Network Security Essentials Applications and Standards 5th Edition By Willaim Stallings – Test Bank





Network Security Essentials Applications and Standards 5th Edition By Willaim Stallings – Test Bank


Chapter 6:  Transport-Level Security



TRUE OR FALSE                                                                      


T          F          1.  ISSl/TLS includes protocol mechanisms to enable two TCP users to

determine the security mechanisms and services they will use.


T          F          2.  Unlike traditional publishing environments, the Internet is three-

way and vulnerable to attacks on the Web servers.


T          F          3.  Sessions are used to avoid the expensive negotiation of new

security parameters for each connection that shares security



T          F          4.  Microsoft Explorer originated SSL.


T          F          5.  The World Wide Web is fundamentally a client/server application

running over the Internet and TCP/IP intranets.


T          F          6.  One way to classify Web security threats is in terms of the location

of the threat:  Web server, Web browser, and network traffic

between browser and server.


T          F          7.  The encryption of the compressed message plus the MAC must

increase the content length by more than 1024 bytes.


T          F          8.  The Change Cipher Spec Protocol is one of the three SSL-specific

protocols that use the SSL Record Protocol.


T          F          9.  The SSL Record Protocol is used before any application data is



T          F          10. The first element of the CipherSuite parameter is the key exchange



T          F          11. The certificate message is required for any agreed on key

exchange method except fixed Diffie-Hellman.


T          F          12. Phase 3 completes the setting up of a secure connection of the

Handshake Protocol.


T          F          13. The shared master secret is a one-time 48-byte value generated

for a session by means of secure key exchange.


T          F          14. The TLS Record Format is the same as that of the SSL Record



T          F          15. Server authentication occurs at the transport layer, based on the

server possessing a public/private key pair.






  1. The The SSL Internet standard version is called _________ .


  1. A) 


  1. C) 



  1. The most complex part of SSL is the __________ .


  1. A) 
SSL Record Protocol 
Handshake Protocol


  1. C) 
Change Cipher Spec Protocol 
Alert Protocol



  1. _________ attacks include impersonating another user, altering messages in transit

between client and server and altering information on a Web site.


  1. A) 


  1. C) 



  1. The symmetric encryption key for data encrypted by the client and decrypted by

the server is a _________ .


  1. A) 
server write key 
client write key


  1. C) 
sequence key 
master key



  1. _________ provides secure, remote logon and other secure client/server facilities.


  1. A) 


  1. C) 


  1. An SSL session is an association between a client and a server and is created by

the ___________ .


  1. A) 
Handshake Protocol 


  1. C) 
Spec Protocol 



  1. An arbitrary byte sequence chosen by the server to identify an active or

resumable session state is a _________ .


  1. A) 
peer certificate 
session identifier


  1. C) 
cipher spec



  1. The _________ is used to convey SSL-related alerts to the peer entity.


  1. A) 
Change Cipher Spec Protocol 
Alert Protocol


  1. C) 
SSL Record Protocol 
Handshake Protocol



  1. With each element of the list defining both a key exchange algorithm and a

CipherSpec, the list that contains the combination of cryptographic algorithms

supported by the client in decreasing order of preference is the __________ .


  1. A) 


  1. C) 
Session ID 



  1. Phase _________ of the Handshake Protocol establishes security capabilities.


  1. A) 


  1. C) 



  1. The __________ approach is vulnerable to man-in-the-middle attacks.


  1. A) 
Anonymous Diffie-Hellman 
Fixed Diffie-Hellman


  1. C) 
Ephemeral Diffie-Hellman



  1. The final message in phase 2, and one that is always required, is the ___________

message, which is sent by the server to indicate the end of the server hello and

associated messages.


  1. A) 


  1. C) 



  1. Defined as a Proposed Internet Standard in RFC 2246, _________ is an IETF

standardization initiative whose goal is to produce an Internet standard version

of SSL.


  1. A) 


  1. C) 



  1. A Pseudorandom Function takes as input:


  1. A) 
a secret value 
an identifying label


  1. C) 
a seed value 
all of the above



_________ is organized as three protocols that typically run on top of TCP for

secure network communications and are designed to be relatively simple and

inexpensive to implement.


  1. A) 


  1. C) 





  1. __________ provides security services between Transport Layer Protocol and

applications that use TCP.


