Systems and Usable Security-Week-3 Assignment
Systems and Usable Security-Week-3 Assignment
Systems and Usable Security-Week-3 Assignment
1. What services does the SSL Record Protocol provide for SSL connections?
A. DKIM establishes a secure channel for real-time communication between email servers.
B. DKIM is an email authentication method designed to verify the authenticity of the
sender.
C. DKIM ensures secure login practices for email accounts.
D. DKIM ensures the secure storage of email messages to prevent data breaches.
Ans. B (DKIM is an email authentication method designed to verify the authenticity of the
sender.)
A. Denial-of-service attacks
B. Spoofed TCP sessions
C. Simple sequence number counters
D. Complicated three-way handshake processes
4. Following cryptographic technique uses discrete logarithmic arithmetic for encryption and
decryption.
A. Asymmetric key encryption scheme
B. Symmetric key encryption scheme
C. Both symmetric and asymmetric encryption schemes
D. Secrete key encryption scheme
A. The MIME protocol only supports sending ASCII text via email.
B. The MIME protocol can send multiple attachments with a single message.
C. The POP3 protocol does not support offline email access, while IMAP allows offline
access.
D. The IMAP protocol does not support multiple client connections to the same mailbox.
Ans. B (The MIME protocol can send multiple attachments with a single message.)
7. In a complete session-stealing attack with attacker positioned between the two end points of
a TCP session, what additional capability does the attacker gain?
Ans:
B. (Intercepting responses from both the client and the server.) and
8. Which mode of operation in IPsec involves encapsulating the entire original IP packet as the
payload of a new packet?
A. Transport mode
B. IKE mode
C. Tunnel mode
D. Authentication Header mode
A. Confidentiality
B. Integrity
C. Availability
D. Both confidentiality and Integrity
Ans. A. (Confidentiality)
10. In IPsec, what is the role of the Authentication Header (AH) protocol?
Ans. D (To authenticate the origin and ensure data integrity of IPsec packets)