Preview

Public-key Cryptography and Access Control

Powerful Essays
Open Document
Open Document
16853 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Public-key Cryptography and Access Control
Take Test: Quiz 2
Content
Top of Form
Assistive Technology Tips [opens in new window]
Instructions

Question Completion Status:

Question 1
In asymmetric cryptography, what does a digital signature accomplish?

Proves the identity of the sender

Confirms the source of the message

Prevents others from viewing the message

Provides confidentiality protection
Question 2
This occurs when a parent network provides filtering for traffic before it enters the child network to which individual and business customers connect.

upstream filtering

firewall filtering

edge device filtering

defensive filtering
1 points
Question 3
To reduce risk of vulnerability, some VPNs use rekeying processes. This particular type of rekeying triggers when a specific amount of traffic is transmitted.

election rekeying

volume rekeying

idle rekeying

time rekeying
Question 4
________, a sub-set of asymmetric cryptography, is based on key pairs.

digital certificate

multi-factor authentication

ciphertext

public key cryptography
Question 5
A hacker captures and retransmits authentication packets against the same server in order to gain interactive or session access to a system. This describes which type of attack?

Replay

Insertion

Buffer overflow

Hijacking
Question 6
What is an advantage of VPN tunnel mode?

Encapsulates protocol headers only

Encapsulates packet payloads only

Encapsulates protocol headers and packet payloads

Does not encapsulate any part of the packet
Question 7
A ________ allows an organization to know and control the pathway of their transmissions.

client-to-server VPN

trusted VPN

distributed LAN

host-to-site VPN

Question 8
Which of the following attacks must take maximum transmission units (MTUs) into account?

Buffer overflow

Fragmentation

Replay

Cross-site scripting

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    (1 point) 6. The first attack demonstrated on the Nittany Corp. network in the lab video is this kind of attack.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    During the connection establishment process, the two computers involved in a VPN connection authenticate each other and select a VPN protocol.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    21.) What do you call an attempted hacking, where every possible every possible combination is used?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    This network access control determines which IP packets are allowed entry to a network and which are dropped.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Good Essays

    Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    7. What method does an attacker use to regain access to an already penetrated system?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Itp 1101 Research Paper

    • 2125 Words
    • 9 Pages

    This paper provides a general overview of denial-of-service attacks in which the primary goal of the attack is to remove or limit the victim’s access to a particular service or resource. The paper also provides an overview of on methods of attack and its impacts. It also includes information that may assist you on how to respond to such an attack.…

    • 2125 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IPsec and VPN

    • 1390 Words
    • 6 Pages

    IPsec provided end-to-end security in the Internet Layer of the Internet Protocol Suite. It is different to other Internet security systems which is being use all over the place, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Secure Shell (SSH), operate in the upper layers of the TCP/IP model. Therefore, IPsec will protects any application traffic that came across in network. To use IPsec, applications do not need to be specifically designed.…

    • 1390 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    a. Overall, I believe this attack falls into four major threat categories: deliberate acts of trespass, compromises to intellectual property, technical failures, and managerial failure. Furthermore, I believe this attack would be categorized as a deliberate act of theft/trespass which compromises intellectual property due to technical and managerial failures.…

    • 2263 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Vpn Reactor Guide

    • 316 Words
    • 2 Pages

    Some governments, ISP & networks block access to certain VPN protocols. The flexibility of multiple protocols allows you to bypass those blocks. In instances where all VPN protocols are blocked or throttled. Our StealthVPN has the ability to bypass these blocks by concealing itself within basic web and email traffic.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Windows Hacking

    • 5696 Words
    • 23 Pages

    On the basis of how a hacker act while he is doing some unauthorized activities there are 4 types of hackers :-…

    • 5696 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Non Blind Hijacking

    • 3370 Words
    • 14 Pages

    Introduction This paper makes no assumptions of prior knowledge in TCP session hijacking or blind and nonblind IP spoofing. We will cover all basics and provide both a novice and advanced introduction to these topics. Although there are countless papers and books on the subject of TCP/IP, I always believe that there exists a much less intricate definition that can be provided by other people. We aim to provide our definition in an effort to hopefully clearly articulate this often convoluted labyrinth of networking. First off, what exactly is TCP Hijacking? The meticulous craft of TCP hijacking is simple. The exploit relies on the violation of trust relationships between 2 communicating hosts. An attacker can grab unencrypted traffic from a victim’s network-based TCP application, further tampering with the authenticity and integrity of the data before forwarding it on to the unsuspecting target. The first phase of solving this labyrinth is to understand the TCP/IP protocol suite. When two computers on the Internet wish to establish a session with each other, a much more intricate processes take place other than loading Netscape and hitting [go]. Communication over the Internet is conducted through packets, a process involving multiple layers. Packets first traverse down the stack of the sending host, than reverse up the stack at the remote. Each layer in the stack wraps the packet on the sending side and than unwraps it at each layer on the receiving. This stack, also known as the TCP/IP Internet model consists of four layers (not to be confused with all 7 layers of the OSI standards model). Each layer of the stack adds its own proprietary "tag" to each segment of the packet. I have documented the communication processes between stacks in the below diagram.…

    • 3370 Words
    • 14 Pages
    Powerful Essays

Related Topics