Network Security Concepts Quiz
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which access control model enables the resource owner to specify access permissions for subjects?

  • Attribute-Based Access Control
  • Role-Based Access Control
  • Discretionary Access Control (correct)
  • Mandatory Access Control
  • What are the layers of the TCP/IP model from bottom to top?

  • Application, Transport, Internet, Network Interface (correct)
  • Link, Internet, Network, Application
  • Network, Transport, Link, Internet
  • Transport, Network, Application, Session
  • If the client's private key is Kc = 13 and the public parameter is p = 1013 with generator 2, what is the client's public key?

  • 409
  • 819
  • 154
  • 763 (correct)
  • What shared secret information is exchanged between the client and server if the server's private key is Ks = 11?

    <p>765 (A)</p> Signup and view all the answers

    What is the encryption key in hexadecimal form after applying MD5 to the shared secret information with ASCII encoding?

    <p>9e107d9d372b4172326323027427d82 (C)</p> Signup and view all the answers

    What does the Enigma machine allow for in its encryption process?

    <p>Probabilistic encryption with identical keys (D)</p> Signup and view all the answers

    In the context of the Advanced Encryption Standard (AES), which component is responsible for performing substitutions on the input data?

    <p>SubBytes (C)</p> Signup and view all the answers

    Which mode of operation does not allow for probabilistic encryption?

    <p>Electronic Codebook (ECB) (D)</p> Signup and view all the answers

    What is indicated by the term 'avalanche effect' in cryptography?

    <p>Input changes result in radical output changes (A)</p> Signup and view all the answers

    Which statement about MAC algorithms is incorrect?

    <p>MAC algorithms are non-reversible. (D)</p> Signup and view all the answers

    When utilizing block ciphers, what is a crucial step to maintain confidentiality?

    <p>Employing the correct mode of operation (C)</p> Signup and view all the answers

    What is the significance of the Rijndael S-box in the AES?

    <p>It is responsible for byte substitutions. (D)</p> Signup and view all the answers

    How does the Counter mode (CTR) function in terms of encryption?

    <p>It employs a counter that varies with each block. (A)</p> Signup and view all the answers

    Which access control model uses attributes of the user, resource, and environment to control access?

    <p>Attribute-Based Access Control (ABAC) (B)</p> Signup and view all the answers

    What does a low false nonmatch rate in biometric systems primarily ensure?

    <p>Fewer legitimate users are incorrectly denied access (B)</p> Signup and view all the answers

    Is multi-factor authentication generally more secure than single-factor authentication?

    <p>Yes, it offers additional layers of protection. (C)</p> Signup and view all the answers

    Which statement regarding file permissions is incorrect based on the output of 'ls -l /sbin'?

    <p>Normal users can run the command: cd /sbin (A)</p> Signup and view all the answers

    Which authentication factor is demonstrated when Martin uses his employee card?

    <p>What a user has (C)</p> Signup and view all the answers

    What is the consequence of restricting user passwords to a length of only 8 digits as done by Olav?

    <p>It makes passwords easier to brute-force. (B)</p> Signup and view all the answers

    Which access control model is most appropriate for granting user access based on job functions?

    <p>Role-Based Access Control (RBAC) (B)</p> Signup and view all the answers

    What character set was used in the password entry generated by Windows LAN Manager?

    <p>Lower-case and upper-case English letters only (B)</p> Signup and view all the answers

    What is the numerical representation of the permission drwxr-xr-x for a directory?

    <p>755 (D)</p> Signup and view all the answers

    What role does salt play in common password storage techniques?

    <p>It complicates brute-force attacks. (D)</p> Signup and view all the answers

    What type of entity is described as capable of accessing a resource in an access control system?

    <p>Subject (C)</p> Signup and view all the answers

    What is the default umask value for newly created directories in Linux systems?

    <p>022 (D)</p> Signup and view all the answers

    How does salted hashing contribute to the security of stored passwords?

    <p>By increasing the difficulty of dictionary attacks. (B)</p> Signup and view all the answers

    What does the term 'false acceptance rate' refer to in biometric authentication?

    <p>The likelihood of unauthorized users being granted access. (B)</p> Signup and view all the answers

    Which access control model compares security labels to determine access rights?

