| Tough Network Security |
A. True
B. False
C.
D.
Explanation: Passive attacks include eavesdropping on network traffic between browser and server and gaining access to information on a website that is supposed to be restricted. Active attacks include impersonating another user, altering messages in transit between client and server, altering information on a website.
A. Fortezza
B. Anonymous diffie-hellman
C. Fixed diffie-hellman
D. Rsa
Explanation: The Fixed Diffie-Helmann does not require the server_key_exchange step in the handshake protocol.
A. Anonymous diffie-hellman
B. Fixed diffie-hellman
C. Rsa
D. Fortezza
Explanation: Fortezza is not supported in SSLv3.
A. Select, alarm
B. Alert, alarm
C. Warning, alarm
D. Warning, fatal
Explanation: The first byte takes the value warning(1) or fatal(2) to convey the severity of the message.
A. Is the byte 0x36 repeated 40 times for md5
B. Is the byte 0x5c repeated 40 times for md5
C. Is the byte 0x5c repeated 48 times for sha-1
D. Is the byte 0x36 repeated 48 times for md5
Explanation: pad_1 = is the byte 0x36 repeated 48 times for MD5.
A. 40; 80
B. 60; 620
C. 80; 443
D. 620; 80
Explanation: HTTP uses 80 ports, whereas HTTPS uses 443 ports.
A. Secure service identifier
B. Secure set independent device
C. Secure set identifier
D. Service set independent device
Explanation: SSID stands for Secure Set Identifier.
A. 0.0.0.0
B. 127.x.x.x
C. 255.255.255.255
D. None of the mentioned
Explanation: Loopback address is given by 127.x.x.x.
A. 64 bits
B. 128 bits
C. 256 bits
D. 512 bits
Explanation: In the case of TKIP -256 bits and CCMP – 128 bits.