《山东建筑大学网络工程12级信息安全期末复习资料》由会员分享,可在线阅读,更多相关《山东建筑大学网络工程12级信息安全期末复习资料(21页珍藏版)》请在金锄头文库上搜索。
1、山东建筑大学 网络工程12级 信息安全期末复习资料1. Which of the following is a kind of passive attack? A(a) The release of message contents(b) Replay(c) Modification of messages(d) Denial of service2. Which of the following is a primary method to illegally capture user sensitive information such as user passwords on a net
2、work? C(a) Spamming(b) Spoofing (c) Sniffing (d) Smirking3. Which of the following is not an asymmetric algorithm? D(a) RSA(b)Diffie-Hellman(c) DSS(d) DES4. Triple Data Encryption Standard (DES) (three keys) is a method of encryption. What is the key size for triple DES encrypted data?D(a) 64 bits(b
3、) 128 bits(c) 160 bits(d) 168 bits5. In public key cryptography, which key does the sender use to generate a signature?(a) Recipients public key(b) Recipients private key(c) Senders public key(d) Senders private key 6. What substantiates(证实) that a users claimed identity is valid and is normally app
4、lied through a user password at time of logon? B(a) Integrity(b) Authentication(c) Identification(d) Confidentiality7. Which of the following types of malicious code is often not parasitic(寄生虫)?B(a)Virus病毒(b)Trap door(c)Trojan Horse木马(d)Worm蠕虫8. The technique that each plaintext block is XORed with
5、the previous ciphertext block before being encrypted is called :B P50(a) Electronic Codebook(b) Cipher Block Chaining(c) Cipher Feedback(d) Round Function9. Proxy server is: B(a) Packet filter (b) Application-Level gateway(c) Circuit gateway(d) Stateful Inspection Firewalls10. Which approach is an a
6、pplication-specific security services that embedded within the particular application? B(a) IPSec(b) SSL(c) SET(d) TLSA _ layer security protocol provides end-to-end securityservices for applications. DA) data linkB) networkC) transportD) none of the above_ is actually an IETF version of _CA) TLS; T
7、SSB) SSL; TLSC) TLS; SSLD) SSL; SLTA SYN flood is an example of what type of attack? BA) Malicious codeB) Denial-of-serviceC) Man-in-the-middleD) SpoofingAn attack in which the attacker simply listens for all traffic being transmitted across a network, in the hope of viewing something such as a user
8、 IDand password combination, is known as: CA) A man-in-the-middle attackB) A denial-of-service attackC) A sniffing attackD) A backdoor attackIn what type of attack does an attacker resend the series of commands and codes used in a financial transaction to cause the transaction to beconducted multipl
9、e times?A) SpoofingB) Man-in-the-middleC) ReplayD) BackdoorA piece of malicious code that must attach itself to another file to replicate itself is known as:A) A wormB) A virusC) A logic bombD) A Trojan9 A piece of malicious code that appears to be designed to do one thing (and may in fact do that t
10、hing) but that hides some other payload (oftenmalicious) is known as:A) A wormB) A virusC) A logic bombD) A TrojanMalicious code that is set to execute its payload on a specific date or at a specific time is known as:A) A logic bombB) A Trojan horseC) A virusD) A time bombWhen a message is sent, no
11、matter what its format, why do we care about its integrity?A) To ensure proper formattingB) To show that the encryption keys are undamagedC) To show that the message has not been edited in transitD) To show that no one has viewed the messageIf a message has a hash, how does the hash protect the mess
12、age in transit?A) If the message is edited, the hash will no longer match.B) Hashing destroys the message so that it cannot be read by anyone.C) Hashing encrypts the message so that only the private key holder can read it.D) The hash makes the message uneditable.What is the biggest drawback to symme
13、tric encryption?A) It is too easily broken.B) It is too slow to be easily used on mobile devices.C) It requires a key to be securely shared.D) It is available only on UNIX.What is Diffie-Hellman most commonly used for?A) Symmetric encryption key exchangeB) Signing digital contractsC) Secure e-mailD)
14、 Storing encrypted passwordsWhat is public key cryptography a more common name for?A) Asymmetric encryptionB) SHAC) An algorithm that is no longer secure against cryptanalysisD) AuthenticationHow many bits are in a block of the SHA-1 algorithm?A) 128B) 64C) 512D) 1024In what type of attack does an a
15、ttacker resend the series of commands and codes used in a financial transaction to cause the transaction to be conducted multiple times?A) Spoofing B) Man-in-the-middleC) Replay D) BackdoorA piece of malicious code that must attach itself to another file to replicate itself is known as:A) A worm B) A virusC) A logic bomb D) A TrojanWhen a message is sent, no matter what its format, why do we care about its integrity?A)