CSCI 4345 Final
What part of the URL, https://www.utrgv.edu/index.htm, represents the top-level DNS domain?.
.edu
What bit hash value does MD5 produce?. See example below 1e50a2052978e224d3dde95e7e9e7d0a
128
What bit hash value does Secure Hash Algorithm (SHA) produce?. See example below 470ec4a4f28fc4e920145048f3cc948e78cf9657
160
The length of TCP header is minimum _____ bytes long and maximum _____ bytes.
20, 60
SFTP, which stands for SSH (or Secure) File Transfer Protocol, usually runs on Port ___ .
22
Perform encryption on the following plaintext M using RSA and find the ciphertext C. Where p = 3; q = 11, e=3; M = 5.
26
If security is a real concern on your network, what length do most experts recommend as the minimum for password length?.
8
What statement is true about UDP protocol
All of the above
Which TCP/IP model layer is closest to the end user?.
Application Layer
____ verifies who has the right to gain access to the computer, whether it is your local machine or the Web server.
Authentication
____ governs what an authenticated user is allowed to do.
Authorization
Bob and Alice work at Crypty Solutions Inc. They want to share messages in a secure way where it is immune to attacks. What do you think Bob and Alice should implement?.
Cryptographic System
A wireless host needs to request an IP address. What protocol would be used to process the request?.
DHCP
Transport layer is the first one which breaks the information data, supplied by Application layer in to smaller units called ___________.
Data Segments
Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?.
Diffie-Hellman
Which of the following methods provide a shared key?. (Select two)
Diffie-Hellman and ECC
A security tool to verify the authenticity of the message and claimed identity of the sender and to verify the message integrity is _______________.
Digital signature
Which of the following is a public key algorithm based on elliptic curves?.
ECC
The private content of a transaction, if unprotected can be intercepted when it goes through the route over the internet is called __________________.
Eavesdropping
Which TCP header control bit is set on to terminate a TCP conversation
FIN
TCP Header contains the IP of the client as well as the IP of the server associated to an end-to-end connection.
False
The operating system encrypts the password for a given user by encoding the information, using a process that is difficult to apply but easy to undo.
False
Application Layer is _________ layer of TCP-IP Layered Reference Model
Fifth
What is one of the most effective security tools available for protecting users in a LAN from external threats?.
Firewalls
Transport Layer is _______ layer of OSI Layered Model
Fourth
What message type is used by an HTTP client to request data from a web server?.
GET
Which application layer protocol uses message types such as GET, PUT, and POST?.
HTTP
Which protocol is used at the application layer of the TCP/IP reference model?.
HTTP
Which of the following is the process of converting a message into a numeric value?.
Hashing
Alice is sending a message to Bob. She wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Alice attempting to achieve?.
Integrity
Why is DHCP preferred for use on large networks?.
It is a more efficient way to manage IP addresses than static address assignment.
Which of the following is the most common version of Message Digest Algorithm (MDA)?.
MD5
Bob and Alice decide to use Diffie-Hellman method. If they are not authenticated to each other, what type of security attack can be expected?.
Man-in-the-middle Attack
Which two tasks can be performed by a local DNS server?. (Choose two)
Mapping name-to-IP addresses for internal hosts and Forwarding name resolution requests between servers
In Digital Signature, there is _____ relationship between signature and message.
One to one
In the RSA algorithm, we select 2 random large values 'p' and 'q'. Which of the following is the property of 'p' and 'q'?.
P and q should be prime
Which protocol can be used to transfer messages from an email server to an email client?.
POP3
____ is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers, and passwords.
Phishing
All server processes intend to communicate over the network are equipped with well-known Transport Service Access Points (TSAPs), also known as
Port Numbers
The ports ranging from 49,152 to 65,533 can be used as temporary or private port numbers. They are called the ________ ports.
Private/Dynamic
What is the main function of Transport layer?
