Network Security Concepts Quiz
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which access control model enables the resource owner to specify access permissions for subjects?

  • Attribute-Based Access Control
  • Role-Based Access Control
  • Discretionary Access Control (correct)
  • Mandatory Access Control
  • What are the layers of the TCP/IP model from bottom to top?

  • Application, Transport, Internet, Network Interface (correct)
  • Link, Internet, Network, Application
  • Network, Transport, Link, Internet
  • Transport, Network, Application, Session
  • If the client's private key is Kc = 13 and the public parameter is p = 1013 with generator 2, what is the client's public key?

  • 409
  • 819
  • 154
  • 763 (correct)
  • What shared secret information is exchanged between the client and server if the server's private key is Ks = 11?

    <p>765</p> Signup and view all the answers

    What is the encryption key in hexadecimal form after applying MD5 to the shared secret information with ASCII encoding?

    <p>9e107d9d372b4172326323027427d82</p> Signup and view all the answers

    What does the Enigma machine allow for in its encryption process?

    <p>Probabilistic encryption with identical keys</p> Signup and view all the answers

    In the context of the Advanced Encryption Standard (AES), which component is responsible for performing substitutions on the input data?

    <p>SubBytes</p> Signup and view all the answers

    Which mode of operation does not allow for probabilistic encryption?

    <p>Electronic Codebook (ECB)</p> Signup and view all the answers

    What is indicated by the term 'avalanche effect' in cryptography?

    <p>Input changes result in radical output changes</p> Signup and view all the answers

    Which statement about MAC algorithms is incorrect?

    <p>MAC algorithms are non-reversible.</p> Signup and view all the answers

    When utilizing block ciphers, what is a crucial step to maintain confidentiality?

    <p>Employing the correct mode of operation</p> Signup and view all the answers

    What is the significance of the Rijndael S-box in the AES?

    <p>It is responsible for byte substitutions.</p> Signup and view all the answers

    How does the Counter mode (CTR) function in terms of encryption?

    <p>It employs a counter that varies with each block.</p> Signup and view all the answers

    Which access control model uses attributes of the user, resource, and environment to control access?

    <p>Attribute-Based Access Control (ABAC)</p> Signup and view all the answers

    What does a low false nonmatch rate in biometric systems primarily ensure?

    <p>Fewer legitimate users are incorrectly denied access</p> Signup and view all the answers

    Is multi-factor authentication generally more secure than single-factor authentication?

    <p>Yes, it offers additional layers of protection.</p> Signup and view all the answers

    Which statement regarding file permissions is incorrect based on the output of 'ls -l /sbin'?

    <p>Normal users can run the command: cd /sbin</p> Signup and view all the answers

    Which authentication factor is demonstrated when Martin uses his employee card?

    <p>What a user has</p> Signup and view all the answers

    What is the consequence of restricting user passwords to a length of only 8 digits as done by Olav?

    <p>It makes passwords easier to brute-force.</p> Signup and view all the answers

    Which access control model is most appropriate for granting user access based on job functions?

    <p>Role-Based Access Control (RBAC)</p> Signup and view all the answers

    What character set was used in the password entry generated by Windows LAN Manager?

    <p>Lower-case and upper-case English letters only</p> Signup and view all the answers

    What is the numerical representation of the permission drwxr-xr-x for a directory?

    <p>755</p> Signup and view all the answers

    What role does salt play in common password storage techniques?

    <p>It complicates brute-force attacks.</p> Signup and view all the answers

    What type of entity is described as capable of accessing a resource in an access control system?

    <p>Subject</p> Signup and view all the answers

    What is the default umask value for newly created directories in Linux systems?

    <p>022</p> Signup and view all the answers

    How does salted hashing contribute to the security of stored passwords?

    <p>By increasing the difficulty of dictionary attacks.</p> Signup and view all the answers

    What does the term 'false acceptance rate' refer to in biometric authentication?

    <p>The likelihood of unauthorized users being granted access.</p> Signup and view all the answers

    Which access control model compares security labels to determine access rights?

    <p>Mandatory Access Control (MAC)</p> Signup and view all the answers

    Which of the following best describes the common practice of hashing passwords with a salt?

    <p>It combines the user's password and salt before hashing.</p> Signup and view all the answers

    What significantly distinguishes public-key cryptography from symmetric encryption?

    <p>Public-key cryptography employs two separate keys for encryption and decryption.</p> Signup and view all the answers

    What does a public key certificate primarily consist of?

    <p>A public key, a user ID, and a signature by a trusted party.</p> Signup and view all the answers

    Who were the developers behind the RSA public-key scheme?

    <p>Ron Rivest, Adi Shamir, and Len Adleman</p> Signup and view all the answers

    What is the primary purpose of the Diffie-Hellman key exchange algorithm?

    <p>To enable two users to securely exchange a shared secret key.</p> Signup and view all the answers

    What is the limitation of the Diffie-Hellman scheme regarding the messages exchanged?

    <p>It allows interception without revealing the private keys.</p> Signup and view all the answers

    What is the main goal of digital signatures in public-key cryptography?

    <p>To prove the origin or approval of a message from a specific user.</p> Signup and view all the answers

    Which of the following best describes the RSA algorithm's method of operation?

    <p>It operates with plaintext and ciphertext as integers within a specified range.</p> Signup and view all the answers

    In symmetric key cryptography, which statement is true?

