telnet and SNMP, function at the application layer where they provide network services.

The act of obtaining plain text from cipher text without a cryptographic key is know as what?

Cryptanalysis Cryptanalysis is the act of obtaining plain text from cipher text without a cryptographic key.

Which of the following does VoIP not use?

IAX RTP H.121/ SIP VoIP makes use of protocols such as Session Initiation Protocol (SIP), H.323, Inter-Asterisk eXchange protocol (IAX), and Real-time Transport Protocol (RTP).

What is another name for digital controllers?

SCADA Yesterday's analog controls have become today's digital systems. These digital controls are known as Supervisory Control And Data Acquisition (SCADA) systems.

Cisco first came up with which of the following remote access technology?

TACACS Cisco has implemented a variety of remote access methods through its networking hardware and software. Originally, this was Terminal Access Controller Access Control System (TACACS).

These devices have the ability to perform deep packet inspection and look at requests and responses within the HTTP/HTTPS/SOAP/XML-RPC/Web Service layers.

WAF A WAF is a firewall sitting between a web- client and a web server, analyzing OSI Layer-7 traffic.

______ is a measure of the randomness of data collected by an application or even an operating system and used to create a cryptography key

Entropy While key size is important, the randomness of the key is also critical. Entropy is a measure of the randomness of data collected by an application or even an operating system and used to create a cryptography key

An ICMP type 8 message is best defined as?

Ping ICMP is used for logical errors and diagnostics. An ICMP type 8 is a ping request.


Conjuntos de estudio relacionados

Combo with SIA Computer Excel Chapter 2

View Set

Respiratory System Chapter 29 Saunders

View Set