[Skip Breadcrumb Navigation]
:
[Skip Breadcrumb Navigation]
Home
Student Resources
Self-Assessment Quizzes
Chapter 8 T/F
Chapter 8 T/F
This activity contains 10 questions.
In IP spoofing, the attacker interchanges the source and destination addresses in the sender's IP datagram.
True
False
Nonce's are often used to combat the playback attack.
True
False
Two parties often use public-key encryption to agree on a shared one-time symmetric session key.
True
False
For public-key certification, PGP uses certification authorities.
True
False
The AH protocol provides secrecy at the network layer.
True
False
When using the AH protocol, the type of payload (TCP, UDP, ICMP, etc.) is specified in the AH header.
True
False
With the ESP protocol, an intruder cannot determine the type of payload (TCP, UDP, ICMP, etc.) because the payload type is encrypted.
True
False
When creating a MAC (Message Authentication Code), public-key encryption is used?
True
False
When using a MAC, the communicating entities need to have a shared secret key.
True
False
An SSL record is always contained within a single TCP segment.
True
False
The Submit Answers for Grading feature requires scripting to function. Your browser either does not support scripting or you have turned scripting off.
So, the Submit Answers for Grading button below will not work.
The following Submit Answers for Grading button is provided in its place and will clear your answers:
The Clear Answers and Start Over feature requires scripting to function. Your browser either does not support scripting or you have turned scripting off.
So, the Clear Answers and Start Over button below will not work.
The following Clear Answers button is provided in its place and will clear your answers:
Copyright © 1995 - 2012
Pearson Education
. All rights reserved. Pearson Addison Wesley is an imprint of
Pearson
.
Legal Notice
|
Privacy Policy
|
Permissions
[Return to the Top of this Page]
: [Return to the Top of this Page]