DOC PREVIEW
EIU MIS 4850 - MIS 4850 Systems Security

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

MIS 4850 Systems SecurityQuiz 2 - March 27, 2008Student Name: __________________________________1. Which of the following has to be kept secret in symmetric key encryption?a) the encryption methodb) the encryption keyc) Both of the above.d) Neither a. nor b.2. Encryption is used for ….. (Circle all correct answers)a) Confidentialityb) Availabilityc) Integrityd) All of the above.3. In symmetric encryption in a two-way dialog, how many keys are used in total for confidentiality?a) oneb) twoc) four4. Jason sends a message to Kristin using public key encryption for confidentiality. What key will Jason use to encrypt the message?a) Jason’s private keyb) Jason’s public keyc) Kristin’s private keyd) Kristin’s public key5. Jason sends a message to Kristin using public key encryption for confidentiality. What key will Kristin use to decrypt the message?a) Jason’s private keyb) Jason’s public keyc) Kristin’s private keyd) Kristin’s public key6. A 256-bit key would be considered to be strong in _____a) symmetric key encryptionb) public key encryptionc) Both of the aboved) Neither a. nor b.7. The result of hashing can be turned back to the original string. T F8. Encryption is usually used in the initial negotiation phase of cryptographic systems. T F9. Once the partners are engaged in the ongoing communication phase there is, usually, no need for the partners to do another authentication since the communication is safe. T F Page 1 / 210. Which of the following provides security at the transport layer?a) IPsecb) PPTPc) SSL/TLSd) Kerberos11. Transmitting over the Internet with added security is the definition of _____.a) a VPNb) IPsecc) PPTPd) tunneling12. Which of the following is true when comparing SSL/TLS to IPSec? (Choose all that apply)a) SSL/TLS operated at the Transport layer whereas IPSec operates ate the Internet layer.b) SSL/TLS operated at the Internet layer whereas IPSec operates ate the Transport layer.c) SSL/TLS is usually used to secure applications or services like Webservice and email.d) IPSec can protect all kind of Transport layer messages and Application layer messages.13. Which of the following provides for confidentiality in IPsec?a) ESPb) AHc) Both of the above.d) Neither a. nor b. Page 2 /


View Full Document
Download MIS 4850 Systems Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view MIS 4850 Systems Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view MIS 4850 Systems Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?