Transmission control protocol


Question1. Administrators currently use telnet to remotely manage several servers. Security policy dictates that passwords and administrative activities must not be communicated in clear text. Which of the following is the best alternative to using telnet?

A. DES (Data Encryption Standard)
B. PKI (Public Key Infrastructure)
C. SSH (Secure Shell)
D. S-Telnet
 
Question2. The goal of TCP (Transmission Control Protocol) hijacking is:

A. identifying the TCP (Transmission Control Protocol) port for future exploitation
B. identifying source addresses for malicious use
C. taking over a legitimate TCP (Transmission Control Protocol) connection
D. predicting the TCP (Transmission Control Protocol) sequence number
 
Question3. In order for User A to send User B an e-mail message that only User B can read, User A must encrypt the e-mail with which of the following keys?

A. User A's private key
B. User B's private key
C. User A's public key
D. User B's public key

Question4. A block cipher is an example of which of the following encryption algorithms?

A. symmetric key
B. public key
C. asymmetric key
D. unkeyed

Question5. A need to know security policy would grant access based on:

A. loss of privilege
B. less privilege
C. least privilege
D. single privilege
 
Question6. What is the major reason that social engineering attacks succeed?

A. multiple logins are allowed
B. lack of security awareness
C. strong passwords are not required
D. audit logs are not monitored frequently
 
Question7. One purpose of a proxy server is to:

A. translate IP (Internet Protocol) addresses into user friendly names
B. hide the public network from internal hosts
C. use one public IP (Internet Protocol) address on the internal network as a name server
D. hide internal hosts from the public network

Question8. What is the name of an encryption system which uses the same key to encrypt and decrypt a message?

A. Diffie-Hellman
B. IDEA
C. SHA
D. MD5
 
Question9. The originator of a message derives a hash and encrypts it with its private key. The encrypted hash is attached to the message and forwarded to the remote end. At the remote end, the encrypted hash is decrypted using the originator's public key. If the decrypted hash matches the re-computed hash, the message is genuine. What is being described?

A. The use of a digital signature for origin authentication
B. The incorrect use of a hash
C. Use of digital signature for data encryption
D. Public key encryption for enhanced secrecy of data
 
Question10. Which access control security model supports the following statement?  “If user A has a lower security level than the clearance level of the object, the user has no access to the object.”

A. Discretionary Access Control
B. Role Based Access Control
C. Mandatory Access Control
D. Non-Discretionary Access Control

Request for Solution File

Ask an Expert for Answer!!
Operating System: Transmission control protocol
Reference No:- TGS05534

Expected delivery within 24 Hours