    <p>Mandatory Access Control (MAC) (C)</p> Signup and view all the answers

    Which of the following best describes the common practice of hashing passwords with a salt?

    <p>It combines the user's password and salt before hashing. (D)</p> Signup and view all the answers

    What significantly distinguishes public-key cryptography from symmetric encryption?

    <p>Public-key cryptography employs two separate keys for encryption and decryption. (C)</p> Signup and view all the answers

    What does a public key certificate primarily consist of?

    <p>A public key, a user ID, and a signature by a trusted party. (A)</p> Signup and view all the answers

    Who were the developers behind the RSA public-key scheme?

    <p>Ron Rivest, Adi Shamir, and Len Adleman (D)</p> Signup and view all the answers

    What is the primary purpose of the Diffie-Hellman key exchange algorithm?

    <p>To enable two users to securely exchange a shared secret key. (D)</p> Signup and view all the answers

    What is the limitation of the Diffie-Hellman scheme regarding the messages exchanged?

    <p>It allows interception without revealing the private keys. (A)</p> Signup and view all the answers

    What is the main goal of digital signatures in public-key cryptography?

    <p>To prove the origin or approval of a message from a specific user. (C)</p> Signup and view all the answers

    Which of the following best describes the RSA algorithm's method of operation?

    <p>It operates with plaintext and ciphertext as integers within a specified range. (A)</p> Signup and view all the answers

    In symmetric key cryptography, which statement is true?

    <p>A shared secret key is used for encryption and decryption between two users. (B)</p> Signup and view all the answers

    What umask value should be set to achieve the desired directory permissions of rwxrwxr--?

    <p>002 (B)</p> Signup and view all the answers

    What is the first step in establishing a TCP connection using the TCP three-way handshake?

    <p>The Client sends a SYN packet to the Server. (D)</p> Signup and view all the answers

    What does the Server send back after it receives the SYN packet from the Client?

    <p>A SYN-ACK packet. (C)</p> Signup and view all the answers

    Which umask would result in directory permissions of 755?

    <p>122 (B)</p> Signup and view all the answers

    What primary function does DHCP serve in computer networking?

    <p>Dynamically assigns IP addresses to devices. (B)</p> Signup and view all the answers

    Which umask would result in 774 directory permissions?

    <p>003 (B)</p> Signup and view all the answers

    In the context of TCP connection establishment, what does the acronym 'SYN' stand for?

    <p>Synchronization. (D)</p> Signup and view all the answers

    What is the final step in the TCP three-way handshake after the Client receives the SYN-ACK?

    <p>The Client sends an ACK packet. (A)</p> Signup and view all the answers

    Flashcards

    Enigma Machine

    A cipher device used in the 20th century for secret communication.

    Probabilistic Encryption

    Same inputs lead to different outputs in encryption.

    AES (Advanced Encryption Standard)

    A symmetric encryption algorithm, iterates on operations (SubBytes etc.).

    SubBytes

    Substitution cipher component of AES, uses a look-up table (S-box).

    Signup and view all the flashcards

    Rijndael S-box

    8x8 substitution table (S-box) used in AES.

    Signup and view all the flashcards

    Block Cipher Modes of Operation

    Methods for processing data blocks in block ciphers.

    Signup and view all the flashcards

    Cipher Block Chaining (CBC)

    A block cipher mode where each block influences the next.

    Signup and view all the flashcards

    Electronic Codebook (ECB)

    A block cipher mode that encrypts each block independently; Not Probabilistic

    Signup and view all the flashcards

    Multi-factor authentication (MFA)

    A security method that requires multiple authentication factors from the user (something the user knows, has, or is) to gain access.

    Signup and view all the flashcards

    User Authentication Factors

    Methods used to verify a user's identity, such as something the user knows (password), has (ID card), or physically is (biometrics).

    Signup and view all the flashcards

    Salted Hashing

    A password storage technique that adds a random value (salt) to the password before hashing. This makes brute-force and dictionary attacks more difficult.

    Signup and view all the flashcards

    Hashcat

    A tool used to crack passwords by trying different combinations.

    Signup and view all the flashcards

    Password Storage

    The method of saving passwords in a secure way to prevent unauthorized access.

