0

Network Security (GATE)

Description: Network security authentication basics of public key and private key cryptography digital signatures digital certificates firewalls
Number of Questions: 15
Created by:
Tags: Network security authentication basics of public key and private key cryptography digital signatures digital certificates firewalls Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which type of security devices block the surplus traffic?

  1. Active devices

  2. Preventive devices

  3. Unified Threat Management (UTM) devices

  4. Passive devices

  5. Network devices


Correct Option: A
Explanation:

Active devices are the type of security devices that block the surplus traffic.

A type of authentication in which a user has a secret password and system checks password to authenticate the user is called

  1. address-based authentication

  2. crypto-based authentication

  3. identity

  4. password-based authentication

  5. biometrics


Correct Option: D
Explanation:

Password-based authentication is an authentication in which a user has a secret password and system checks password to authenticate the user.

Which of the following is an example of Unified Threat Management (UTM) security devices?

  1. Antivirus scanning device

  2. Vulnerability assessment appliance

  3. Intrusion detection appliance

  4. Web caching

  5. Penetration testing device


Correct Option: D
Explanation:

Web caching is an example of Unified Threat Management (UTM) security devices.

Which of the following hash algorithms is much less processor-intensive and the message digest is much shorter than the message?

  1. Password Hashing

  2. Digital Signature Hashing

  3. Downline Load Hashing

  4. Message Fingerprint Hashing

  5. Message Integrity Hashing


Correct Option: B
Explanation:

Digital Signature Efficiency is a public key algorithm that is sufficiently processor-intensive and is desirable to compute a message digest of the message and sign that, rather than to sign the message directly. 

Which of the following is a method of encryption by which units of plain text are substituted with cipher text according to a regular system?

  1. Substitution cipher technique

  2. Transposition cipher technique

  3. Block cipher technique

  4. Stream cipher technique

  5. Cipher text


Correct Option: A
Explanation:

Substitution cipher is a method of encryption by which units of plain text are substituted with cipher text according to a regular system.

Which of the following authentication tools consists of a question-answer dialog where the user responds to a set of pre-recorded questions or a token device that generates passwords or responses based on a pre-determined algorithm?

  1. Biometric authentication

  2. Out-of-band authentication

  3. Hardware tokens

  4. Challenge response

  5. Software tokens


Correct Option: D
Explanation:

Challenge response activity consists of a question-answer dialog where the user responds to a set of pre-recorded questions, such as the mother's maiden name or a token device that generates passwords or responses based on a pre-determined algorithm.

Which of the following algorithms is a symmetric-key cryptography algorithm?

  1. ElGamal cryptographic algorithm

  2. RSA algorithm

  3. IDEA algorithm

  4. Elliptic curve discrete logarithm

  5. Diffie-Hellman algorithm


Correct Option: C
Explanation:

IDEA (International Data Encryption Algorithm) is a symmetric-key cryptography algorithm. IDEA operates on 64-bit blocks using a 128-bit key and consists of a series of eight identical transformations and an output transformation (the half-round).

A firewall technology which is a hybrid combination of a dynamic (stateful) packet filter and a circuit level proxy is called

  1. cutoff proxy

  2. dynamic packet filter

  3. circuit level gateway

  4. stateful inspection

  5. air gap


Correct Option: A
Explanation:

The cutoff proxy is a hybrid combination of a dynamic (stateful) packet filter and a circuit level proxy.

Which of the following is not a disadvantage of static packet filter?

  1. Static packet filter only examines IP and TCP headers.

  2. Static packet filter offers low level of security.

  3. Static packet filter lacks state awareness.

  4. Static packet filter can be established without following the RFC-recommended 3 way-handshake.

  5. Static packet filter is susceptible to IP spoofing.


Correct Option: D
Explanation:

It is a disadvantage of dynamic (state aware) packet filter.

Which of the following statements is incorrect about elliptic curve cryptography algorithm?

  1. Elliptic curve cryptography algorithm is a public key algorithm.

  2. Key sizes in an elliptic curve cryptography algorithm are in the order of 1024 bits.

  3. Elliptic curve cryptography works with points on a curve.

  4. In elliptic curve cryptography algorithm, elliptic curve is designed by the equation y2 = x3 + ax + b.

  5. For generating an elliptic curve public key, algorithm picks a certain point F on the curve and calculates Ap = As*F. Here, Ap is a public key and As is a secret key.


Correct Option: B
Explanation:

Key sizes in an elliptic curve cryptography algorithm are in the order of 160 bits. 

Which of the following is an advantage of air-gap firewall technology?

  1. Low cost

  2. No unexpected traffic via other sockets

  3. State awareness

  4. Provides services for a wide range of protocols

  5. Highest level of security


Correct Option: B
Explanation:

Air-gap firewall technology has no unexpected traffic via other sockets since it creates an isolated path for moving files between an external server and a company's internal network and systems.

Which of the following is an incorrect statement about a digital certificate?

  1. Digital certificate or digital id is a kind of digital passport or credential.

  2. Digital id is the user's public key that has itself been digitally signed by someone trusted to do so.

  3. Organisations using digital certificates do not require a relationship with the remote site.

  4. Digital certificate is used to verify the trustworthiness of information.

  5. Digital certificate is used to confirm that a public key belongs to a specific organisation.


Correct Option: D
Explanation:

A digital certificate is used to verify the trustworthiness of a website and a digital signature is used to verify the trustworthiness of information.

Which matured tunneling technology allows IP payloads to be encrypted and then encapsulated in an IP header to be sent across a corporate IP inter-network or a public IP inter-network, such as the internet?

  1. IPX Tunneling

  2. IP Security (IPSec) Tunnel Mode

  3. System Network Architecture (SNA) Tunneling

  4. Point-to-Point Tunneling Protocol (PPTP)

  5. Layer 2 Tunneling Protocol (L2TP)


Correct Option: B
Explanation:

IPSec tunnel mode allows IP payloads to be encrypted and then, encapsulated in an IP header to be sent across a corporate IP inter-network or a public IP inter-network, such as the internet.

Which of the following is an incorrect statement about Kerberos protocol?

  1. Kerberos protocol is a network authentication protocol.

  2. Kerberos protocol is a secure protocol.

  3. Kerberos does not perform mutual authentication.

  4. Kerberos protocol requires only a single login per session.

  5. Kerberos depends on a trusted third party – a Key Distribution Centre (KDC).


Correct Option: C
Explanation:

Kerberos performs mutual authentication.

Which of the following statements is incorrect about Rijndael security algorithm?

  1. Rijndael security algorithm is a type of DES security algorithm.

  2. Rijndael security algorithm allows only 128, 192 and 256-bit key sizes.

  3. Rijndael security algorithm consists of an initial round key addition, Nr-1 rounds and a final round, where Nr is the number of rounds.

  4. Rijndael security algorithm is designed by Joan Daemen and Vincent Rijmen.

  5. Rijndael is well-suited for software implementations on 8-bit processors.


Correct Option: A
Explanation:

Rijndael security algorithm is a type of AES security algorithm and not a DES security algorithm.

- Hide questions