Network Security Concepts Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which access control model enables the resource owner to specify access permissions for subjects?

  • Attribute-Based Access Control
  • Role-Based Access Control
  • Discretionary Access Control (correct)
  • Mandatory Access Control

What are the layers of the TCP/IP model from bottom to top?

  • Application, Transport, Internet, Network Interface (correct)
  • Link, Internet, Network, Application
  • Network, Transport, Link, Internet
  • Transport, Network, Application, Session

If the client's private key is Kc = 13 and the public parameter is p = 1013 with generator 2, what is the client's public key?

  • 409
  • 819
  • 154
  • 763 (correct)

What shared secret information is exchanged between the client and server if the server's private key is Ks = 11?

<p>765 (A)</p> Signup and view all the answers

What is the encryption key in hexadecimal form after applying MD5 to the shared secret information with ASCII encoding?

<p>9e107d9d372b4172326323027427d82 (C)</p> Signup and view all the answers

What does the Enigma machine allow for in its encryption process?

<p>Probabilistic encryption with identical keys (D)</p> Signup and view all the answers

In the context of the Advanced Encryption Standard (AES), which component is responsible for performing substitutions on the input data?

<p>SubBytes (C)</p> Signup and view all the answers

Which mode of operation does not allow for probabilistic encryption?

<p>Electronic Codebook (ECB) (D)</p> Signup and view all the answers

What is indicated by the term 'avalanche effect' in cryptography?

<p>Input changes result in radical output changes (A)</p> Signup and view all the answers

Which statement about MAC algorithms is incorrect?

<p>MAC algorithms are non-reversible. (D)</p> Signup and view all the answers

When utilizing block ciphers, what is a crucial step to maintain confidentiality?

<p>Employing the correct mode of operation (C)</p> Signup and view all the answers

What is the significance of the Rijndael S-box in the AES?

<p>It is responsible for byte substitutions. (D)</p> Signup and view all the answers

How does the Counter mode (CTR) function in terms of encryption?

<p>It employs a counter that varies with each block. (A)</p> Signup and view all the answers

Which access control model uses attributes of the user, resource, and environment to control access?

<p>Attribute-Based Access Control (ABAC) (B)</p> Signup and view all the answers

What does a low false nonmatch rate in biometric systems primarily ensure?

<p>Fewer legitimate users are incorrectly denied access (B)</p> Signup and view all the answers

Is multi-factor authentication generally more secure than single-factor authentication?

<p>Yes, it offers additional layers of protection. (C)</p> Signup and view all the answers

Which statement regarding file permissions is incorrect based on the output of 'ls -l /sbin'?

<p>Normal users can run the command: cd /sbin (A)</p> Signup and view all the answers

Which authentication factor is demonstrated when Martin uses his employee card?

<p>What a user has (C)</p> Signup and view all the answers

What is the consequence of restricting user passwords to a length of only 8 digits as done by Olav?

<p>It makes passwords easier to brute-force. (B)</p> Signup and view all the answers

Which access control model is most appropriate for granting user access based on job functions?

<p>Role-Based Access Control (RBAC) (B)</p> Signup and view all the answers

What character set was used in the password entry generated by Windows LAN Manager?

<p>Lower-case and upper-case English letters only (B)</p> Signup and view all the answers

What is the numerical representation of the permission drwxr-xr-x for a directory?

<p>755 (D)</p> Signup and view all the answers

What role does salt play in common password storage techniques?

<p>It complicates brute-force attacks. (D)</p> Signup and view all the answers

What type of entity is described as capable of accessing a resource in an access control system?

<p>Subject (C)</p> Signup and view all the answers

What is the default umask value for newly created directories in Linux systems?

<p>022 (D)</p> Signup and view all the answers

How does salted hashing contribute to the security of stored passwords?

<p>By increasing the difficulty of dictionary attacks. (B)</p> Signup and view all the answers

What does the term 'false acceptance rate' refer to in biometric authentication?

<p>The likelihood of unauthorized users being granted access. (B)</p> Signup and view all the answers

Which access control model compares security labels to determine access rights?