    Signup and view all the flashcards

    MD5

    A hashing algorithm.

    Signup and view all the flashcards

    Biometric Authentication False Match

    When a biometric system incorrectly identifies a different person's sample as the same person during verification.

    Signup and view all the flashcards

    Single-factor authentication

    User authentication relying on only one factor, such as a password.

    Signup and view all the flashcards

    Access Control Mechanisms

    Rules and policies that dictate how users or processes can access system resources based on their identity and permissions.

    Signup and view all the flashcards

    Access Control Model: Discretionary Access Control (DAC)

    A model where the resource owner specifies which subjects (users or processes) can access specific resources.

    Signup and view all the flashcards

    Access Control Model: Mandatory Access Control (MAC)

    A model where the system enforces access control based on predefined security policies and labels, limiting user discretion.

    Signup and view all the flashcards

    TCP/IP Model Layers

    The TCP/IP model organizes network communication into five layers: Application, Transport, Internet, Network Access, and Physical.

    Signup and view all the flashcards

    Diffie-Hellman Key Exchange

    A cryptographic method for securely exchanging keys over an insecure channel, using public and private keys.

    Signup and view all the flashcards

    False Nonmatch Rate

    The probability of a legitimate user being incorrectly rejected by a biometric system.

    Signup and view all the flashcards

    False Match Rate

    The probability of an unauthorized user being incorrectly accepted by a biometric system.

    Signup and view all the flashcards

    ABAC (Attribute-Based Access Control)

    A model where access rights are based on attributes of the user, the requested resource, and the current environment.

    Signup and view all the flashcards

    DAC (Discretionary Access Control)

    A model where users control access to resources that they own, setting permissions based on individual identity.

    Signup and view all the flashcards

    RBAC (Role-Based Access Control)

    A model where access rights are defined based on the user's role within an organization.

    Signup and view all the flashcards

    MAC (Mandatory Access Control)

    A model where access rights are based on security labels assigned to resources and users.

    Signup and view all the flashcards

    Linux File Permissions (drwxr-xr-x)

    The permission settings for a directory, representing owner (d), group (r), and others (x) rights: read, write, and execute.

    Signup and view all the flashcards

    umask (File Permission Mask)

    A Linux command used to set default file permissions for newly created files and directories.

    Signup and view all the flashcards

    TCP/IP model

    A set of rules that computers use to communicate on the internet.

    Signup and view all the flashcards

    TCP Three-Way Handshake

    A process of establishing a secure connection between a client and a server.

    Signup and view all the flashcards

    DHCP

    A protocol that allows devices to automatically get their IP address from a network.

    Signup and view all the flashcards

    UMASK

    A number used to control the default permissions for files and directories created.

    Signup and view all the flashcards

    Octal Permissions

    A way of representing file permissions in the form of three digits, each digit representing owner, group, and others.

    Signup and view all the flashcards

    Default Directory Permissions

    The permissions granted to new directories by default, often rwxrwxrwx.

    Signup and view all the flashcards

    Setting Directory Permissions

    The process of changing the permissions granted to a directory, usually by modifying the default.

    Signup and view all the flashcards

    Public-key cryptography

    Uses two separate keys: a public key for encryption and a private key for decryption. This makes it possible to securely communicate without sharing a secret key beforehand.

    Signup and view all the flashcards

    Public-key certificate

    Contains a public key and the owner's identity, digitally signed by a trusted third party (certificate authority). It proves the authenticity and validity of the public key.

    Signup and view all the flashcards

    Digital signature

    A cryptographic method used to verify the authenticity and integrity of a message. It uses the sender's private key to sign the message and the receiver's public key to verify it.

    Signup and view all the flashcards

    What is a certificate authority (CA)?

    A trusted third party that issues and manages digital certificates. It verifies the identity of individuals or organizations and serves as an intermediary to ensure trust in online transactions.

    Signup and view all the flashcards

    How does symmetric key cryptography differ from public-key cryptography?

    Symmetric key cryptography uses a single shared secret key for both encryption and decryption, while public-key cryptography uses a separate public key for encryption and a private key for decryption.

    Signup and view all the flashcards

    Why is public-key cryptography considered more secure than symmetric key cryptography for key distribution?