  1. The _________ Protocol allows the server and client to authenticate each other and to negotiate an encryption and MAC algorithm along with cryptographic keys to be used to protect data sent in an SSL Record.


  1. _________ attacks include eavesdropping on network traffic between browser and server and gaining access to information on a Web site that is supposed to be restricted.
  2. __________ provides confidentiality using symmetric encryption and message integrity using a message authentication code.


  1. The _________ takes an application message to be transmitted, fragments the data into manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit in a TCP segment.


  1. __________ refers to the combination of HTTP and SSL to implement secure communication between a Web browser and a Web server.


  1. Two important SSL concepts are the SSL session and the SSL _________ .


  1. Three standardized schemes that are becoming increasingly important as part of Web commerce and that focus on security at the transport layer are: SSL/TLS, HTTPS, and _________.


  1. Three higher-layer protocols defined as part of SSL and used in the management of SSL exchanges are: The Handshake Protocol, The Change Cipher Spec Protocol, and the __________ .


  1. _________ would appear to be the most secure of the three Diffie-Hellman options because it results in a temporary, authenticated key.


  1. A signature is created by taking the hash of a message and encrypting it with the sender’s _________ .


  1. The handshake is complete and the client and server may begin to exchange application layer data after the server sends its finished message in phase _________ of the Handshake Protocol.


  1. _________ require a client write MAC secret, a server write MAC secret, a client write key, a server write key, a client write IV, and a server write IV, which are generated from the master secret in that order.


  1. TLS makes use of a pseudorandom function referred to as __________ to expand secrets into blocks of data for purposes of key generation or validation.


  1. __________ allows the client to set up a “hijacker” process that will intercept selected application-level traffic and redirect it from an unsecured TCP connection to a secure SSH tunnel.



Chapter 7:  Wireless Network Security



TRUE OR FALSE                                                                      


T          F          1.  IEEE 802.11 is a standard for wireless LANs.


T          F          2.   Wireless networks, and the wireless devices that use them,

introduce a host of security problems over and above those found

in wired networks.


T          F          3.   Sensors and robots, are not vulnerable to physical attacks.


T          F          4.  The integration service enables transfer of data between a station

on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x



T          F          5.  MAC spoofing occurs when an attacker is able to eavesdrop on

network traffic and identify the MAC address of a computer with

network privileges.


T          F          6.  The DS can be a switch, a wired network, or a wireless network.


T          F          7.  The pairwise master key is derived from the group key.


T          F          8.  IEEE 802.11 defines seven services that need to be provided by the

wireless LAN to achieve functionality equivalent to that which is

inherent to wired LANs.


T          F          9.  Handheld PDAs pose a security risk in terms of both eavesdropping

and spoofing.


T          F          10.  The actual method of key generation depends on the details of the

authentication protocol used.


T          F          11.  The use of 802.1X cannot prevent rogue access points and other

unauthorized devices from becoming insecure backdoors.


T          F          12.  The principal threats to wireless transmission are eavesdropping,

altering or inserting messages, and disruption.


T          F          13.  The use of encryption and authentication protocols is the

standard method of countering attempts to alter or insert



T          F          14.  You should allow only specific computers to access your wireless



T          F          15.  Security policies for mobile devices should assume that any

mobile device will not be stolen or accessed by a malicious party.






  1. The term used for certified 802.11b products is ___________ .


  1. WAP B.  Wi-Fi


  1. WEP D.  WPA



  1. The layer of the IEEE 802 reference model that includes such functions as encoding/decoding of signals and bit transmission/reception is the _________ .


  1. physical layer B.  control layer


  1. logical link layer D.  media access layer



  1. In a(n) __________ situation, a wireless device is configured to appear

to be a legitimate access point, enabling the operator to steal passwords

from legitimate users and then penetrate a wired network through a legitimate wireless access point.


  1. malicious association B.  identiy theft


  1. network injection D.  ad hoc network



  1. ___________ and links, such as personal network Bluetooth devices, barcode readers, and handheld PDAs, pose a security risk in terms of both eavesdropping and spoofing.


  1. DoS B.  Accidental association


  1. Nontraditional networks D.  Ad hoc networks








  1. The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform address recognition and error detection, and govern access to the LAN transmission medium.


