

Network Defense and Countermeasures
Question Bank
Course Introduction
Network Defense and Countermeasures explores the principles, strategies, and technologies used to protect computer networks from cyber attacks and unauthorized access. The course covers essential topics such as network security architectures, firewalls, intrusion detection and prevention systems, virtual private networks (VPNs), and security protocols. Students will learn to identify vulnerabilities, implement robust defense mechanisms, and apply best practices for monitoring and responding to security incidents. Practical exercises and real-world case studies provide hands-on experience in designing and deploying countermeasures to defend modern networks against evolving threats.
Recommended Textbook
Cryptography and Network Security 6th Edition by William Stallings
Available Study Resources on Quizplus
20 Chapters
842 Verified Questions
842 Flashcards
Source URL: https://quizplus.com/study-set/3983

Page 2

Chapter 1: Overview
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80023
Sample Questions
Q1) In the context of network security,___________ is the ability to limit and control the access to host systems and applications via communications links.
Answer: access control
Q2) The three concepts that form what is often referred to as the CIA triad are ________ .These three concepts embody the fundamental security objectives for both data and for information and computing services.
A)confidentiality,integrity and availability
B)communication,integrity and authentication
C)confidentiality,integrity,access control
D)communication,information and authenticity
Answer: A
Q3) The protection of the information that might be derived from observation of traffic flows is _________ .
A)connectionless confidentiality
B)connection confidentiality
C)traffic- flow confidentiality
D)selective- field confidentiality
Answer: C
To view all questions and flashcards with answers, click on the resource link above.
3

Chapter 2: Classical Encryption Techniques
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80022
Sample Questions
Q1) The best known multiple letter encryption cipher is the __________ which treats digrams in the plaintext as single units and translates these units into ciphertext digrams.
Answer: Playfair
Q2) Symmetric encryption remains by far the most widely used of the two types of encryption.
A)True
B)False
Answer: True
Q3) Rotor machines are sophisticated precomputer hardware devices that use substitution techniques.
A)True
B)False
Answer: True
Q4) The __________ consist of a set of independently rotating cylinders through which electrical pulses can flow.Each cylinder has 26 input pins and 26 output pins with internal wiring that connects each input pin to a unique output pin.
Answer: rotor machines
To view all questions and flashcards with answers, click on the resource link above.
Page 4

Chapter 3: Block Ciphers and the Data Encryption Standard
Available Study Resources on Quizplus for this Chatper
27 Verified Questions
27 Flashcards
Source URL: https://quizplus.com/quiz/80021
Sample Questions
Q1) The vast majority of network-based symmetric cryptographic applications make use of ________ ciphers.
A)linear
B)block
C)permutation
D)stream
Answer: B
Q2) The __________ criterion states that output bits j and k should change independently when any single input bit i is inverted for all i,j and k.
Answer: bit independence
Q3) One criteria for an S-box is: "If two inputs to an S-box differ in exactly one bit,the outputs must also differ in exactly one bit."
A)True
B)False
Answer: False
Q4) All other things being equal,smaller block sizes mean greater security.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 5
Chapter 4: Basic Concepts in Number Theory and Finite
Fields
Available Study Resources on Quizplus for this Chatper
26 Verified Questions
26 Flashcards
Source URL: https://quizplus.com/quiz/80020
Sample Questions
Q1) