Complete Final Assessment (Qns & Ans)
2025
Question 1 (Multiple Choice)
Case:
A mid-sized enterprise experienced a breach that exploited an
unfiltered open port in its demilitarized zone (DMZ). The security
team is now evaluating a more robust firewall solution to inspect
not only IP headers but also the payload of packets.
Question:
Which type of firewall is most appropriate for this scenario?
A. Stateless packet-filtering firewall
B. Circuit-level gateway firewall
©2025
,C. Deep packet inspection (DPI) firewall
D. Proxy firewall
Correct ANS: C. Deep packet inspection (DPI) firewall
Rationale:
Deep packet inspection firewalls analyze both header information
and packet payloads, providing the ability to detect and block
sophisticated attacks that may bypass simpler filtering
mechanisms. This layer of analysis is critical for identifying
threats that exploit application-layer vulnerabilities.
---
Question 2 (Fill in the Blank)
Case:
In order to secure remote communications, a network
administrator implements a key exchange protocol that leverages
elliptic curve cryptography for efficiency and strong security.
Statement:
©2025
,A commonly used key exchange mechanism based on elliptic
curve cryptography is known as ______ .
Correct ANS: Elliptic Curve Diffie-Hellman (ECDH)
Rationale:
ECDH is a modern key exchange algorithm that uses elliptic
curves to enable two parties to establish a shared secret over an
insecure channel. Its efficiency with smaller key sizes makes it
attractive for secure communications in resource-constrained
environments.
---
Question 3 (True/False)
Case:
A network security specialist is reviewing encryption protocols
used in securing data transmissions. One protocol under
evaluation is the Advanced Encryption Standard (AES), which
uses symmetric key cryptography.
Statement:
©2025
, AES is a symmetric encryption algorithm that employs multiple
rounds of substitution, permutation, mixing, and key addition on
fixed-size blocks and is considered secure for protecting classified
data.
Correct ANS: True
Rationale:
AES uses a well-established symmetric key algorithm that,
depending on the key length (128, 192, or 256 bits), offers strong
protection. Its structured rounds and operations have withstood
extensive cryptanalysis over the years, making it the gold standard
for secure data encryption.
---
Question 4 (Multiple Response)
Case:
A university network uses multiple security layers to protect its
research data. This includes employing firewalls, intrusion
detection systems (IDS), and VPN solutions for secure remote
access.
©2025