CSIA 300 Final Prep Exam Questions
with Correct Answers
Which of the following statements pertaining to block ciphers is incorrect? - Answer-
Plain text is encrypted with a public key and decrypted with a private key.
Cryptography does not help in: - Answer-Detecting fraudulent disclosure
Where is firmware primarily stored on a computer system? - Answer-Read-only memory
What size is an MD5 message digest (hash)? - Answer-128 bits
Which of the following mail standards relies on a "Web of Trust" ? - Answer-Pretty Good
Privacy (PGP
How many bits is the effective length of the key of the Data Encryption Standard
Algorithm? - Answer-56
A demilitarized zone on a computer network exists for all of the following reasons
except: - Answer-Reduces the load on firewalls
The primary advantage of the use of a central management console for anti-virus is: -
Answer-Consolidation of reporting and centralized signature file distribution
Which attack is primarily based on the fragmentation implementation of IP and uses
large ICMP packets? - Answer-Ping of Death
TCP and UDP use port numbers of what length? - Answer-16 bits
A screening router can perform packet filtering based on which type of data? - Answer-
Source and destination addresses and port numbers.
In the OSI model, at what level are TCP and UDP provided? - Answer-Transport
A workstation that can remotely access the organization's network through a VPN and
access the local LAN where the workstation is connected, all through the same physical
network connection, is using: - Answer-Split tunneling
The purpose of a password policy that locks an account after five unsuccessful login
attempts is: - Answer-To prevent an intruder from carrying out a dictionary attack
against a password
with Correct Answers
Which of the following statements pertaining to block ciphers is incorrect? - Answer-
Plain text is encrypted with a public key and decrypted with a private key.
Cryptography does not help in: - Answer-Detecting fraudulent disclosure
Where is firmware primarily stored on a computer system? - Answer-Read-only memory
What size is an MD5 message digest (hash)? - Answer-128 bits
Which of the following mail standards relies on a "Web of Trust" ? - Answer-Pretty Good
Privacy (PGP
How many bits is the effective length of the key of the Data Encryption Standard
Algorithm? - Answer-56
A demilitarized zone on a computer network exists for all of the following reasons
except: - Answer-Reduces the load on firewalls
The primary advantage of the use of a central management console for anti-virus is: -
Answer-Consolidation of reporting and centralized signature file distribution
Which attack is primarily based on the fragmentation implementation of IP and uses
large ICMP packets? - Answer-Ping of Death
TCP and UDP use port numbers of what length? - Answer-16 bits
A screening router can perform packet filtering based on which type of data? - Answer-
Source and destination addresses and port numbers.
In the OSI model, at what level are TCP and UDP provided? - Answer-Transport
A workstation that can remotely access the organization's network through a VPN and
access the local LAN where the workstation is connected, all through the same physical
network connection, is using: - Answer-Split tunneling
The purpose of a password policy that locks an account after five unsuccessful login
attempts is: - Answer-To prevent an intruder from carrying out a dictionary attack
against a password