A. Vigner cipher
B. Diffie-hellman
C. Rsa
D. Aes
Explanation: The Diffie-Hellman public key algorithm is the oldest public key algorithm. It is a hybrid of the secret and public key.
A. Configuring
B. Performance
C. Accounting
D. Importing
Explanation: Accounting management is probably the least developed function of the network management application. Accounting management could also include the use of individual hosts, administrative segments, and external traffic. Accounting of individual hosts is useful for identifying some hidden costs.
A. Technical, administrative
B. Authoritative, non-administrative
C. Non-technical, administrative
D. Non-authoritative, administrative
Explanation: Security management is both a technical and administrative issue in information management. It involves securing access to the network and information flowing in the network, access to data stored in the network, and manipulating the data that are stored and flowing across the network.
A. True
B. False
C.
D.
Explanation: An application-level gateway is used to overcome some of the problems identified in packet filtering. Firewalls F1 and F2 will only forward if data are to or from the application gateway. Thus, the secured LAN is a gateway LAN. The application gateway behaves differently for each application, and filtering is handled by the proxy services in the application gateway.
A. Performance management
B. Cryptography
C. Packet filtering
D. Masquerading
Explanation: The main purpose of a firewall is to protect a network from external attacks. It monitors and controls traffic into and out of a secure network. h can be implemented in a router, or a gateway or a special host. A firewall is normally located at the gateway to a network, but it may also be implemented at host access points. Firewalls use packet filtering or application-level gateways as the two primary techniques of controlling undesired traffic.
A. True
B. False
C.
D.
Explanation: Security management is both a technical and administrative issue in information management. It involves securing access to the network and information flowing in the network, access to data stored in the network, and manipulating the data that are stored and flowing across the network. The scope of network and access to it not only covers enterprise intranet network but also the Internet that it is connected to.
A. . des is designed for efficient hardware implementation and consequently has a poor performance if implemented in software. in contrast to that, idea functions efficiently in software implementation. advertisement
B. Des
C. Rsa
D. Crc
Explanation: There are two standard algorithms implement secret key cryptography. They are Data Encryption Standard (DES) and International Data Encryption Algorithm (IDEA). DES is designed for efficient hardware implementation and consequently has a poor performance if implemented in software. In contrast to that, IDEA functions efficiently in software implementation.
A. Signature generation
B. Encryption
C. Email conversion
D. Compression
Explanation: Pretty Good Privacy (PGP) defines a clever procedure that utilizes various available modules to perform the functions needed to transmit a secure message, such as email. The signature generation module uses MD5 to generate a hash code of the message and encrypts it with the sender’s private key using an RSA algorithm.
A. True
B. False
C.
D.
Explanation: In Secret Key Cryptography, each letter is replaced by another letter n letters later in the alphabet. It is the same key that is used for encryption and decryption and is called secret key cryptography. The encryption and decryption modules can be implemented in either hardware or software.
A. It makes sure that the information has not tampered as it traverses between the source and the destination
B. It validates the originator identification
C. It is used to overcome some of the problems identified in packet filtering
D. It reduces the risk of access to hosts from an external network by filtering insecure services
Explanation: For secure communication, we need to ensure integrity protection and authentication validation. Integrity protection makes sure that the information has not been tampered with as it traverses between the source and the destination.