Network Security - Improvement
Network Security - Improvement
1 The CIA triad includes confidentiality, identity, and availability. Correct Incorrect
2 Passive attacks are typically easier to detect than active attacks. Correct Incorrect
The Internet Society (ISOC) is responsible for publishing internet infrastructure
3 Correct Incorrect
standards.
A breach with a moderate impact may still significantly disrupt operations without
4 Correct Incorrect
total failure.
5 DES uses a 64-bit key and a 56-bit block size. Correct Incorrect
6 AES supports multiple key lengths but only a fixed block size. Correct Incorrect
7
In ECB mode, identical plaintext blocks yield different ciphertext blocks for the same Correct Incorrect
key.
8 Stream ciphers typically require a pseudorandom keystream to be secure. Correct Incorrect
9 Hash functions used for authentication must include a secret key. Correct Incorrect
10 Public key encryption involves one shared key between sender and receiver. Correct Incorrect
11 HMAC strengthens traditional hash-based authentication by incorporating a key. Correct Incorrect
12 Diffie-Hellman is primarily used for secure message encryption. Correct Incorrect
13 Kerberos uses public-key encryption to securely distribute symmetric keys. Correct Incorrect
14 A Kerberos realm must have a master database that is centrally managed. Correct Incorrect
15 X.509 certificates cannot be verified by anyone except the certificate authority. Correct Incorrect
Question 2: Choose the correct answer for each of the following 15 statements: [15 Marks]
3. Which mode of operation encrypts identical plaintext blocks into identical ciphertexts under the same key?
A. Long key length B. Fixed message length C. Block chaining D. Hash-based padding
A. Cryptographic modeling B. Self-service password reset C. Traffic sniffing D. File system auditing
A. Assign IP addresses B. Evaluate patch levels C. Relay authentication messages D. Detect malware
Page 2 of 5
Question 3: Fill in the blanks: [5 Marks]
1. The protocol that combines HTTP with SSL to secure web communication is known as __________.
2. SSL uses the __________ Protocol to define a shared secret key for both confidentiality and
message integrity.
3. In HTTPS, if secure communication is established, the URL begins with __________ instead of http.
4. The 48-byte shared secret used in SSL to generate encryption and MAC keys is called the
__________.
5. The SSL __________ Protocol is responsible for initiating the secure session between client and
server.
6. In SSH authentication, the __________ method sends the client’s public key signed by its private
key.
7. An __________ vector (IV) is used in SSL when a block cipher is operating in CBC mode.
8. The standardized version of SSL defined by IETF as RFC 5246 is called __________.
9. In SSH, the protocol responsible for secure channel management over an authenticated tunnel is the
__________ Protocol.
10. A key feature of SSH is __________ which allows insecure TCP connections to be secured.
11. ________ is an umbrella term for managing access to a network and authenticating users and
devices.
12. The three main components of a NAC system are Access Requester (AR), ________ , and Policy
Server.
14. IEEE ________ is a common standard used for port-based network access control.
15. In cloud computing, the three main service models are SaaS, ________, and IaaS.
16. A ________ provides connectivity and transport of cloud services between consumers and
providers.
17. The role of a ________ is to verify and assure that the cloud provider complies with security
standards.
18. The ________ model gives the appearance of exclusive database use but actually shares the
environment among tenants.
19. Data in the cloud must be protected when at rest, in transit, and in ________.
Page 3 of 5
Question 4: Confusion matrix: [15 Marks]
You are working as a cybersecurity analyst at a university that has implemented Kerberos-based
authentication to protect its internal digital services, including access to email, learning platforms, and staff
portals.
One day, a student logs in to their personal device and tries to access the university’s course registration
system, which requires secure authentication through Kerberos. You are asked to explain how the Kerberos
authentication process works to ensure both the identity of the user and secure access to services.
1. Describe the key goals of using Kerberos in such an environment. What are the main security
benefits Kerberos provides to both users and the organization?
2. Draw and label the Kerberos message exchange process (Version 4 or 5).
Page 4 of 5
Question 5: Answer the following Question: [10 Marks]
A government agency is implementing a secure communication system for exchanging sensitive information
between departments using public-key infrastructure (PKI). Each employee is issued a digital certificate
signed by the agency’s internal Certificate Authority (CA). You are asked to explain how digital certificates
and public-key encryption help establish secure communication in this environment.
1. Briefly explain how public-key encryption works and how it differs from symmetric encryption.
2. Describe the role of a digital certificate and the function of the Certificate Authority (CA).
Page 5 of 5