    <p>A shared secret key is used for encryption and decryption between two users.</p> Signup and view all the answers

    What umask value should be set to achieve the desired directory permissions of rwxrwxr--?

    <p>002</p> Signup and view all the answers

    What is the first step in establishing a TCP connection using the TCP three-way handshake?

    <p>The Client sends a SYN packet to the Server.</p> Signup and view all the answers

    What does the Server send back after it receives the SYN packet from the Client?

    <p>A SYN-ACK packet.</p> Signup and view all the answers

    Which umask would result in directory permissions of 755?

    <p>122</p> Signup and view all the answers

    What primary function does DHCP serve in computer networking?

    <p>Dynamically assigns IP addresses to devices.</p> Signup and view all the answers

    Which umask would result in 774 directory permissions?

    <p>003</p> Signup and view all the answers

    In the context of TCP connection establishment, what does the acronym 'SYN' stand for?

    <p>Synchronization.</p> Signup and view all the answers

    What is the final step in the TCP three-way handshake after the Client receives the SYN-ACK?

    <p>The Client sends an ACK packet.</p> Signup and view all the answers

    Study Notes

    INF 140 - Introduction to Cyber Security

    • Course is structured around quizzes and previous exams
    • Modules cover various cybersecurity aspects
    • Module 1: Overview of Cybersecurity, encompassing fundamental security design principles and attributes
    • Module 2: Cryptographic tools - focusing on symmetric primitives
    • Module 3: Cryptographic tools - focusing on public-key cryptography
    • Module 4: User authentication
    • Module 5: Access control and auditing
    • Module 6: Network protocols and attacks
    • Module 7: Firewalls
    • Module 8: Security protocol - application security and TLS
    • Module 9: Network authentication and WLAN security
    • Module 10: Intrusion Detection System (IDS)
    • Module 11: Malware

    Quiz 1 - Overview

    • Cybersecurity protects five key attributes of assets in cyberspace
    • Authenticity: refers to genuine or verifiable property
    • Security design principles: Open design, Principle of least privilege, Separation of privilege, etc
    • Layering: multiple, overlapping protection approaches across people, technology, and operational aspects of information systems
    • Adversary: Individual, group, organization, or government that conducts or intends detrimental actions against security attributes of assets
    • Sabotage: Techniques intended to limit or impair the operational effectiveness of adversarial or undesirable activity within a system
    • Weakness/vulnerability: refers to a weakness in an information system, procedures, internal controls, etc

    Quiz 2 - Symmetric Crypto

    • Key stream: 8-bit stream cipher string 01010011
    • Playfair Cipher: encryption matrix used to encrypt plaintext "SECURITY"

    Quiz 3 - Asymmetric Crypto

    • Public-Key Cryptography (PKC): More secure than symmetric cryptography, offers key sharing convenience, and non-repudiation
    • RSA: Integer factorization is a key element of security, public key e must be coprime to n.

    Quiz 4 - User Authentication

    • Multi-factor authentication: more secure than single-factor authentication
    • User authentication methods: What a user knows, is, has, does
    • Techniques involved in authentication: user ID, salt, hash(salt, password)

    Quiz 5- Access Control

    • Access control models: ABAC, DAC, and RBAC, use attributes of user, resources and conditions
    • Administrators need to define permissions, policies and security standards for each access control model

    Quiz 6 - Network Protocols and Attacks

    • TCP/IP layers
    • Network devices and protocols.
    • Attacks: DOS and DDoS, spoofing

    Quiz 7- Firewalls

    • Firewall rules to block traffic incoming or outgoing based on source IP, destination IP, destination port, etc

    Quiz 8 - Cryptographic Security and TLS

    • Protocol for secure communication over TCP
    • Handshake protocol, Change Cipher Spec Protocol, Alert Protocol
    • HTTPS operates on application layer, TLS/SSL operates in Transport Layer

    Quiz 9 - Network Authentication and WLAN Security

    • Protocol for authentication: Password-based, Challenge-Handshake (CHAP), Extensible Authentication Protocol (EAP)
    • AAA standards: RADIUS, Kerberos
    • Public key systems are common in secured access

    Quiz 10 - Intrusion Detection System (IDS)

    • Intrusion detection and prevention systems (IDS/IPS) detect unauthorized activity in the system
    • Intrusions might include: masquerader, misfeasor, clandestine user
    • Detection methods include: anomaly detection, and signature detection

    Quiz 11 - Malware

    • Malicious software (Malware) targeting Confidentiality, Integrity, and availability
    • Types of malware include: Adware, Attack Kits, Backdoors, Downloaders, Exploits, Flooders(DoS Client), Keyloggers, Macro Virus, Mobile Code, Rootkits, Spammers, Spyware, and Trojan Horses
    • Malware propagation techniques: Social Engineering

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on access control models, TCP/IP layers, public key generation, and encryption techniques in network security. This quiz covers essential concepts and technical details that are foundational to understanding secure communications.

    More Like This

    Access Control Models
    19 questions

    Access Control Models

    LucrativeMagenta avatar
    LucrativeMagenta
    Multilevel Access Control Models Quiz
    3 questions
    Access Control Models and ABAC Overview
    40 questions
    Use Quizgecko on...
    Browser
    Browser