    Public-key cryptography allows secure key exchange without the need for pre-shared secrets, making it more secure for distributing keys over insecure channels. In contrast, symmetric key cryptography requires secure key distribution, which can be a challenge.

    Signup and view all the flashcards

    Study Notes

    INF 140 - Introduction to Cyber Security

    • Course is structured around quizzes and previous exams
    • Modules cover various cybersecurity aspects
    • Module 1: Overview of Cybersecurity, encompassing fundamental security design principles and attributes
    • Module 2: Cryptographic tools - focusing on symmetric primitives
    • Module 3: Cryptographic tools - focusing on public-key cryptography
    • Module 4: User authentication
    • Module 5: Access control and auditing
    • Module 6: Network protocols and attacks
    • Module 7: Firewalls
    • Module 8: Security protocol - application security and TLS
    • Module 9: Network authentication and WLAN security
    • Module 10: Intrusion Detection System (IDS)
    • Module 11: Malware

    Quiz 1 - Overview

    • Cybersecurity protects five key attributes of assets in cyberspace
    • Authenticity: refers to genuine or verifiable property
    • Security design principles: Open design, Principle of least privilege, Separation of privilege, etc
    • Layering: multiple, overlapping protection approaches across people, technology, and operational aspects of information systems
    • Adversary: Individual, group, organization, or government that conducts or intends detrimental actions against security attributes of assets
    • Sabotage: Techniques intended to limit or impair the operational effectiveness of adversarial or undesirable activity within a system
    • Weakness/vulnerability: refers to a weakness in an information system, procedures, internal controls, etc

    Quiz 2 - Symmetric Crypto

    • Key stream: 8-bit stream cipher string 01010011
    • Playfair Cipher: encryption matrix used to encrypt plaintext "SECURITY"

    Quiz 3 - Asymmetric Crypto

    • Public-Key Cryptography (PKC): More secure than symmetric cryptography, offers key sharing convenience, and non-repudiation
    • RSA: Integer factorization is a key element of security, public key e must be coprime to n.

    Quiz 4 - User Authentication

    • Multi-factor authentication: more secure than single-factor authentication
    • User authentication methods: What a user knows, is, has, does
    • Techniques involved in authentication: user ID, salt, hash(salt, password)

    Quiz 5- Access Control

    • Access control models: ABAC, DAC, and RBAC, use attributes of user, resources and conditions
    • Administrators need to define permissions, policies and security standards for each access control model

    Quiz 6 - Network Protocols and Attacks

    • TCP/IP layers
    • Network devices and protocols.
    • Attacks: DOS and DDoS, spoofing

    Quiz 7- Firewalls

    • Firewall rules to block traffic incoming or outgoing based on source IP, destination IP, destination port, etc

    Quiz 8 - Cryptographic Security and TLS

    • Protocol for secure communication over TCP
    • Handshake protocol, Change Cipher Spec Protocol, Alert Protocol
    • HTTPS operates on application layer, TLS/SSL operates in Transport Layer

    Quiz 9 - Network Authentication and WLAN Security

    • Protocol for authentication: Password-based, Challenge-Handshake (CHAP), Extensible Authentication Protocol (EAP)
    • AAA standards: RADIUS, Kerberos
    • Public key systems are common in secured access

    Quiz 10 - Intrusion Detection System (IDS)

    • Intrusion detection and prevention systems (IDS/IPS) detect unauthorized activity in the system
    • Intrusions might include: masquerader, misfeasor, clandestine user
    • Detection methods include: anomaly detection, and signature detection

    Quiz 11 - Malware

    • Malicious software (Malware) targeting Confidentiality, Integrity, and availability
    • Types of malware include: Adware, Attack Kits, Backdoors, Downloaders, Exploits, Flooders(DoS Client), Keyloggers, Macro Virus, Mobile Code, Rootkits, Spammers, Spyware, and Trojan Horses
    • Malware propagation techniques: Social Engineering

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on access control models, TCP/IP layers, public key generation, and encryption techniques in network security. This quiz covers essential concepts and technical details that are foundational to understanding secure communications.

    More Like This

    Use Quizgecko on...
    Browser
    Browser