Unit V
Unit V
(Approved by AICTE | Affiliated to JNTUH | Accredited by NAAC with Grade ‘A’ & NBA for CSE, ECE, EEE, & IT)
Bachupally, Hyderabad-090
-
Faculty
Dr. Venkatesh B, Assoc. Prof
Name(s) :
Ms. T Durga Devi,& Ms. Preethi V , Asst. Prof
UNIT-V
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP
Security architecture, Authentication Header, Encapsulating security payload,
Combining security associations, Internet Key Exchange
Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual
Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site
Scripting Vulnerability.
S.No. Question Answer
Pretty good privacy (PGP) security system uses
a) Public key cryptosystem
1. b) Private key cryptosystem c
c) Public & Private key cryptosystem
d) None of the mentioned
Public key cryptosystem is used for the encryption of
a) Messages
2. b) Session key b
c) Session key & Messages
d) None of the mentioned User Interface
Public key cryptosystem is used for the encryption of
a) Messages
3. b) Session key d
c) Session key & Messages
d) None of the mentioned
What is the key size allowed in PGP?
a) 1024-1056
4. b) 1024-4056 c
c) 1024-4096
d) 1024-2048
Which should be used first to decrypt?
a) Public key
5. b) Private key b
c) Public & Private key
d) None of the mentioned
One security protocol for the e-mail system is .
a) IPSec
6. b) SSL c
c) PGP
d) none of the above
uses the idea of certificate trust levels.
a) X509
7. b) PGP b
c) KDC
d) none of the above
provides privacy, integrity, and authentication in e-mail.
a) IPSec
8. b) SSL c
c) PGP
d) none of the above
, there can be multiple paths from fully or partially trusted
authorities.
a) X509
9. b
b) PGP
c) KDC
d) none of the above
In , the cryptographic algorithms and secrets are sent with
the message.
a) IPSec
10. d
b) SSL
c) TLS
d) PGP
was invented by Phil Zimmerman.
a) IPSec
11. b) SSL c
c) PGP
d) none of the above
SMTP stands for
a) Short Mail Transmission Protocol
12. b) Small Mail Transmission Protocol d
c) Server Mail Transfer Protocol
d) Simple Mail Transfer Protocol
Data compression includes
a) Removal of redundant character
b) Uniform distribution of characters
13. c
c) Removal of redundant character & Uniform distribution of
characters
d) None of the mentioned
Which algorithm is used for public key encryption?
a) RSA
14. b) Diffie-Hellman c
c) RSA & Diffie-Hellman
d) None of the mentioned
IPsec is designed to provide the security at the
a) Transport layer
15. b) Network layer b
c) Application layer
d) Session layer
Which component is included in IP security?
16. a) Authentication Header (AH) d
b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
d) All of the mentioned
IPsec services are available in Layer.
a) Application
17. b) Data link c
c) Network
d) Transport
The Authentication Header (AH) , part of IPsec, provides which of
the following security function?
a) Source authentication
18. d
b) Data Integrity
c) Data confidentiality
d) Source authentication and data integrity
The mode of IPsec, take the whole IP packet to form secure
communication between two gateways
a) Transport
19. b
b) Tunnel
c) Either (a) or (b)
d) Both (a) and (b)
Encapsulating Security Payload (ESP) belongs to which Internet
Security Protocol?
a) Secure Socket Layer Protocol
20. b
b) Secure IP Protocol
c) Secure Http Protocol
d) Transport Layer Security Protocol
The secret key between members needs to be created as a
key when two members contact KDC.
a) public
21. b
b) session
c) complimentary
d) none of the abov
A(n) is a trusted third party that assigns a symmetric key to
two parties.
a) KDC
22. a
b) CA
c) KDD
d) none of the above
operates in the transport mode or the tunnel mode.
a) IPSec
23. b) SSL a
c) PGP
d) none of the above
IKE creates SAs for .
a) SSL
24. b) PGP c
c) IPSec
d) VP
provides either authentication or encryption, or both, for
packets at the IP level.
a) AH
25. b
b) ESP
c) PGP
d) SSL
One security protocol for the e-mail system is .
