What is the major weakness inherent in public key


1. Which of the following describes a type of single sign-on system?
a. Rule based access control
b. Kerberos
c. Role based access control
d. Discretionary access control

2. Which of the following provides integrity and authentication?
a. Digital signature
b. Kerberos
c. Steganography
d. Hashing

3. Which of the following cipher algorithms uses the longest key?
a. One-time pad cipher
b. Caesar cipher
c. Vigenere cipher
d. Columnar transposition Cipher

4. ________is designed to exploit the dynamic nature of Web application pages.
a. Web spoofing
b. SQL injection
c. out of bound attack
d. email spoofing

5. What is the major weakness inherent in public key cryptography systems?
a. Slow speed
b. Difficulty of key exchange
c. Lack of scalability
d. Lack of nonrepudiation capability

6. Why is spam so difficult to stop?
a. Filters are ineffective at blocking inbound messages.
b. The source address is usually spoofed.
c. It is an attack requiring little expertise.
d. Spam can cause denial-of-service attacks.

7. Your organization is looking for an IP layer VPN solution. You believe that IPSec would be the best option. Which of the following mode would you configure IPSec to obtain the greatest amount of security?
a. Tunnel mode
b. Transport mode
c. Transfer mode
d. Channel mode

8. Which of the following is not a benefit of NAT?
a. Hiding the internal IP addressing scheme
b. Sharing a few public Internet addresses with a large number of internal clients
c. Using the private IP addresses from RFC 1918 on an internal network
d. Filtering network traffic to prevent brute-force attack

Solution Preview :

Prepared by a verified Expert
Computer Engineering: What is the major weakness inherent in public key
Reference No:- TGS02517875

Now Priced at $10 (50% Discount)

Recommended (93%)

Rated (4.5/5)