Question 1: The security protocol used in HTTPS is _____________.
A. IPSec
B. DNSSEC
C. TLS
D. SSH
Solution: TLS
Question 2: The SSH protocol was initially developed for the purpose of:
Select one:
A. Remote login
B. File transfer
C. Remote program execution
D. Sending email
Solution: Remote login
Question 3: Given below are security services offered by the Authentication Header (AH) protocol in IPSec EXCEPT:
Select one:
A. Integrity
B. Authentication
C. Confidentiality
D. Access control
Solution: Confidentiality
Question 4: Which of the following email security threats can be prevented using DNSSEC?
A. Email sent is sniffed during transmission
B. Email sent is transmitted to the attacker’s server
C. Email sending address is spoofed
D. Email cannot be sent due to DoS attack
Solution: Email sent is transmitted to the attacker’s server
Question 5: Which of the following is NOT one of the reasons why TLS has become the most popular network security protocol?
A. TLS is independent of operating system platform
B. TLS is used to secure the Web application, which is the most used network application
C. TLS only needs to be configured once, and all network applications running on the host would then be protected
D. From a user point of view, using TLS is as easy as downloading and using a client application that implements TLS
Solution: TLS only needs to be configured once, and all network applications running on the host would then be protected
Question 6: Given below are among the security concerns to an Internet user EXCEPT:
A. You may not be communicating with the person that you think you are communicating with
B. An attacker may sniff your packets
C. Your Internet connection may not be fast enough that an attacker may capture your slow moving packet
D. Malware may be secretly installed on your computer
Solution: Your Internet connection may not be fast enough that an attacker may capture your slow moving packet
Question 7: Which of the following email security mechanisms can be configured by an email user?
A. DKIM
B. SPF
C. DANE
D. PGP
Solution: PGP
Question 8: Which of the following is an advantage of using IPsec (which is network-layer security protocol) as compared to using TLS (which is a transport-layer security protocol)?
A. Configuration of IPsec is easier compared to TLS
B. IPsec uses more secure cryptographic protocols compared to TLS
C. Once IPsec is configured, communication will all Internet hosts will be protected
D. Once IPsec is configured, data transfer of all network applications with the specified receiving host will be protected
Solution: Once IPsec is configured, data transfer of all network applications with the specified receiving host will be protected
Question 9: DNSSEC ensures the following security objective(s):
A. Confidentiality, integrity and authenticity
B. Integrity and authenticity
C. Confidentiality and integrity
D. Authenticity and confidentiality
Solution: Integrity and authenticity
Question 10: Which of the following is NOT true about the use of explicit TLS in email application?
A. Before secure connection is achieved, port 25 is used by SMTP client to connect to SMTP server
B. When explicit TLS is used, email message sent between an email client and an email server is encrypted
C. It requires an insecure SMTP connection to be upgraded to a secure connection using the STARTTLS command
D. Explicit TLS can be used not only by SMTP, but also by IMAP and POP3
Solution: Before secure connection is achieved, port 25 is used by SMTP client to connect to SMTP server
Question 11: The use of https prevents the following attacks from being conducted EXCEPT:
A. Attacker replacing the Web server with a malicious server
B. Attacker sniffing the username and password transmitted by Web browser
C. Attacker stealing the HTTP cookie transmitted in an HTTP request message
D. Attacker spoofing the IP address of the host on which the Web browser is running
Solution: Attacker spoofing the IP address of the host on which the Web browser is running
Question 12: What is contained in an HTTP cookie?
A. A string that specifies the type of Web browser used by the user
B. The username and password of the Web user in cleartext
C. A string that identifies the Web user
D. The username and password of the Web user in encrypted form
Solution: A string that identifies the Web user
Question 13: Which of the following is NOT a TLS record protocol payload?
A. Hello protocol
B. Change cipher spec protocol
C. Alert protocol
D. Application data
Solution: Hello protocol
Question 14: Which of the following is one of the differences between S/MIME and OpenPGP?
