Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 1: COMPUTER AND NETWORK SECURITY CONCEPTS
TRUE OR FALSE
1. T
2. F
3. T
4. T
5. F
6. T
7. T
8. F
9. T
10. F
11. T
12. T
13. T
14. F
15. T
MULTIPLE CHOICE
1. C
2. B
3. B
4. A
5. B
6. A
7. B
8. A
9. B
10. D
11. B
12. D
13. A
14. C
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. security mechanism
2. active
3. computer security
4. availability
5. encipherment
6. Family Educational Rights and Privacy Act (FERPA)
7. integrity
8. passive
9. attack tree
10. data origin
11. access control
12. Nonrepudiation
13. software
14. attack
15. Notarization
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 2: INTRODUCTION TO NUMBER THEORY
TRUE OR FALSE
1. T
2. F
3. F
4. T
5. T
6. T
7. F
8. T
9. T
10. T
11. T
12. F
13. T
14. F
15. F
MULTIPLE CHOICE
1. A
2. A
3. A
4. C
5. C
6. D
7. B
8. B
9. C
10. A
11. B
12. A
13. D
14. C
15. A
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. residue
2. Euclidean
3. modulus
4. Euler’s
5. Fermat’s
6. relatively prime
7. Euler’s totient
8. Chinese Remainder
9. prime
10. Diffie-Hellman key exchange
11. logarithm
12. one (1)
13. prime
14. AKS
15. Congruences
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 3: CLASSICAL ENCRYPTION TECHNIQUES
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. F
6. T
7. F
8. T
9. F
10. T
11. T
12. T
13. F
14. T
15. F
MULTIPLE CHOICE
1. B
2. B
3. B
4. A
5. A
6. C
7. B
8. D
9. B
10. B
11. A
12. C
13. C
14. A
15. A
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. Symmetric
2. Steganography
3. computationally secure
4. brute-force
5. the number of keys used
6. transposition
7. Vigenère
8. block
9. unconditionally
10. Caesar
11. Playfair
12. one-time pad
13. rail fence
14. Data Encryption Standard (DES)
15. rotor machines
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 4: BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD
TRUE OR FALSE
1. F
2. T
3. F
4. T
5. T
6. F
7. F
8. T
9. T
10. T
11. F
12. T
13. F
14. T
15. F
MULTIPLE CHOICE
1. A
2. A
3. D
4. B
5. D
6. A
7. D
8. D
9. B
10. D
11. C
12. A
13. C
14. A
15. C
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. block cipher
2. Confusion
3. Feistel
4. diffusion
5. guaranteed avalanche (GA)
6. diffusion
7. Data Encryption Standard (DES)
8. avalanche
9. key size
10. timing
11. bit independence
12. Feistel
13. the number of rounds
14. strict avalanche
15. triple
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 5: FINITE FIELDS
TRUE OR FALSE
1. T
2. F
3. F
4. T
5. F
6. T
7. F
8. T
9. F
10. T
11. F
12. T
13. T
14. F
15. T
MULTIPLE CHOICE
1. D
2. A
3. A
4. B
5. A
6. A
7. C
8. B
9. A
10. C
11. B
12. D
13. D
14. C
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. residue
2. Euclidean
3. modulus
4. monic
5. integral
6. Advanced Encryption Standard (AES)
7. integral
8. Galois
9. prime
10. constant
11. irreducible
12. greatest common divisor
13. prime
14. generator
15. root
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 6: ADVANCED ENCRYPTION STANDARD
TRUE OR FALSE
1. F
2. T
3. F
4. T
5. T
6. T
7. F
8. T
9. F
10. T
11. F
12. T
13. T
14. F
15. T
MULTIPLE CHOICE
1. D
2. A
3. B
4. C
5. A
6. D
7. B
8. C
9. B
10. B
11. A
12. B
13. A
14. C
15. A
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. Advanced Encryption Standard (AES)
2. byte substitution
3. Rijndael
4. key length
5. substitutions
6. MixColumns
7. SubBytes
8. MixColumns
9. shift row
10. 44
11. AddRoundKey
12. InvShiftRows
13. 32-bit
14. prime number
15. irreducible
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 7: BLOCK CIPHER OPERATION
TRUE OR FALSE
1. F
2. T
3. T
4. F
5. F
6. T
7. F
8. F
9. T
10. F
11. T
12. T
13. F
14. T
15. T
MULTIPLE CHOICE
1. B
2. D
3. A
4. D
5. B
6. C
7. C
8. B
9. D
10. C
11. B
12. C
13. B
14. D
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. Multiple encryption
2. electronic codebook mode (ECB)
3. mode of operation
4. output feedback mode (OFB)
5. triple DES
6. Cipher Block Chaining (CBC)
7. electronic codebook
8. format-preserving encryption (FPE)
9. Counter (CTR)
10. Cipher Feedback (CFB)
11. nonce
12. stream
13. Counter
14. ciphertext-stealing
15. P1619
