Part 1: True or False Questions.
(10 questions at 1 point each)
T
F
A hash algorithm uses a one-way cryptographic function,
whereas both secret-key and public-key systems use two-way
(i.e., reversible) cryptographic functions.
Answer: _____
T
F
The strongest 3DES (Triple DES) requires the use of three
independent keys.
Answer: _____
T
F
When it comes to the ethics of a particular situation, there is
only one right answer.
Answer: _____
T
F
Packet filters protect networks by blocking packets based on the
packets’ contents.
Answer: _____
T
F
The biggest advantage of
public-key
cryptography over
secret-key
cryptography is in the area of key management/key
distribution.
Answer: _____
T
F
In terms of privacy laws, companies have no advantage over the
government in terms of the types of data that a company can
collect.
Answer: _____
T
F
Intrusion Detection Systems (IDS) provide no protection from
internal threats.
Answer: _____
T
F
A Denial-of-Service attack does not require the attacker to
penetrate the target's security defenses.
Answer: _____
T
F
AES uses the Rijndael algorithm.
Answer: _____
T
F
A one-time pad is a safe house used only once by an undercover
agent.
Answer: _____
Part 2: Multiple Choice Questions. Print
all
the correct answers in the blank following the question; in
some cases a fully correct answer may require more than one
lettered choice to be selected. (
Each question is worth 2 points.
There is no guarantee of partial credit for partially correct
answers.)
If person A uses AES to transmit an encrypted message to
person B, which key or keys will A have to use:
a.
A’s private key
b.
A’s public key
c.
B’s private key
d.
B’s public key
e.
None of the keys listed above
Answer(s): ____
From the perspective of
entropy
:
Plaintext will have a higher entropy than the ciphertext
The unequal frequency of characters in human languages tends
to reduce the entropy of plaintext messages in that language
Encrypted messages appear to be noise-like
Plaintext requires more transmission bandwidth than ciphertext
None of the above
Answer(s): _____
Protection of a software program that uses a unique, novel
algorithm could be legally protected by:
a.
A patent
b.
A copyright
c.
A patent and copyright
d.
Ethical standards
e.
All of the above
Answer(s): _____
Security
threats
include which of the following:
a.
Unlocked doors
b.
Disgruntled employees
c.
Hurricanes
d.
Un-patched software programs
e.
All of the above
Answer(s): _____
Denial of service attacks include:
a.
DNS poisoning
b.
Smurf attack
c.
Ping of death
d.
SYN flood
e.
All of the above
Answer(s): _____
Part 3: Short Answer Questions.
(10 questions at 5 points each)
Alan and Beatrice are both users of PKI. Explain how they use
their keys to communicate when Alan sends a private message
to Beatrice, and provides proof that he sent the message.
Answer:
Briefly describe the purpose of firewalls and how they work,
including a comparison of at least three principal types.
Answer:
What are some of the individual rights associated with
information privacy? Do expectations of privacy change
depending on the individual's environment?
If so, how?
Answer:
There are many threats associated with e-mail. List five (5) of
these threats and describe a mitigation strategy for each.
Answer:
Decipher the following using a 26-character Caesar Cipher:
EHWWHU EH GHVSLVHG IRU WRR DQALRXV
DSSUHKHQVLRQV WKDQ UXLQHG EB WRR FRQILGHQW
VHFXULWB
Answer:
For the previous question, what are three (3) cryptanalysis
techniques that could be used to crack the cipher?
Answer:
What is the difference between substitution and transposition
encryption?
Answer:
What are the similarities and differences between incident
response plans and business continuity plans?
Answer:
Give one brief example of a computer-security legal issue, and
another brief example of a computer-security ethical issue.
Answer:
Describe in your own words the importance of security
awareness training for computer users, such as employees. Give
two examples of threats that can be mitigated through greater
security awareness.
Answer:
Part 4: Essay Questions. Maximum length: two (2) pages each,
including references, double spaced.
(Two questions at 15 pts each)
One hundred years ago, Louis Brandeis and Samuel Warren
warned us that, “Numerous mechanical devices threaten to make
good the prediction that ‘what is whispered in the closet shall
be proclaimed from the housetops.’”
Cryptography is an enabling technology for self-help privacy.
Conversely, cryptography can be used to conceal criminal
conspiracies and activities, including espionage. How have
computers changed the ways in which we have to keep certain
information private? What new threats do computer systems and
networks pose to personal privacy? Conversely, what threats are
enabled or enhanced by computer systems and networks? How
does cryptography help or hinder protection of privacy and
public safety? What policies are needed and appropriate in a
networked world regarding the use of cryptography?
While sitting in the break room at work one day, Stan is talking
with his friend Joe, who is excitedly describing an idea for a
new intrusion detection system (IDS). Joe describes an elegant
new algorithm that will flawlessly detect intrusion attacks and
respond almost instantly. Stan, who is more of an entrepreneur
than inventor, quickly grasps the essence of Joe’s idea, and
decides to incorporate the idea into a commercial product,
without the knowledge or participation of Joe. In his scheme to
commercialize Joe’s idea, Stan plans to hire a programmer to
implement Joe’s algorithm, and use the software to control a
novel new hardware component. Stan would like to protect the
intellectual property of the algorithm, software, and hardware
component, but is experiencing some guilt pangs. Discuss the
legal and ethical issues of this whole situation.