A. S/MIME uses certificates issued by Certificate Authority while OpenPGP generates their own public and private keys
B. S/MIME provides authenticity and confidentiality, while OpenPGP only provides confidentiality
C. S/MIME does not include the sender’s public key with the message, while OpenPGP includes the sender’s public key with the message
D. OpenPGP provides authenticity and confidentiality, while S/MIME only provides authenticity
Solution: S/MIME uses certificates issued by Certificate Authority while OpenPGP generates their own public and private keys
Question 15: The feature of SSH that enables any insecure TCP connection to be converted to a secure SSH connection is called ____________.
A. Remote login
B. Channel conversion
C. Securing channel
D. Port forwarding
Solution: Port forwarding
Question 16: Which of the following fields is not encrypted in Encapsulating Security Payload (ESP) transport mode?
A. ESP trailer
B. IP header
C. TCP header
D. TCP data
Solution: IP header
Question 17: The following are true about private IP addresses EXCEPT:
A. A private IP address used in an organization may also be used in another organization
B. Accessing the Internet requires the use of Network Address Translation (NAT)
C. The address block 172.16.0.0/12 belongs to one of the private IP address blocks
D. They can be directly accessed from the Internet
Solution: They can be directly accessed from the Internet
Question 18: Which of the following is NOT true about DNS-based Authentication of Named Entities (DANE)?
A. It solves security issues related to the use of STARTTLS
B. It encrypts the email data regardless of whether the email server supports TLS or not
C. It ensures the authenticity of an email server without verifying the server's digital certificate with a Certificate Authority (CA)
D. It makes use of a DNS record called TLSA
Solution: It encrypts the email data regardless of whether the email server supports TLS or not
Question 19: In S/MIME, what is the use of the receiver's private key?
A. To encrypt the message digest
B. To decrypt the message content
C. To decrypt the message digest
D. To decrypt the secret key
E. To encrypt the message content
F. To encrypt the secret key
Solution: To decrypt the secret key
Question 20: In S/MIME, what is the use of the receiver's public key?
A. To decrypt the secret key
B. To decrypt the message content
C. To encrypt the message digest
D. To encrypt the message content
E. To decrypt the message digest
F. To encrypt the secret key
Solution: To encrypt the secret key
Question 21: Differentiate between active and passive security attacks.
Solution: Passive security attack: In this attack the intruder or attacker just sniffs the information, he does not modify or change it. He only listens to the traffic and compromises the confidentiality of the data
Active Security attack: In this the attacker first listens to the information and then changes it and then forwards it to the receiving party which means the confidentiality and integrity both compromises.
Question 22: Both Sender Policy Framework (SPF) and DomainKeys Identified Email (DKIM) are used to prevent the email sending address from being spoofed. However, the techniques used are different. Differentiate between the techniques used by these two mechanisms.
Solution: SPF makes use of a TXT DNS resource log in which the sending domain identifies all of the domain's senders. To authenticate the sender, the receiver will query a TXT DNS resource record about the sender's address domain and IP address. DKIM, on the other hand, uses a digital signature. The sender's private key will be used to sign the message. The receiver would then search the public key to see if the message is from the legitimate sender
Question 23:For each of the following situations, identify the most suitable IPSec protocol (AH or ESP) and mode (transport or tunneling) to be used.
(a) A staff working from home during COVID-19 pandemic, and would like to establish a Virtual Private Network (VPN) to his corporate network.
(b) A system administrator configuring two servers that always send data to each other. The system administrator needs to ensure that the data transmitted between the two servers cannot be read by an attacker.
(c) A network administrator configuring firewall between two office branches. The data transmitted are all TLS data. The main aim of using IPSec would be to ensure the authenticity of the two firewalls.
Solution: (a) Ipsec protocol (ESP) and tunneling mode
(b) Ipsec ESP transport modec)AH tunnel mode