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 8: RANDOM BIT GENERATION AND STREAM CIPHERS
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. T
6. F
7. T
8. F
9. T
10. T
11. T
12. F
13. T
14. F
15. T
MULTIPLE CHOICE
1. C
2. A
3. B
4. D
5. A
6. A
7. A
8. D
9. B
10. B
11. D
12. B
13. A
14. B
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. stream cipher
2. pseudorandom function (PRF)
3. independence
4. RC4
5. randomness
6. pseudorandom
7. entropy source
8. pseudorandom number generator (PRNG)
9. runs
10. backward
11. Purpose-built
12. keystream
13. RC4
14. Linux
15. prime
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 9: PUBLIC-KEY CRYPTOGRAPHY AND RSA
TRUE OR FALSE
1. F
2. F
3. T
4. F
5. T
6. F
7. T
8. T
9. F
10. T
11. T
12. F
13. T
14. T
15. F
MULTIPLE CHOICE
1. A
2. B
3. A
4. C
5. C
6. B
7. A
8. B
9. C
10. A
11. B
12. C
13. C
14. B
15. A
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. Asymmetric
2. key exchange
3. ciphertext
4. RSA
5. symmetric
6. Public Key Certificate
7. Public Key Infrastructure (PKI)
8. ciphertext
9. one-way function
10. digital signature
11. RSA
12. Euclid
13. timing attacks
14. chosen ciphertext attack (CCA)
15. optimal asymmetric encryption padding (OAEP)
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 10: OTHER PUBLIC-KEY CRYPTOSYSTEMS
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. F
6. T
7. F
8. T
9. F
10. T
11. T
12. F
13. T
14. F
15. T
MULTIPLE CHOICE
1. C
2. A
3. D
4. D
5. D
6. B
7. D
8. D
9. A
10. B
11. C
12. C
13. B
14. B
15. A
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. digital signature
2. Diffie-Hellman key exchange
3. public-key
4. elliptic curve cryptography (ECC)
5. abelian group
6. binary curves
7. prime curve
8. finite field
9. modular exponentiation
10. elliptic curves
11. q
12. Pollard rho
13. pseudorandom number
14. Micali-Schnorr
15. strength
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 11: CRYPTOGRAPHIC HASH FUNCTIONS
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. T
6. F
7. T
8. F
9. T
10. F
11. T
12. T
13. F
14. T
15. T
MULTIPLE CHOICE
1. A
2. C
3. D
4. A
5. D
6. A
7. D
8. D
9. C
10. B
11. C
12. D
13. B
14. D
15. C
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. symmetric block cipher
2. cryptanalysis
3. second preimage
4. cryptographic
5. Secure Hash Algorithm (SHA)
6. message digest
7. preimage resistant
8. collision resistant
9. brute-force
10. 2m/2
11. compression
12. MD5
13. cost
14. keyed
15. digital signature
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 12: MESSAGE AUTHENTICATION CODES
TRUE OR FALSE
1. T
2. F
3. T
4. F
5. T
6. F
7. T
8. T
9. F
10. T
11. F
12. T
13. F
14. T
15. T
MULTIPLE CHOICE
1. C
2. C
3. B
4. B
5. D
6. C
7. D
8. B
9. B
10. A
11. D
12. C
13. C
14. C
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. message authentication
2. traffic analysis
3. message authentication code (MAC)
4. fixed length
5. sequence modification
6. message encryption
7. cryptographic checksum
8. bit length
9. cryptanalysis
10. data authentication
11. Authenticated encryption (AE)
12. Wired Equivalent Privacy (WEP)
13. Counter with Cipher Block Chaining-Message Authentication Code (CCM)
14. pseudorandom number generators (PRNGs)
15. MAC
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 13: DIGITAL SIGNATURES
TRUE OR FALSE
1. F
2. T
3. F
4. T
5. F
6. F
7. T
8. F
9. T
10. F
11. T
12. F
13. T
14. T
15. T
MULTIPLE CHOICE
1. D
2. D
3. B
4. A
5. A
6. D
7. A
8. A
9. A
10. D
11. C
12. A
13. D
14. A
15. D
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. digital signature
2. encoded message (EM)
3. universal forgery
4. be verifiable by third parties
5. Digital Signature Algorithm (DSA)
6. generic chosen message
7. DSA
8. direct digital signature
9. ElGamal
10. Schnorr
11. 2n-bit integer
12. RSA
13. digital signature algorithm (DSA)
14. elliptic curve
15. timestamp
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 14: KEY MANAGEMENT AND DISTRIBUTION
TRUE OR FALSE
1. T
2. F
3. T
4. F
5. T
6. T
7. F
8. T
9. F
10. T
11. F
12. T
13. T
14. T
15. F
MULTIPLE CHOICE
1. B
2. C
3. D
4. A
5. B
6. B
7. A
8. A
9. C
10. C
11. B
12. C
13. C
