CP 372 CPT 8 mee

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:03 PM on 4/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

30 Terms

1
New cards

What is confidentiality in network security?

Ensures only the sender and intended receiver can understand the message.

2
New cards

What does authentication guarantee?

The communicating party is who they claim to be.

3
New cards

What is message integrity?

Assurance that a message has not been altered in transit.

4
New cards

What is a nonce and why is it used?

A random value used once to prevent replay attacks.

5
New cards

What is the key difference between symmetric and public-key cryptography?

Symmetric uses a shared key; public-key uses a public/private key pair.

6
New cards

What problem does public-key cryptography solve?

Secure key distribution between unknown parties.

7
New cards

What is a digital signature used for?

Authentication, integrity, and non-repudiation.

8
New cards

What is a message digest?

A fixed-length hash representing a message.

9
New cards

Why is AES preferred over DES?

AES uses longer keys and is resistant to brute-force attacks.

10
New cards

What is the goal of Diffie-Hellman?

To establish a shared secret without sending it directly.

11
New cards

T & F - TLS uses symmetric encryption for data transfer.

True - symmetric encryption is efficient for bulk data.

12
New cards

T & F - Encrypting a password alone prevents replay attacks.

False - freshness (e.g., nonce) is required.

13
New cards

T & F - RSA is efficient for encrypting large files.

False - it is slow and used mainly for key exchange.

14
New cards

T & F - Hash functions provide confidentiality.

False - they provide integrity, not secrecy.

15
New cards

T & F - ESP provides confidentiality while AH does not.

True.

16
New cards

Which attack involves resending a captured message?

A. Spoofing

B. Replay

C. Eavesdropping

D. Hijacking

B. Replay

17
New cards

Which key verifies a digital signature?

A. Sender's private key

B. Receiver's private key

C. Sender's public key

D. Receiver's public key

C. Sender's public key

18
New cards

Which protocol secures TCP connections on the web?

A. IPsec

B. TLS

C. SSH

D. DNSSEC

B. TLS

19
New cards

Which IPsec mode encrypts the entire IP datagram?

A. Transport

B. Record

C. Tunnel

D. Session

C. Tunnel

20
New cards

Which firewall tracks active TCP connections?

A. Stateless

B. Packet filter

C. Application gateway

D. Stateful

D. Stateful

21
New cards

Why are message digests signed instead of full messages?

They are smaller and faster while still ensuring integrity.

22
New cards

Why does TLS use multiple keys?

To separate encryption and authentication for better security.

23
New cards

Why is a CA (Certificate Authority) needed?

To bind a public key to a real identity and prevent MITM attacks.

24
New cards

Why is 0-RTT TLS vulnerable to replay attacks?

Early data can be reused by attackers.

25
New cards

Why is IPsec connection-oriented?

It relies on stateful Security Associations (SAs).

26
New cards

An attacker reuses a captured login message. What attack? How to stop it?

Replay attack; prevent using nonces or sequence numbers.

27
New cards

Alice signs a message and Bob verifies it. What is guaranteed?

Authentication, integrity, and non-repudiation.

28
New cards

Why does TLS switch to symmetric encryption after the handshake?

Symmetric encryption is faster for bulk data.

29
New cards

What IPsec field prevents replay attacks?

Sequence number.

30
New cards

Why can't a stateless firewall detect fake TCPACK packets?

It does not track connection state.