CP372 Networks Chapter 8 Questions

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:20 PM on 4/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

30 Terms

1
New cards

What is confidentiality in network security?

Ensures only the sender and intended receiver can understand the message.

2
New cards

What does authentication guarantee?

The communicating party is who they claim to be.

3
New cards

What is message integrity?

Assurance that a message has not been altered in transit.

4
New cards

What is a nonce and why is it used?

A random value used once to prevent replay attacks.

5
New cards

What is the key difference between symmetric and public-key cryptography?

Symmetric uses a shared key; public-key uses a public/private key pair.

6
New cards

What problem does public-key cryptography solve?

Secure key distribution between unknown parties.

7
New cards

What is a digital signature used for?

Authentication, integrity, and non-repudiation.

8
New cards

What is a message digest?

A fixed-length hash representing a message.

9
New cards

Why is AES preferred over DES?

AES uses longer keys and is resistant to brute-force attacks.

10
New cards

What is the goal of Diffie–Hellman?

To establish a shared secret without sending it directly.

11
New cards

TLS uses symmetric encryption for data transfer.

True - symmetric encryption is efficient for bulk data.

12
New cards

Encrypting a password alone prevents replay attacks.

False - freshness (e.g., nonce) is required.

13
New cards

RSA is efficient for encrypting large files.

False - it is slow and used mainly for key exchange.

14
New cards

Hash functions provide confidentiality.

False - they provide integrity, not secrecy.

15
New cards

ESP provides confidentiality while AH does not.

True.

16
New cards

Which attack involves resending a captured message?

A. Spoofing

B. Replay

C. Eavesdropping

D. Hijacking

Answer: B

17
New cards

Which key verifies a digital signature?

A. Sender’s private key

B. Receiver’s private key

C. Sender’s public key

D. Receiver’s public key

Answer: C

18
New cards

Which protocol secures TCP connections on the web?

A. IPsec

B. TLS

C. SSH

D. DNSSEC

Answer: B

19
New cards

Which IPsec mode encrypts the entire IP datagram?

A. Transport

B. Record

C. Tunnel

D. Session

Answer: C

20
New cards

Which firewall tracks active TCP connections?

A. Stateless

B. Packet filter

C. Application gateway

D. Stateful

Answer: D

21
New cards

Why are message digests signed instead of full messages?

They are smaller and faster while still ensuring integrity.

22
New cards

Why does TLS use multiple keys?

To separate encryption and authentication for better security.

23
New cards

Why is a CA needed?

To bind a public key to a real identity and prevent MITM attacks.

24
New cards

Why is 0-RTT TLS vulnerable to replay attacks?

Early data can be reused by attackers.

25
New cards

Why is IPsec connection-oriented?

It relies on stateful Security Associations (SAs).

26
New cards

An attacker reuses a captured login message. What attack? How to stop it?

Replay attack; prevent using nonces or sequence numbers.

27
New cards

Alice signs a message and Bob verifies it. What is guaranteed?

Authentication, integrity, and non-repudiation.

28
New cards

Why does TLS switch to symmetric encryption after handshake?

Symmetric encryption is faster for bulk data.

29
New cards

What IPsec field prevents replay attacks?

Sequence number.

30
New cards

Why can’t a stateless firewall detect fake TCP ACK packets?

It does not track connection state.