14. B
15. C
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. Key distribution
2. public-key infrastructure (PKI)
3. X.509
4. public key
5. application
6. key distribution
7. master
8. nonce
9. man-in-the-middle
10. public-key authority
11. certificate
12. X.509
13. reverse certificates
14. Registration
15. repository
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 15: USER AUTHENTICATION PROTOCOLS
TRUE OR FALSE
1. T
2. F
3. F
4. T
5. T
6. F
7. T
8. T
9. T
10. F
11. F
12. T
13. T
14. F
15. F
MULTIPLE CHOICE
1. A
2. C
3. D
4. A
5. B
6. C
7. B
8. B
9. A
10. A
11. C
12. B
13. B
14. A
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. Mutual authentication
2. Kerberos
3. does
4. ticket
5. verification
6. Identity management
7. transparent
8. token
9. key distribution center (KDC)
10. suppress-replay
11. Kerberos
12. authentication server (AS)
13. ticket-granting server (TGS)
14. propagating cipher block chaining (PCBC)
15. federated identity management
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 16: NETWORK ACCESS CONTROL AND CLOUD SECURITY
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. T
6. T
7. F
8. T
9. F
10. T
11. T
12. T
13. T
14. F
15. T
MULTIPLE CHOICE
1. C
2. A
3. B
4. D
5. A
6. C
7. B
8. B
9. A
10. C
11. A
12. D
13. C
14. A
15. D
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. Network access server (NAS)
2. Enforcement
3. firewall
4. authentication server
5. supplicant
6. Cloud computing
7. infrastructure
8. hybrid cloud
9. cloud carrier
10. Identity and access management (IAM)
11. Security assessments
12. EAP-TLS
13. EAP-GPSK
14. EAP authenticator
15. Security as a service (SecaaS)
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 17: TRANSPORT-LEVEL SECURITY
TRUE OR FALSE
1. T
2. F
3. T
4. F
5. T
6. T
7. F
8. T
9. F
10. T
11. F
12. F
13. T
14. T
15. T
MULTIPLE CHOICE
1. D
2. B
3. A
4. B
5. D
6. A
7. B
8. B
9. A
10. B
11. A
12. A
13. C
14. D
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. TLSv1.3
2. Handshake
3. Passive
4. message integrity
5. Record Protocol
6. HTTPS
7. connection
8. SSH
9. Alert Protocol
10. Ephemeral Diffie-Hellman
11. private key
12. remote forwarding
13. CipherSpecs
14. Pseudorandom Function (PRF)
15. Local forwarding
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 18: WIRELESS NETWORK SECURITY
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. T
6. T
7. F
8. F
9. T
10. T
11. F
12. T
13. T
14. T
15. F
MULTIPLE CHOICE
1. B
2. A
3. A
4. C
5. C
6. A
7. A
8. C
9. B
10. C
11. B
12. C
13. A
14. D
15. D
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. wireless medium
2. denial of service (DoS)
3. Distribution
4. Wireless Ethernet Compatibility Alliance (WECA)
5. coordination
6. Group Temporal Key (GTK)
7. extended service set (ESS)
8. media access control (MAC)
9. basic service set (BSS)
10. Wi-Fi Protected Access (WPA)
11. secure key delivery
12. pairwise keys
13. 4-way handshake
14. IEEE 802.1X
15. physical
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 19: ELECTRONIC MAIL SECURITY
TRUE OR FALSE
1. T
2. F
3. T
4. T
5. F
6. T
7. F
8. T
9. F
10. T
11. F
12. T
13. T
14. T
15. F
MULTIPLE CHOICE
1. A
2. D
3. A
4. D
5. A
6. B
7. B
8. B
9. B
10. C
11. D
12. D
13. B
14. B
15. D
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. Pretty Good Privacy (PGP)
2. Key Distribution
3. confidentiality
4. radix-64
5. Sender Policy Framework (SPF)
6. forensics
7. Secure/Multipurpose Internet Mail Extension (S/MIME)
8. Content-Type
9. application
10. quoted-printable
11. base64
12. DNS-Based Authentication of Named Entities (DANE)
13. Domain Name System (DNS)
14. DomainKeys Identified Mail (DKIM)
15. CompressedData
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
CHAPTER 20: IP SECURITY
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. F
9. T
10. F
11. T
12. T
13. F
14. T
15. T
MULTIPLE CHOICE
1. B
2. C
3. A
4. D
5. C
6. A
7. D
8. C
9. B
10. D
11. C
12. B
13. C
14. B
15. D
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William
Stallings
SHORT ANSWER
1. confidentiality
2. Tunnel
3. security association database (SAD)
4. encapsulating security payload
5. replay
6.