More Related Content

PPT
ch01.ppt
PPT
Network Security
PPT
The Role of Security and Penetration Testers
PPT
Foot printing and Reconnaissance Techniques
PPT
Ch01
PPT
Ch01
PDF
Automatic Detection of Social Engineering Attacks Using Dialog
PDF
M017657678
ch01.ppt
Network Security
The Role of Security and Penetration Testers
Foot printing and Reconnaissance Techniques
Ch01
Ch01
Automatic Detection of Social Engineering Attacks Using Dialog
M017657678

Similar to Part 1 True or False Questions. (10 questions at 1 point each).docx (20)

PPT
CEH Hacking Overview from beginner to expert
PPT
Ethical Hacking and Network Defense
PDF
Hacking - CEH Cheat Sheet Exercises.pdf
PPTX
chapter 7.pptx
PPTX
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
DOCX
Answer each question in one to two paragraphs.Question 1 .docx
PDF
PPT
Op Sy 03 Ch 61a
PDF
Module 3 (scanning)
PDF
Puna 2015
PPT
Hacking Law Reform LAWS4305 2003
DOCX
Network security interview questions & answers
PPTX
Cybersecurity.pptx
PDF
Network security unit 1,2,3
DOCX
Unit I Q&A.docx
PDF
The Comprehensive Security Policy In The Trojan War
PDF
A01450131
DOCX
Answer each question in one to two paragraphs.Question 1
PDF
Network security
PDF
Pay attention to that man behind the curtain: Current state of Hacking Back
CEH Hacking Overview from beginner to expert
Ethical Hacking and Network Defense
Hacking - CEH Cheat Sheet Exercises.pdf
chapter 7.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
Answer each question in one to two paragraphs.Question 1 .docx
Op Sy 03 Ch 61a
Module 3 (scanning)
Puna 2015
Hacking Law Reform LAWS4305 2003
Network security interview questions & answers
Cybersecurity.pptx
Network security unit 1,2,3
Unit I Q&A.docx
The Comprehensive Security Policy In The Trojan War
A01450131
Answer each question in one to two paragraphs.Question 1
Network security
Pay attention to that man behind the curtain: Current state of Hacking Back

More from MARRY7 (20)