26. a) IPSec c
b) SSL
c) PGP
d) none of the above
IPSec defines two protocols: and .
a) AH; SSL
27. b) PGP; ESP c
c) AH; ESP
d) all of the above
is a collection of protocols designed by the IETF (Internet
Engineering Task Force) to provide security for a packet at the
network level.
28. a) IPSec a
b) SSL
c) PGP
d) none of the above
In PGP, to exchange e-mail messages, a user needs a ring of
keys.
a) secret
29. b
b) public
c) either (a) or (b)
d) both (a) and (b)
Which of the following transport layer protocols is used to support
electronic mail?
a) SMTP
30. a
b) IP
c) TCP
d) UDP
MIME stands for
a) Multipurpose Internet Mail Extensions
31. b) Multipurpose Internet Mail Email a
c) Multipurpose International Mail Entity
d) Multipurpose International Mail End
In architecture of e-mail, we can have
a) 2 Scenarios
32. b) 3 Scenarios d
c) 4 Scenarios
d) 6 Scenarios
Mail access starts with client when user needs to download e-mail
from the
a) Mail Box
33. a
b) Mail Server
c) Mail Host
d) Internet
When sender and receiver of an e-mail are on same system, we need
only two
a) IP
34. d
b) Domain
c) Servers
d) User Agents
What "layer" of an e-mail message should you consider when
35. evaluating e-mail security? d
a. TCP/IP
b. SMTP
c. Body
d. All of the above
Why isn't S/MIME the perfect solution to e-mail security?
a. It provides authentication and privacy, but not integrity
checking.
36. b. It provides authentication and integrity checking, but not c
privacy.
c. It has scalability problems.
d. What are you talking about? It is the perfect solution.
What are the two most common errors associated with keyword
searching across e-mail messages?
a. Ignoring the subject line
37. c
b. Ignoring case significance
c. Improper word stemming
d. Ignoring alphanumeric characters
…………… is to protect data and passwords.
a) Encryption
38. b) Authentication a
c) Authorization
d) Non-repudiation
MAC stands for
a. Message access code
39. b. Message authentication code b
c. both a and b
d. none
OAKLEY is the refinement of
a. RSA
40. b. Diffie Hellmann b
c. DES
d. AES
ESP stands for
a. escape pay load
41. b. encapsulating security payload b
c. both
d. none
The payload length in ISAKMP in bytes is
a. 2
42. b. 3 a
c. 4
d. 5
The payload length in AH in bits is
a. 2
43. b. 3 d
c.6
d. 8
PGP stands for
a. pretty good privacy
44. b. Pretty god privacy a
c. Permanent good privacy
d. none
S/MIME stands for
a. Secure/Multipurpose Internet Mail Extension
45. b. Secure/Multipurpose Internet Message Extension a
c. Secure/Multiple Internet Mail Extension
d. none
RFC stands for
a. Request for comment
46. b. Request for common Data a
c. Reply for comment
d. none
DOI stands for
a. Dummy of Interpretation
47. b. Domain of Interpretation b
c. Domain of Interpersonal
d. none
SPI stands for
a. Secret Parameters Index
48. b. Security Parameters Interconnection c
c. Security Parameters Index
d. none
SA stands for
a. Security Associations
49. b. Secret Associations a
c. Security Access
d. none
MTU stands for
a. maximum transfer unit
50. b. maximum transmission universe b
c. maximum transmission unit
d. none
PGP makes use of which cryptographic algorithm?
a) DES
b) AES
51. c
c) RSA
d) Rabin
Explanation: PGP recommends the use of RSA.
USENET is related to which of the following Public Key distribution
schemes?
a) Public-Key Certificates
b) Public announcements
c) Publicly available directories
52. b
d) Public-Key authority
Using email hacking illicit hackers can send & spread virus
and spam emails. a
a) trojans, redirected malicious URLs
79. b) antivirus, patches
c) cracked software, redirected malicious URLs
d) malware, security patches
is the technique used for tricking users to disclose
their username and passwords through fake pages? b
a) Social Engineering
80. b) Phishing
c) Cookie Stealing
d) Banner Grabbing