<p>Mandatory Access Control (MAC) (C)</p> Signup and view all the answers

Which of the following best describes the common practice of hashing passwords with a salt?

<p>It combines the user's password and salt before hashing. (D)</p> Signup and view all the answers

What significantly distinguishes public-key cryptography from symmetric encryption?

<p>Public-key cryptography employs two separate keys for encryption and decryption. (C)</p> Signup and view all the answers

What does a public key certificate primarily consist of?

<p>A public key, a user ID, and a signature by a trusted party. (A)</p> Signup and view all the answers

Who were the developers behind the RSA public-key scheme?

<p>Ron Rivest, Adi Shamir, and Len Adleman (D)</p> Signup and view all the answers

What is the primary purpose of the Diffie-Hellman key exchange algorithm?

<p>To enable two users to securely exchange a shared secret key. (D)</p> Signup and view all the answers

What is the limitation of the Diffie-Hellman scheme regarding the messages exchanged?

<p>It allows interception without revealing the private keys. (A)</p> Signup and view all the answers

What is the main goal of digital signatures in public-key cryptography?

<p>To prove the origin or approval of a message from a specific user. (C)</p> Signup and view all the answers

Which of the following best describes the RSA algorithm's method of operation?

<p>It operates with plaintext and ciphertext as integers within a specified range. (A)</p> Signup and view all the answers

In symmetric key cryptography, which statement is true?

<p>A shared secret key is used for encryption and decryption between two users. (B)</p> Signup and view all the answers

What umask value should be set to achieve the desired directory permissions of rwxrwxr--?

<p>002 (B)</p> Signup and view all the answers

What is the first step in establishing a TCP connection using the TCP three-way handshake?

<p>The Client sends a SYN packet to the Server. (D)</p> Signup and view all the answers

What does the Server send back after it receives the SYN packet from the Client?

<p>A SYN-ACK packet. (C)</p> Signup and view all the answers

Which umask would result in directory permissions of 755?

<p>122 (B)</p> Signup and view all the answers

What primary function does DHCP serve in computer networking?

<p>Dynamically assigns IP addresses to devices. (B)</p> Signup and view all the answers

Which umask would result in 774 directory permissions?

<p>003 (B)</p> Signup and view all the answers

In the context of TCP connection establishment, what does the acronym 'SYN' stand for?

<p>Synchronization. (D)</p> Signup and view all the answers

What is the final step in the TCP three-way handshake after the Client receives the SYN-ACK?

<p>The Client sends an ACK packet. (A)</p> Signup and view all the answers

Flashcards

Enigma Machine

A cipher device used in the 20th century for secret communication.

Probabilistic Encryption

Same inputs lead to different outputs in encryption.

AES (Advanced Encryption Standard)

A symmetric encryption algorithm, iterates on operations (SubBytes etc.).

SubBytes

Substitution cipher component of AES, uses a look-up table (S-box).

Signup and view all the flashcards

Rijndael S-box

8x8 substitution table (S-box) used in AES.

Signup and view all the flashcards

Block Cipher Modes of Operation

Methods for processing data blocks in block ciphers.

Signup and view all the flashcards

Cipher Block Chaining (CBC)

A block cipher mode where each block influences the next.

Signup and view all the flashcards

Electronic Codebook (ECB)

A block cipher mode that encrypts each block independently; Not Probabilistic

Signup and view all the flashcards

Multi-factor authentication (MFA)

A security method that requires multiple authentication factors from the user (something the user knows, has, or is) to gain access.

Signup and view all the flashcards

User Authentication Factors

Methods used to verify a user's identity, such as something the user knows (password), has (ID card), or physically is (biometrics).

Signup and view all the flashcards

Salted Hashing

A password storage technique that adds a random value (salt) to the password before hashing. This makes brute-force and dictionary attacks more difficult.

Signup and view all the flashcards

Hashcat

A tool used to crack passwords by trying different combinations.

Signup and view all the flashcards

Password Storage

The method of saving passwords in a secure way to prevent unauthorized access.