DOCX
Part 1.....InstructionsSelect one of the age groups disc.docx
DOCX
Part 1 – Add to Website PlanList at least three .docx
DOCX
Part 11. Why is it so important in system engineering to become .docx
DOCX
Part 1 Using the internet, search for commercial IDPS systems. What.docx
DOCX
Part 1- Create an outline of the assignment below thenPart 2-1000 .docx
DOCX
Part 1 Review QuestionsWhat is the difference between criminal la.docx
DOCX
Part 1 Review QuestionsWhat is the difference between authenticat.docx
DOCX
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docx
DOCX
Part 1 Review QuestionsWhat functions constitute a complete infor.docx
DOCX
Part 1A persons lifestyle has a significant influence on the p.docx
DOCX
Part 1 Review QuestionsWhat is the definition of information secu.docx
DOCX
Part 1 Review QuestionsWhat is a security modelWhat are the es.docx
DOCX
Part 1 Listed below are several key Supreme Court decisions that .docx
DOCX
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
DOCX
part 1 I attended an international conference on Biotechnology and .docx
DOCX
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
DOCX
Parent Involvement Plan This week you will create a Parent Involve.docx
DOCX
Parenting Practices Over GenerationsGeneration 1 Years children.docx
DOCX
ParamsThe interface must be pleasing to look at (a basic form wit.docx
DOCX
ParamsThe interface must be pleasing to look at. There must be .docx
Part 1.....InstructionsSelect one of the age groups disc.docx
Part 1 – Add to Website PlanList at least three .docx
Part 11. Why is it so important in system engineering to become .docx
Part 1 Using the internet, search for commercial IDPS systems. What.docx
Part 1- Create an outline of the assignment below thenPart 2-1000 .docx
Part 1 Review QuestionsWhat is the difference between criminal la.docx
Part 1 Review QuestionsWhat is the difference between authenticat.docx
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docx
Part 1 Review QuestionsWhat functions constitute a complete infor.docx
Part 1A persons lifestyle has a significant influence on the p.docx
Part 1 Review QuestionsWhat is the definition of information secu.docx
Part 1 Review QuestionsWhat is a security modelWhat are the es.docx
Part 1 Listed below are several key Supreme Court decisions that .docx
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
part 1 I attended an international conference on Biotechnology and .docx
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
Parent Involvement Plan This week you will create a Parent Involve.docx
Parenting Practices Over GenerationsGeneration 1 Years children.docx
ParamsThe interface must be pleasing to look at (a basic form wit.docx
ParamsThe interface must be pleasing to look at. There must be .docx

Recently uploaded (20)

PPSX
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PDF
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
PPTX
IT infrastructure and emerging technologies
PPTX
Copy of ARAL Program Primer_071725(1).pptx
PPTX
Thinking Routines and Learning Engagements.pptx
PPTX
Neurology of Systemic disease all systems
PPT
hemostasis and its significance, physiology
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PDF
African Communication Research: A review
PDF
Review of Related Literature & Studies.pdf
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
PDF
Compact First Student's Book Cambridge Official
PPTX
MMW-CHAPTER-1-final.pptx major Elementary Education
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PDF
Physical pharmaceutics two in b pharmacy
PDF
anganwadi services for the b.sc nursing and GNM
PDF
FYJC - Chemistry textbook - standard 11.
PPTX
CHROMIUM & Glucose Tolerance Factor.pptx
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
IT infrastructure and emerging technologies
Copy of ARAL Program Primer_071725(1).pptx
Thinking Routines and Learning Engagements.pptx
Neurology of Systemic disease all systems
hemostasis and its significance, physiology
4. Diagnosis and treatment planning in RPD.pptx
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
African Communication Research: A review
Review of Related Literature & Studies.pdf
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
Compact First Student's Book Cambridge Official
MMW-CHAPTER-1-final.pptx major Elementary Education
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
Physical pharmaceutics two in b pharmacy
anganwadi services for the b.sc nursing and GNM
FYJC - Chemistry textbook - standard 11.
CHROMIUM & Glucose Tolerance Factor.pptx

