Which IPSEC protocol provides confidentiality and integrity? - correct answer
✔ESP
Which of these protocols uses x.509 certificates? - correct answer ✔S/MIME
Where are bastion hosts placed? - correct answer ✔DMZ
Which level of the OSI model is concerned with MAC addresses? - correct
answer ✔Data Link
Using zero compression, what would be the IPV6 address for
fe80:0000:0000:0000)0c02:0023:5001:8760 be? - correct answer
✔fe80::c02:23:5001:8760
what is the name of the browser protocol that the client uses to contact the CA
directly and ask about the revocations status of a particular certificate? -
correct answer ✔CRL
Which one of these is not a hashing algorithm? - correct answer ✔ECC
Which of these algorithms is an asymmetric algorithm that is only used for key
exchange/key agreement? - correct answer ✔Diffie Helmen
Which of these symmetric algorithms was not a finalist for the advance
encryption standard? - correct answer ✔Blowfish
, you have a cipher text of 100011001 and a key string of 10101010 what would
your plain text be using XOR? - correct answer ✔00110011
Which of these block cipher modes is designed to operate like a stream
cipher? - correct answer ✔Cipher feedback
Obviously encrypted messages can draw unwanted attention. what is one way
to present an encrypted message without showcasing its existence? - correct
answer ✔Stenography
XML queries used an xml injection attack are different from sql queries but the
principles and exploits are similar. True or False? - correct answer ✔True
A secure web application will both sanitize and validate input which in term will
help protect it against ? - correct answer ✔SQL injection, Cross Site
Scripting, Cross Site Request Forgeries, All of the above
Another name for race condition is? - correct answer ✔Time of check to time
of use
Which of these application exploits is an effective denial of service attack? -
correct answer ✔Resource exhaustion
Bluejacking is an attack against ? - correct answer ✔blue tooth device
Which of the following wireless security protocols utilizes the RC4 streaming
encryption algorithm and has serious vulnerabilities in its initialization vector
setup process? - correct answer ✔WEP