Signup and view all the flashcards

MD5

A hashing algorithm.

Signup and view all the flashcards

Biometric Authentication False Match

When a biometric system incorrectly identifies a different person's sample as the same person during verification.

Signup and view all the flashcards

Single-factor authentication

User authentication relying on only one factor, such as a password.

Signup and view all the flashcards

Access Control Mechanisms

Rules and policies that dictate how users or processes can access system resources based on their identity and permissions.

Signup and view all the flashcards

Access Control Model: Discretionary Access Control (DAC)

A model where the resource owner specifies which subjects (users or processes) can access specific resources.

Signup and view all the flashcards

Access Control Model: Mandatory Access Control (MAC)

A model where the system enforces access control based on predefined security policies and labels, limiting user discretion.

Signup and view all the flashcards

TCP/IP Model Layers

The TCP/IP model organizes network communication into five layers: Application, Transport, Internet, Network Access, and Physical.

Signup and view all the flashcards

Diffie-Hellman Key Exchange

A cryptographic method for securely exchanging keys over an insecure channel, using public and private keys.

Signup and view all the flashcards

False Nonmatch Rate

The probability of a legitimate user being incorrectly rejected by a biometric system.

Signup and view all the flashcards

False Match Rate

The probability of an unauthorized user being incorrectly accepted by a biometric system.

Signup and view all the flashcards

ABAC (Attribute-Based Access Control)

A model where access rights are based on attributes of the user, the requested resource, and the current environment.

Signup and view all the flashcards

DAC (Discretionary Access Control)

A model where users control access to resources that they own, setting permissions based on individual identity.

Signup and view all the flashcards

RBAC (Role-Based Access Control)

A model where access rights are defined based on the user's role within an organization.

Signup and view all the flashcards

MAC (Mandatory Access Control)

A model where access rights are based on security labels assigned to resources and users.

Signup and view all the flashcards

Linux File Permissions (drwxr-xr-x)

The permission settings for a directory, representing owner (d), group (r), and others (x) rights: read, write, and execute.

Signup and view all the flashcards

umask (File Permission Mask)

A Linux command used to set default file permissions for newly created files and directories.

Signup and view all the flashcards

TCP/IP model

A set of rules that computers use to communicate on the internet.

Signup and view all the flashcards

TCP Three-Way Handshake

A process of establishing a secure connection between a client and a server.

Signup and view all the flashcards

DHCP

A protocol that allows devices to automatically get their IP address from a network.

Signup and view all the flashcards

UMASK

A number used to control the default permissions for files and directories created.

Signup and view all the flashcards

Octal Permissions

A way of representing file permissions in the form of three digits, each digit representing owner, group, and others.

Signup and view all the flashcards

Default Directory Permissions

The permissions granted to new directories by default, often rwxrwxrwx.

Signup and view all the flashcards

Setting Directory Permissions

The process of changing the permissions granted to a directory, usually by modifying the default.

Signup and view all the flashcards

Public-key cryptography

Uses two separate keys: a public key for encryption and a private key for decryption. This makes it possible to securely communicate without sharing a secret key beforehand.

Signup and view all the flashcards

Public-key certificate

Contains a public key and the owner's identity, digitally signed by a trusted third party (certificate authority). It proves the authenticity and validity of the public key.

Signup and view all the flashcards

Digital signature

A cryptographic method used to verify the authenticity and integrity of a message. It uses the sender's private key to sign the message and the receiver's public key to verify it.

Signup and view all the flashcards

What is a certificate authority (CA)?

A trusted third party that issues and manages digital certificates. It verifies the identity of individuals or organizations and serves as an intermediary to ensure trust in online transactions.

Signup and view all the flashcards

How does symmetric key cryptography differ from public-key cryptography?

Symmetric key cryptography uses a single shared secret key for both encryption and decryption, while public-key cryptography uses a separate public key for encryption and a private key for decryption.

Signup and view all the flashcards

Why is public-key cryptography considered more secure than symmetric key cryptography for key distribution?