Part 1 True or False Questions. (10 questions at 1 point each).docx

  • 1. Part 1: True or False Questions. (10 questions at 1 point each) T F A hash algorithm uses a one-way cryptographic function, whereas both secret-key and public-key systems use two-way (i.e., reversible) cryptographic functions. Answer: _____ T F The strongest 3DES (Triple DES) requires the use of three independent keys. Answer: _____ T F When it comes to the ethics of a particular situation, there is only one right answer. Answer: _____ T F Packet filters protect networks by blocking packets based on the
  • 2. packets’ contents. Answer: _____ T F The biggest advantage of public-key cryptography over secret-key cryptography is in the area of key management/key distribution. Answer: _____ T F In terms of privacy laws, companies have no advantage over the government in terms of the types of data that a company can collect. Answer: _____ T F Intrusion Detection Systems (IDS) provide no protection from internal threats. Answer: _____
  • 3. T F A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses. Answer: _____ T F AES uses the Rijndael algorithm. Answer: _____ T F A one-time pad is a safe house used only once by an undercover agent. Answer: _____ Part 2: Multiple Choice Questions. Print all the correct answers in the blank following the question; in some cases a fully correct answer may require more than one lettered choice to be selected. ( Each question is worth 2 points. There is no guarantee of partial credit for partially correct
  • 4. answers.) If person A uses AES to transmit an encrypted message to person B, which key or keys will A have to use: a. A’s private key b. A’s public key c. B’s private key d. B’s public key e. None of the keys listed above Answer(s): ____ From the perspective of entropy : Plaintext will have a higher entropy than the ciphertext The unequal frequency of characters in human languages tends to reduce the entropy of plaintext messages in that language Encrypted messages appear to be noise-like Plaintext requires more transmission bandwidth than ciphertext None of the above Answer(s): _____ Protection of a software program that uses a unique, novel algorithm could be legally protected by:
  • 5. a. A patent b. A copyright c. A patent and copyright d. Ethical standards e. All of the above Answer(s): _____ Security threats include which of the following: a. Unlocked doors b. Disgruntled employees c. Hurricanes d. Un-patched software programs e. All of the above
  • 6. Answer(s): _____ Denial of service attacks include: a. DNS poisoning b. Smurf attack c. Ping of death d. SYN flood e. All of the above Answer(s): _____ Part 3: Short Answer Questions. (10 questions at 5 points each) Alan and Beatrice are both users of PKI. Explain how they use their keys to communicate when Alan sends a private message to Beatrice, and provides proof that he sent the message. Answer: Briefly describe the purpose of firewalls and how they work, including a comparison of at least three principal types. Answer:
  • 7. What are some of the individual rights associated with information privacy? Do expectations of privacy change depending on the individual's environment? If so, how? Answer: There are many threats associated with e-mail. List five (5) of these threats and describe a mitigation strategy for each. Answer: Decipher the following using a 26-character Caesar Cipher: EHWWHU EH GHVSLVHG IRU WRR DQALRXV DSSUHKHQVLRQV WKDQ UXLQHG EB WRR FRQILGHQW VHFXULWB Answer: For the previous question, what are three (3) cryptanalysis techniques that could be used to crack the cipher? Answer: What is the difference between substitution and transposition encryption? Answer: What are the similarities and differences between incident response plans and business continuity plans? Answer: Give one brief example of a computer-security legal issue, and another brief example of a computer-security ethical issue. Answer: Describe in your own words the importance of security awareness training for computer users, such as employees. Give
  • 8. two examples of threats that can be mitigated through greater security awareness. Answer: Part 4: Essay Questions. Maximum length: two (2) pages each, including references, double spaced. (Two questions at 15 pts each) One hundred years ago, Louis Brandeis and Samuel Warren warned us that, “Numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the housetops.’” Cryptography is an enabling technology for self-help privacy. Conversely, cryptography can be used to conceal criminal conspiracies and activities, including espionage. How have computers changed the ways in which we have to keep certain information private? What new threats do computer systems and networks pose to personal privacy? Conversely, what threats are enabled or enhanced by computer systems and networks? How does cryptography help or hinder protection of privacy and public safety? What policies are needed and appropriate in a networked world regarding the use of cryptography? While sitting in the break room at work one day, Stan is talking with his friend Joe, who is excitedly describing an idea for a new intrusion detection system (IDS). Joe describes an elegant new algorithm that will flawlessly detect intrusion attacks and respond almost instantly. Stan, who is more of an entrepreneur
  • 9. than inventor, quickly grasps the essence of Joe’s idea, and decides to incorporate the idea into a commercial product, without the knowledge or participation of Joe. In his scheme to commercialize Joe’s idea, Stan plans to hire a programmer to implement Joe’s algorithm, and use the software to control a novel new hardware component. Stan would like to protect the intellectual property of the algorithm, software, and hardware component, but is experiencing some guilt pangs. Discuss the legal and ethical issues of this whole situation.