Question: Question 25 There are two names that describe the attribute of a virus or worm that can change its bit pattern, or image representations. What

Question 25

There are two names that describe the attribute of a virus or worm that can change its bit pattern, or image representations. What is one of the names?

Question 26

A broad category of attacks that are related to the improper handling of input are called what? These attacks are commonly seen with interpretative programming languages.

Question 27

Using a ROT13 cipher encrypt the following plaintext. Spring time is here

Question 28

A sequence of IPsec security associations that are used to process data to achieve some sort of IPsec functionality is called what?

Question 29

What is never passed in plaintext format in Kerberos?

Question 30

Show the correct protocol layering in the IP stack. The first protocol in the list represents the highest in the protocol stack. The last protocol represents the lowest in the protocol stack.

Term 1

Term 2

Term 3

Term 4

Question 31

Select the best answer. If the sender uses the recipients public key to encrypt a message what functionality is provided:

1.

Message integrity

2.

Message confidentiality

3.

Message authentication

4.

Message authentication and message confidentiality

5.

none of the choices

Question 32

Match the Authentication protocol with the attributes. Use the best attribute for each protocol and use each attribute once.

Kerberos

PAP

CHAP

RADIUS

Liberty Alliance

A.

Sends the password over the wire in the clear

B.

KDC stores passwords

C.

Implementation of an AAA protocol

D.

Organization for defining Federated Identity Management

E.

Three part protocol that can periodically reauthenticate client

Question 33

Patching a virtualization infrastructure is not necessary if you keep the guest operating systems patched.

True

False

Question 34

What component in a virtualization system virtualizes the hardware to the components layered above it?

Question 35

Match the description in the first column with the security "mechanism" that best fits the description. Use each security mechanism once.

Uses the same secret key for encryption and decryption

Used to produce HMAC

Different keys used for encryption and decryption

Diffie-Hellman and Oakley

Cipher Block Chaining and Electronic codebook

Implements tunnel mode and transport mode

Public Key Certificates

A.

Symmetric Encryption

B.

X.509 standard

C.

IPsec

D.

Modes of operation

E.

Asymmetric encryption

F.

Key exchange algorithms

G.

MD5, SHA-1

Question 36

Match the SSL protocol with the functionality provided.

Authenticates client and server

Updates cipher specification

Sends conditions to peer entity

Supports confidentiality and message integrity

Exchange cryptographic information between client and server

Calculates MAC code and performs data encryption

Sends condition "bad_record_mac"

A.

SSL Cipher protocol

B.

SSL Record protocol

C.

SSL Alert protocol

D.

SSL Handshake protocol

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!