网络安全代写 | Network Security Multiple Choice Questions

本次澳洲代写是网络安全的一个限时测试

Multiple Choice Questions

One of the outcomes of the IKE v1 Phase 1 is __________ .

a) an IPsec SA
b) an IKE SA
c) Traffic selectors
d) Session ID

Which of the following is a characteristic of a bastion host?

a) It has one and only one network interface.
b) It is located in the most secure area of a network.
c) It implements application filtering.
d) It is a computer running an action role-playing video game.

Which of the following is a characteristic of a leased line?

a) A leased line connects the two end entities by a virtual private network.
b) A leased line connection goes through public networks.
c) The networks connected via a leased can use the same IP network
addresses.
d) The ISP from which a leased line is leased has complete control over the
operation of the connection.

Why do misuse intrusion detection methods produce less false positive detections?

a) Misuse intrusion detection methods can accurately detect deviations from
normal situations.
b) Signatures for known intrusions are reliable.
c) Intruder has no evasion methods to use to evade misuse intrusion
detections.
d) Misuse intrusion detection methods are more complex than other intrusion
detection methods.

Which of the following provides authenticity protection of a message in SSL?

a) A keyed-hash of the message and the sender’s MAC write secret.
b) A keyed-hash of the message and the sender’s write secret.
c) A keyed-hash of the message and the sender’s master secret.
d) A digital signature of a message signed by the sender.

In SNMP, which of the following is true about an authoritative engine?

a) An authoritative engine always sends the first message in an SNMP
session.
b) An authoritative engine has complete control of an SNMP session.
c) An authoritative engine’s message must be replied.
d) An authoritative engine is the receiver of a message if the message expects
a response.

Which one of the following is true about Open System Authentication?

a) It consists of 3 messages.
b) Authentication is by exchanging a keyed-hash.
c) Authentication is always successful.
d) It is used by a client authenticating an AP.

Which of the following is a characteristic of the counter mode of operation of a block
cipher?

a) A counter value is used to create a one-time encryption key.
b) A counter is used to count the number of plaintext blocks.
c) A counter is used to count the number of ciphertext blocks.
d) It is a cipher chaining mode to link adjacent ciphertext blocks.