0

System and Network Security

Description: Securing Web Application Network Security and FirewallNetwork Security and FirewallNetwork Security and Firewall
Number of Questions: 15
Created by:
Tags: Securing Web Application Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following is excellent for exchanging keys and associating an identity with a public encryption key?

  1. Certificate scheme

  2. Interception

  3. Pretty good privacy

  4. DEK-info

  5. Message integrity check


Correct Option: A
Explanation:

It is excellent for exchanging keys and for associating an identity with a public encryption key.

Which of the following provides all alerts as defined by alert protocol of SSL except for no certificate, and also has some new alerts?

  1. Secure electronic transaction

  2. Transport layer security

  3. Interception

  4. Realism

  5. Record protocol


Correct Option: B
Explanation:

It provides all alerts as defined by alerts protocol of SSL except for no certificate and it also has some new alerts.

Under which of the following characteristics should a security policy grow and adapt well?

  1. Durability

  2. Realism

  3. Complete

  4. Correct

  5. Understandable


Correct Option: A
Explanation:

Here, a security policy must grow and adapt well.

Which of the following protocols is used by SSL for reporting errors and abnormal conditions?

  1. Record protocol

  2. Change cipherspec protocol

  3. Alert protocol

  4. Interception

  5. Continuing attentions


Correct Option: C
Explanation:

SSL uses the alert protocol for reporting errors and abnormal conditions.

Which of the following uses hierarchically validated certificates, usually represented in X.509 format for key exchange?

  1. Digital signature

  2. DEK-info

  3. Record protocol

  4. Secure multipurpose internet mail extension

  5. Key-info


Correct Option: D
Explanation:

It uses hierarchically validated certificates, usually represented in X.509 format for key exchange.

Which of the following fields contains the message encryption key, encrypted under shared encryption key?

  1. DEK-info

  2. Key-info

  3. Digital signature

  4. Certificate scheme

  5. Interception


Correct Option: B
Explanation:

It contains the message encryption key, encrypted under this shared encryption key.

In which of the following characteristics of security policy should the policy either apply to or explicitly exclude all possible situations?

  1. Coverage

  2. Realism

  3. Understandable

  4. Complete

  5. Correct


Correct Option: A
Explanation:

Here, it must either apply to or explicitly exclude all possible situations.

Which of the following firewalls follows the sequence of packets and their conditions from one to another to foil such an attack?

  1. Packet filtering gateway

  2. Personal firewall

  3. Stateful inspection firewall

  4. Certificate scheme

  5. Risk analysis


Correct Option: C
Explanation:

It follows the sequence of packets and their conditions from one to another to foil such an attack.

Which of the following security design issues act(s) mapping control(s) to the vulnerabilities identified in the policy and requirements?

  1. Requirements

  2. Timetable

  3. Risk analysis

  4. Recommended controls

  5. Realism


Correct Option: D
Explanation:

These are mapping controls to the vulnerabilities identified in the policy and requirements.

Which of the following fields tells what privacy enhancement services have been applied?

  1. Digital signature

  2. Certificate scheme

  3. DEK-info

  4. Sender authenticity

  5. Proc-type


Correct Option: E
Explanation:

This field tells what privacy enhancement services have been applied.

Which of the following is a firewall that simulates the proper effects of an application so that the application receives only requests to act properly?

  1. Packet filtering gateway

  2. Statefull inspection firewall

  3. Bastion host

  4. Interception

  5. DEK-info


Correct Option: C
Explanation:

It is a firewall that simulates the proper effects of an application so that the application will receive only requests to act properly.

In which of the following characteristics of security policy should the policy be succinct, clear and direct?

  1. Realism

  2. Complete

  3. Efficient

  4. Usefulness

  5. Requirement


Correct Option: D
Explanation:

Here, the security policy should be succient, clear and direct.

Which of the following is an open encryption and security specification designed to protect credit card transactions on the internet?

  1. Message authentication code

  2. Record protocol

  3. Secure electronic transaction

  4. Certificate scheme

  5. DEK-info


Correct Option: A
Explanation:

It is a message digest of the message itself plus material derived from the master key.

Which of the following firewalls receives protocol data units, interprets them and passes through the same or different protocol data units that achieves either the same result or a modified result?

  1. Gaurd

  2. Personal firewall

  3. Packet filtering gateway

  4. Digital signature

  5. Message confidentiality


Correct Option: A
Explanation:

It receives protocol data units, interprets them, and passes through the same or different protocol data units that achieve either the same result or a modified result.

Which of the following security design issues describes the status of security at the time of the plan?

  1. Timetable

  2. Current state

  3. Requirements

  4. Risk analysis

  5. Realism


Correct Option: B
Explanation:

It is describing the status of security at the time of the plan.

- Hide questions