Provide end to end delivery
Alice scheduled a company meeting and shared the location to Bob as "ZGTNU JHII" using substitution cipher, can you help Bob to find the location?.Here is the substitution map used by Alice: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z --> H D M S G K T J W A O I B P R X L Z U C N Y E Q V F
REGUS HALL
The most common public key encryption algorithm is ____.
RSA
Which of the following is based on the idea of using large prime integer numbers for the basis of asymmetric encryption?.
RSA
What is an advantage of UDP over TCP?
Requires less overhead
What are two characteristics of peer-to-peer networks?.
Resource sharing without a dedicated server
Which of the following is an update to Secure Hash Algorithm (SHA)?.
SHA3
Which three application layer protocols use TCP? (Choose three.)
SMTP and FTP and HTTP
Which two protocols may devices use in the application process that sends email? (Choose two.)
SMTP and DNS
What's a common application for asymmetric algorithms?.
Secure key exchange
____ is the process of using people to get the information you want.
Social engineering
Which set of characteristics describes the Caesar cipher accurately?.
Symmetric, stream, substitution
Bob and Alice want their secret messages to be shared via a single key. Which cipher according to you is suitable in this case?.
Symmetric-key Encryption
Which protocol is used the most in the transport layer
TCP
The two main Transport layer protocols are _________________ .
TCP and UDP
Which statement is true about FTP?.
The client can download from or upload data to the server
What advantages do asymmetric algorithms have over symmetric ones?.
They allow secure communication over insecure channels
TCP communication works in Server/Client model. The client initiates the connection and the server either accepts or rejects it. ______________ is used for connection management.
Three-way handshaking
In UDP protocol, the receiver does not generate an acknowledgement of packet received.
True
In a TCP Header the Acknowledgement Number field contains the next sequence number of the data byte expected and works as acknowledgement of the previous data received if ACK flag is set to 1.
True
The main difficulty with a symmetric algorithm is how to securely transmit the secret key.
True
The success of RSA encryption relies on the fact that is a hard problem to find the prime factors for a long integer number n.
True
Transport layer takes data from upper layer (i.e. Application layer) and then breaks it into numbered segments, and hands over to lower layer (Network Layer) for delivery of packets.
True
Your best defense against someone guessing your password is to be smart about how you choose and use your password.
True
What does UDP stand for
User Datagram Protocol
In a TCP Header the field _________ is used for flow control between two stations and indicates the amount of buffer (in bytes) the receiver has allocated for a segment
Windows size
On a home network, which device is most likely to provide dynamic IP addressing to clients?.
a home router
Public key encryption/decryption is not preferred because:
all of the mentioned
What type of applications are best suited for using UDP?.
applications that are sensitive to delay
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.
authentication
Some laptops now use ____ information such as fingerprint scanning.
biometric
A person is downloading a web page from a server of an e-shop. What role is the personal computer assuming in this network model?.
client
Which of the following is the solution of the equation e*d mod m = 1, where m =(p-1)*(q-1) with p, q prime numbers ?.
d = e^(m-2) mod m
Which benefit does SSH offer over Telnet for remotely managing a router?.
encryption
Transport layer offers __________ connection between two processes on remote hosts
end to end
A(n) ____ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.
hash function
A _______ captures the user's passwords and credit card numbers (and sends them to someone else) or may even put the computer under someone else's remote control at some point in the future.
keystroke logger
A Certification Authority (CA) can be used to avoid a ____________ attack.
man-in-the-middle
To try all possible passwords of length k or less would require ____ attempts.
n^1 + n^2 + ... + n^k
For a given user ID, ____ software will first try all words in its built-in dictionary, encrypting each with the well-known hash function and comparing the result with the password file.
password-cracking
Which protocol uses encryption?.
ssh
Which type of cipher is a simple coding system that changes one character or symbol into another?.
substitution
What is a socket?.
the combination of a source IP address and port number or a destination IP address and port number
What is a characteristic of the application layer in the TCP/IP reference model?.
the creation and maintenance of dialogue between source and destination applications
To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely ____ at which the user created the password.
the exact time