Question: Question 25 There are two names that describe the attribute of a virus or worm that can change its bit pattern, or image representations. What
Question 25
There are two names that describe the attribute of a virus or worm that can change its bit pattern, or image representations. What is one of the names?
Question 26
A broad category of attacks that are related to the improper handling of input are called what? These attacks are commonly seen with interpretative programming languages.
Question 27
Using a ROT13 cipher encrypt the following plaintext. Spring time is here
Question 28
A sequence of IPsec security associations that are used to process data to achieve some sort of IPsec functionality is called what?
Question 29
What is never passed in plaintext format in Kerberos?
Question 30
Show the correct protocol layering in the IP stack. The first protocol in the list represents the highest in the protocol stack. The last protocol represents the lowest in the protocol stack.
Term 1
Term 2
Term 3
Term 4
Question 31
Select the best answer. If the sender uses the recipients public key to encrypt a message what functionality is provided:
| 1. | Message integrity | |
| 2. | Message confidentiality | |
| 3. | Message authentication | |
| 4. | Message authentication and message confidentiality | |
| 5. | none of the choices |
Question 32
Match the Authentication protocol with the attributes. Use the best attribute for each protocol and use each attribute once.
| |
| Kerberos |
| PAP |
| CHAP |
| RADIUS |
|
|
Question 33
Patching a virtualization infrastructure is not necessary if you keep the guest operating systems patched.
True
False
Question 34
What component in a virtualization system virtualizes the hardware to the components layered above it?
Question 35
Match the description in the first column with the security "mechanism" that best fits the description. Use each security mechanism once.
| |
| Uses the same secret key for encryption and decryption |
| Used to produce HMAC |
| Different keys used for encryption and decryption |
| Diffie-Hellman and Oakley |
| Cipher Block Chaining and Electronic codebook |
| Implements tunnel mode and transport mode |
|
|
Question 36
Match the SSL protocol with the functionality provided.
| |
| Authenticates client and server |
| Updates cipher specification |
| Sends conditions to peer entity |
| Supports confidentiality and message integrity |
| Exchange cryptographic information between client and server |
| Calculates MAC code and performs data encryption |
|
|
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