HMAC
7. Security Parameters Index (SPI)
8.
key management
9. Encapsulating Security Payload
10. IP
11.
Local IP Address
12.
security association bundle
13.
Oakley Key Determination Protocol
14. digital signatures
15.
Certificate Request
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William Stallings
Chapter 21 – Malicious Software
Answer Key
TRUE/FALSE QUESTIONS:
1. T
2. F
3. F
4. T
5. F
6. T
7. T
8. F
9. T
10. T
11. T
12. T
13. F
14. T
15. T
MULTIPLE CHOICE QUESTIONS:
1. C
2. B
3. A
4. B
5. C
6. D
7. D
8. A
9. C
10. B
11. A
12. B
13. C
14. D
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William Stallings
SHORT ANSWER QUESTIONS:
1. rootkit
2. blended attack
3. virus
4. infection mechanism
5. trigger
6. propagation
7. triggering
8. stealth
9. Mobile
10. drive-by-download
11. botnet
12. keylogger
13. anti-virus
14. polymorphic virus
15. awareness
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William Stallings
CHAPTER 22: INTRUDERS
ANSWER KEY
TRUE OR FALSE
1. T
2. F
3. T
4. F
5. T
6. T
7. T
8. F
9. T
10. F
11. T
12. T
13. F
14. T
15. F
MULTIPLE CHOICE
1. D
2. D
3. C
4. B
5. B
6. C
7. A
8. C
9. D
10. B
11. B
12. D
13. A
14. B
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William Stallings
SHORT ANSWER
1. Intrusion detection
2. Statistical anomaly
3. Clandestine user
4. Access control
5. interval timer
6. Intrusion detection
7. Native
8. Rule-based
9. honeypots
10. IETF Intrusion Detection Working Group
11. reactive password checking
12. audit
13. Counter
14. Rule-based penetration
15. Bayes' theorem
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William Stallings
CHAPTER 12: FIREWALLS
ANSWER KEY
TRUE OR FALSE
1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. F
9. T
10. F
11. T
12. F
13. T
14. T
15. F
MULTIPLE CHOICE
1. C
2. D
3. C
4. C
5. B
6. D
7. D
8. B
9. B
10. D
11. C
12. B
13. B
14. D
15. C
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William Stallings
SHORT ANSWER
1. firewall
2. behavior
3. double bastion inline
4. forward
5. source routing
6. distributed
7. application proxy
8. stateful inspection
9. circuit level gateway
10. bastion host
11. personal
12. DMZ (demilitarized zone)
13. virtual private network (VPN)
14. Host resident
15. single bastion inline
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William Stallings
Chapter 24 – Legal and Ethical Aspects
Answer Key
TRUE/FALSE QUESTIONS:
1. T
2. F
3. T
4. T
5. T
6. F
7. F
8. T
9. T
10. T
11. T
12. F
13. T
14. T
15. T
MULTIPLE CHOICE QUESTIONS:
1. A
2. B
3. A
4. C
5. C
6. D
7. D
8. A
9. C
10. B
11. B
12. D
13. A
14. C
15. B
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Cryptography and Network Security: Principles and Practice, 7th Edition, by William Stallings
SHORT ANSWER QUESTIONS:
1. Computer crime
2. Convention on Cybercrime
3. intellectual
4. trademarks
5. infringement
6. IP owner
7. plant patents
8. utility patent
9. Trademark
10. clearinghouse
11. Children’s Online Privacy Protection
12. pseudonymity
13. Ethics
14. Fair Credit Reporting Act
15. technical
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.