Networking Fundamentals,Cryptography Fundamentals and Network Vulnerabilities, Attacks and Countermeasures

computer science


a) Which of the following is considered the first line of defense against human behavior?


A) Policies

B) Cryptography

C) Physical security

D) Business continuity planning

b) Select from the following the best definition of security risk analysis:

A) Risk analysis looks at the probability that a vulnerability exists in your system.

B) Risk analysis looks at the probability that your security measures won't stop a

hacker breaking into your system.

C) Risk analysis looks at the probability that a hacker may break into your system.

D) Risk analysis determines what resources you need to protect and quantifies the

costs of not protecting them.

E) Risk analysis looks at the consequences of being connected to the Internet.

C) Which answer governs how a network might be configured and operated as well as how

people are expected to behave on it? Explain.

A) Network documentation

B) Regulations

C) Procedures

D) Policies

Which answer is one that contains actions to be taken in a certain situation like how

long before users must change passwords, actions to take if an infiltration takes place

or a user’s steals corporate date? Explain.

A) Policies

B) Documentation

C) Regulations

D) Procedures

PROBLEM 2 - Networking Fundamentals (20 points)

(5 pts each)

a)  While using which type of networking device would each host 'see' all other traffic on

the network? Explain.

A) Network Switch

B) Network Router

C) Network Hub

D) Token Ring Network

b)  Which type of network device divides broadcast domains? Explain.

A) Switches

B) Hubs

C) Routers

D) Bridges

c)  What destination MAC Address would be added to a packet on the route to a remote

computer? Explain.

A) MAC Address of the far side of the default gateway

B) MAC Address of your computer

C) Exterior MAC Address of the remote Server

D) Interior MAC address of default gateway

d)  You have two network segments separated by a router. A host on one segment does an

ARP request for a certain IP Address. Would that request cross the router? Explain.

A) Yes, because of routers forward broadcasts

B) Yes, if there is a hub between segments

C) Only if you have a Caching Engine

D) No, routers do not forward broadcasts

PROBLEM 3 - Cryptography Fundamentals  (20 points)

(5 pts each)

a)  Users in your organization sign their emails with digital signatures. What provides

integrity for these certificates? Explain.

A) Hashing

B) Encryption

C) Non-repudiation

D) Private key

b)  Bob wants to send a secure email to Alice so he decides to encrypt it. Bob wants to

ensure that Alice can verify that he sent it. Which of the following does Alice need to

verify the certificate that Bob used in this process is valid? Explain.

A) Alice’s public key

B) Alice’s private key

C) Bob's private key

D) Bob's public key

E) The CA’s private key

F) The CA’s public key

c)  Which cryptographic system provides both data security and non-repudiation? Explain.

A) 3DES - Triple Data Encryption Standard

B) PKI - Public Key Infrastructure

Related Questions in computer science category

The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.