CIW Lesson 6 B
Which choice correctly describes symmetric-key encryption?
It is very fast, and all recipients and viewers must have the same key.
Which choice correctly describes asymmetric-key encryption?
It is very slow, and the public key is distributed because the private key stays secure with the user.
The Advanced Encryption Standard (AES) Rijndael algorithm is a block cipher that allows for the creation of:
256-bit keys.
Which choice correctly describes an intranet?
A private network to which only company employees have access
What is a firewall?
A secure computer system placed between a secured network and an open, unsecured network
What is a proxy server?
A server that mediates traffic between a protected network and the Internet, and replaces the network IP address with a single IP address
Which of the following should you implement in order to isolate a group of computers to which access to certain protocols is prohibited, and to help reduce network traffic by balancing the load between network segments?
A virtual LAN (VLAN)
In which of the following is a mathematically matched key pair needed to encrypt and decrypt messages?
Asymmetric-key encryption
What is the term for a mini-network that resides between a company's internal network and the Internet, and is separate from both?
Demilitarized zone (DMZ)
What is the term for a private network that allows selected access to outsiders only after they provide authentication information?
Extranet
Which of the following activities can be performed by a router and is a good first line of defense against unwanted intrusions?
Filtering packets
Which encryption method should you use for information that will not be decrypted or read?
Hash encryption
Which of the following is a VPN authentication and encryption standard that provides security over the Internet?
IP Security (IPsec)
What is the term for a proprietary key-management scheme that uses symmetric algorithms and acts as a trusted third party that knows the identities of the organizations asking to communicate, but does not reveal them?
Kerberos
If Internet access is required and a network is located behind a proxy server, how can you ensure that users have access to Internet services that use less-common ports?
Make sure the network has access to all Internet-related protocols used by the company by opening their associated ports at the proxy server.
Which of the following terms is associated with the practice of hiding internal IP addresses from the external network?
Network Address Translation (NAT)
Which of the following combines encryption methods to facilitate secure communications over long distances by employing the strengths of each method?
Pretty Good Privacy (PGP)
In which of the following is one key used to encrypt and decrypt messages?
Symmetric-key encryption
Which of the following generally comprises the corporate network backbone in a Virtual Private Network (VPN)?
The Internet
A network security audit should be conducted by:
a party that is not responsible for maintaining the network on a daily basis.
A firewall that is used to protect an individual system is known as:
a personal firewall.
A standard firewall that resides inside your company's internal network is known as:
an internal firewall.
Rivest, Shamir, Adleman (RSA) and Digital Signature Algorithm (DSA) are examples of:
asymmetric-key algorithms.
A firewall:
includes functionality to filter packets, detect intrusions and provide enhanced password authentication.
An application-level gateway is an example of a:
proxy server.
Data Encryption Standard (DES), Triple DES and Advanced Encryption Standard (AES) are examples of:
symmetric-key algorithms.
A protocol that encapsulates data packets into another packet is known as a:
tunneling protocol.