Public-key cryptography allows secure key exchange without the need for pre-shared secrets, making it more secure for distributing keys over insecure channels. In contrast, symmetric key cryptography requires secure key distribution, which can be a challenge.

Signup and view all the flashcards

Study Notes

INF 140 - Introduction to Cyber Security

  • Course is structured around quizzes and previous exams
  • Modules cover various cybersecurity aspects
  • Module 1: Overview of Cybersecurity, encompassing fundamental security design principles and attributes
  • Module 2: Cryptographic tools - focusing on symmetric primitives
  • Module 3: Cryptographic tools - focusing on public-key cryptography
  • Module 4: User authentication
  • Module 5: Access control and auditing
  • Module 6: Network protocols and attacks
  • Module 7: Firewalls
  • Module 8: Security protocol - application security and TLS
  • Module 9: Network authentication and WLAN security
  • Module 10: Intrusion Detection System (IDS)
  • Module 11: Malware

Quiz 1 - Overview

  • Cybersecurity protects five key attributes of assets in cyberspace
  • Authenticity: refers to genuine or verifiable property
  • Security design principles: Open design, Principle of least privilege, Separation of privilege, etc
  • Layering: multiple, overlapping protection approaches across people, technology, and operational aspects of information systems
  • Adversary: Individual, group, organization, or government that conducts or intends detrimental actions against security attributes of assets
  • Sabotage: Techniques intended to limit or impair the operational effectiveness of adversarial or undesirable activity within a system
  • Weakness/vulnerability: refers to a weakness in an information system, procedures, internal controls, etc

Quiz 2 - Symmetric Crypto

  • Key stream: 8-bit stream cipher string 01010011
  • Playfair Cipher: encryption matrix used to encrypt plaintext "SECURITY"

Quiz 3 - Asymmetric Crypto

  • Public-Key Cryptography (PKC): More secure than symmetric cryptography, offers key sharing convenience, and non-repudiation
  • RSA: Integer factorization is a key element of security, public key e must be coprime to n.

Quiz 4 - User Authentication

  • Multi-factor authentication: more secure than single-factor authentication
  • User authentication methods: What a user knows, is, has, does
  • Techniques involved in authentication: user ID, salt, hash(salt, password)

Quiz 5- Access Control

  • Access control models: ABAC, DAC, and RBAC, use attributes of user, resources and conditions
  • Administrators need to define permissions, policies and security standards for each access control model

Quiz 6 - Network Protocols and Attacks

  • TCP/IP layers
  • Network devices and protocols.
  • Attacks: DOS and DDoS, spoofing

Quiz 7- Firewalls

  • Firewall rules to block traffic incoming or outgoing based on source IP, destination IP, destination port, etc

Quiz 8 - Cryptographic Security and TLS

  • Protocol for secure communication over TCP
  • Handshake protocol, Change Cipher Spec Protocol, Alert Protocol
  • HTTPS operates on application layer, TLS/SSL operates in Transport Layer

Quiz 9 - Network Authentication and WLAN Security

  • Protocol for authentication: Password-based, Challenge-Handshake (CHAP), Extensible Authentication Protocol (EAP)
  • AAA standards: RADIUS, Kerberos
  • Public key systems are common in secured access

Quiz 10 - Intrusion Detection System (IDS)

  • Intrusion detection and prevention systems (IDS/IPS) detect unauthorized activity in the system
  • Intrusions might include: masquerader, misfeasor, clandestine user
  • Detection methods include: anomaly detection, and signature detection

Quiz 11 - Malware

  • Malicious software (Malware) targeting Confidentiality, Integrity, and availability
  • Types of malware include: Adware, Attack Kits, Backdoors, Downloaders, Exploits, Flooders(DoS Client), Keyloggers, Macro Virus, Mobile Code, Rootkits, Spammers, Spyware, and Trojan Horses
  • Malware propagation techniques: Social Engineering

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Access Control Models
19 questions

Access Control Models

LucrativeMagenta avatar
LucrativeMagenta
Multilevel Access Control Models Quiz
3 questions
Access Control Models and ABAC Overview
40 questions
Use Quizgecko on...
Browser
Browser