  1. transmission layer B.  logical layer


  1. media access control layer D.  physical layer



  1. The master session key is also known as the __________ key.


  1. AAA B.  GTK


  1. MIC             D.  STA



  1. The __________ is the information that is delivered as a unit between MAC users.


  1. MSDU B.  DS


  1. MPDU D.  BSS



  1. The __________ layer keeps track of which frames have been successfully received and retransmits unsuccessful frames.


  1. transmission B.  media access control


  1. logical link control D. physical layer



  1. The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities.


  1. WPA B.  RSN


  1. TKIP D.  WAE







  1. The specification of a protocol along with the chosen key length is known as a __________ .


  1. extended service             B.  distribution system


  1. cipher suite D.  RSN



  1. The _________ is used to ensure the confidentiality of the GTK and other key material in the 4-Way Handshake.


  1. MIC key B.  EAPOL-KEK





  1. The PMK is used to generate the _________ which consists of three keys to be used for communication between a STA and AP after they have been mutually authenticated.


  1. AAA Key B.  GTK


  1. PTK             D.  PSK



  1. A __________ is any device that contains an IEEE 802.11 conformant MAC and physical layer.


  1. station B.  MPU


  1. service data unit D.  MSDU



  1. The first 802.11 standard to gain broad industry acceptance was _________.


  1. 802.11i B.  802.11a


  1. 802.11g D.  802.11b







  1. ____________ can occur when a company’s wireless LAN or wireless access points to wired LANs in close proximity and may create overlapping transmission ranges. A user intending to connect to one LAN may unintentionally lock on to a wireless access point from a neighboring network.


  1. Network injection B.  Denial of service attacks


  1. Man-in-the-middle attacks D.  Accidental association






  1. In simple terms, the wireless environment consists of three components that

provide point of attack:  the endpoint, the ______________, and the access point.


  1. A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.


  1. __________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.


  1. To certify interoperability for 802.11b products an industry consortium named the __________ was formed.


  1. The __________ function is the logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.


  1. Derived from the GMK, the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.


  1. An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.


  1. The __________ layer is responsible for detecting errors and discarding any frames that contain errors.


  1. The smallest building block of a wireless LAN is a __________ which consists of wireless stations executing the same MAC protocol and competing for access to the same shared wireless medium.


  1. In order to accelerate the introduction of strong security into WLANs, the Wi-Fi Alliance promulgated __________ as a set of security mechanisms for the Wi-Fi standard.


  1. The MPDU authentication phase consists of three phases.  They are:  connect to AS, EAP exchange and _________ .


  1. Forming a hierarchy beginning with a master key from which other keys are derived dynamically and used for a limited period of time, __________ are used for communication between a pair of devices typically between a STA and an AP.


  1. The MPDU exchange for distributing pairwise keys is known as the _________ which the STA and SP use to confirm the existence of the PMK, to verify the selection of the cipher suite, and to derive a fresh PTK for data sessions.


  1. The main threat involving wireless access points is unauthorized access to the network.  The principal approach for preventing success is the __________ standard for port-based network access control.


  1. The IEEE 802.11  protocol stack consists of the logical link control layer, the medium access control layer, and the _________ layer.




Chapter 8:  Electronic Mail Security



TRUE OR FALSE                                                                      


T          F          1.  PGP incorporates tools for developing public-key certificate

management and a public-key trust model.


T          F          2.  PGP provides confidentiality through the use of asymmetric block



T          F          3.  E-mail is the most common distributed application that is widely

used across all architectures and vendor platforms.


T          F          4.  As a default, PGP compresses the message after applying the

signature but before encryption.


T          F          5.  Each PGP entity must maintain a file of its own public/private key

pairs as well as a file of private keys of correspondents.


T          F          6.  A means of generating predictable PGP session keys is needed.


T          F          7.  To enhance security an encrypted message is not accompanied by

an encrypted form of the session key that was used for message



T          F          8.  A message component includes the actual data to be stored or

transmitted as well as a filename and a timestamp that specifies

the time of creation.


T          F          9.  PGP has a very rigid public-key management scheme.


T          F          10. The key legitimacy field is derived from the collection of signature

trust fields in the entry.


T          F          11. Only single user IDs may be associated with a single public key on

the public-key ring.


T          F          12. The MIME-Version field must have the parameter value 1.0 in

order for the message to conform to RFCs 2045 and 2046.


T          F          13. For the text type of body no special software is required to get the

full meaning of the text aside from support of the indicated

character set.


T          F          14. The objective of MIME Transfer Encodings is to provide reliable

delivery across the largest range of environments.


