Content Frame
Note for screen reader users: There is text between the form elements on this page. To be sure that you do not miss any text, use item by item navigation methods, rather than tabbing from form element to form element.
Skip Breadcrumb Navigation
Home  arrow Student Resources  arrow Self-Assessment Quizzes  arrow Chapter 8 T/F

Chapter 8 T/F



This activity contains 10 questions.

Question 1.
In IP spoofing, the attacker interchanges the source and destination addresses in the sender's IP datagram.

   
 
End of Question 1


Question 2.
Nonce's are often used to combat the playback attack.

   
 
End of Question 2


Question 3.
Two parties often use public-key encryption to agree on a shared one-time symmetric session key.

   
 
End of Question 3


Question 4.
For public-key certification, PGP uses certification authorities.

   
 
End of Question 4


Question 5.
The AH protocol provides secrecy at the network layer.

   
 
End of Question 5


Question 6.
When using the AH protocol, the type of payload (TCP, UDP, ICMP, etc.) is specified in the AH header.

   
 
End of Question 6


Question 7.
With the ESP protocol, an intruder cannot determine the type of payload (TCP, UDP, ICMP, etc.) because the payload type is encrypted.

   
 
End of Question 7


Question 8.
When creating a MAC (Message Authentication Code), public-key encryption is used?

   
 
End of Question 8


Question 9.
When using a MAC, the communicating entities need to have a shared secret key.

   
 
End of Question 9


Question 10.
An SSL record is always contained within a single TCP segment.

   
 
End of Question 10





Pearson Copyright © 1995 - 2010 Pearson Education . All rights reserved. Pearson Addison Wesley is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page