T          F          15. Native form is a format, appropriate to the content type, that is

standardized for use between systems.






  1. __________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP.


  1. S/MIME B.  MIME





  1. PGP provides authentication through the use of _________ .


  1. asymmetric block encryption B.  symmetric block encryption


  1. radix-64 D.  digital signatures



  1. PGP provides e-mail compatibility using the __________ encoding scheme.


  1. radix-64 B.  MIME


  1. digital signature D.  symmetric block



  1. The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication.


  1. key ID of the sender’s public key


  1. timestamp


  1. filename


  1. leading two octets of message digest



  1. Key IDs are critical to the operation of PGP and __________ key IDs are included in any PGP message that provides both confidentiality and authentication.


  1. two             B.  four


  1. six D.  three


  1. MIME is an extension to the ________ framework that is intended to address some of the problems and limitations of the use of SMTP.


  1. RFC 821                         B.  RFC 5322


  1. RFC 3852             D.  RFC 4871



  1. The ________ MIME field is a text description of the object with the body which is useful when the object is not readable as in the case of audio data.


  1. Content-Type B.  Content-Description


  1. Content-ID             D.  Content-Transfer-Encoding



  1. The __________ field is used to identify MIME entities uniquely in multiple contexts.


  1. Content-Transfer- Encoding B.  Content-ID


  1. Content-Description D.  Content-Type



  1. Video content will be identified as _________ type.


  1. GIF             B.  MPEG


  1. BMP D.  JPEG



  1. The __________ subtype is used when the different parts are independent but are to be transmitted together. They should be presented to the receiver in the order that they appear in the mail message.


  1. multipart/digest B.  multipart/parallel


  1. multipart/mixed D.  multipart/alternative



  1. For the __________ subtype the order of the parts is not significant.


  1. multipart/mixed B.  multipart/digest


  1. multipart/alternative D.  multipart/parallel



  1. S/MIME cryptographic algorithms use __________ to specify requirement level.


  1. CAN and MUST B.  SHOULD and CAN





  1. E-banking, personal banking, e-commerce server, software validation and membership-based online services all fall into the VeriSign Digital ID _________ .


  1. Class 4 B.  Class 3


  1. Class 1 D.  Class 2



  1. The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards.


  1. Message Store B.  Mail Submission Agent


  1. Message Transfer Agent             D.  Mail Delivery Agent



  1. Typically housed in the user’s computer, a _________ is referred to as a client e-mail program or a local network e-mail server.


  1. Mail Submission Agent B.  Message Transfer Agent


  1. Message Store D.  Message User Agent











  1. ___________ is an open-source, freely available software package for e-mail security.


  1. The key legitimacy field, the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .


  1. PGP provides compression using the __________ algorithm.


  1. To provide transparency for e-mail applications, an encrypted message may be converted to an ASCII string using _________ conversion.


  1. PGP makes use of four types of keys: public keys, private keys, one-time session keys, and ___________ symmetric keys.


  1. Computed by PGP, a _________ field indicates the extent to which PGP will trust that this is a valid public key for this user; the higher the level of trust, the stronger the binding of this user ID to this key.


  1. __________ is a security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security.


  1. The __________ MIME field describes the data contained in the body with sufficient detail that the receiving user agent can pick an appropriate agent or mechanism to represent the data to the user or otherwise deal with the data in an appropriate manner.


  1. The _________ type refers to other kinds of data, typically either uninterpreted binary data or information to be processed by a mail-based application.


  1. The _________ transfer encoding is useful when the data consists largely of octets that correspond to printable ASCII characters.


  1. The _________ transfer encoding, also known as radix-64 encoding, is a common one for encoding arbitrary binary data in such a way as to be invulnerable to the processing by mail-transport programs.


  1. A _________ is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer, which is then encoded using base64 encoding.


  1. S/MIME provides the following functions:  enveloped data, signed data, clear signed data, and ________ .


  1. A specification for cryptographically signing e-mail messages permitting a signing domain to claim responsibility for a message in the mail stream, _________ allow message recipients to verify the signature by querying the signer’s domain directly to retrieve the appropriate public key and thereby confirming that the message was attested to by a party in possession of the private key for the signing domain.


  1. The __________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.



There are no reviews yet.

Be the first to review “Network Security Essentials Applications and Standards 5th Edition By Willaim Stallings – Test Bank”

Your email address will not be published. Required fields are marked *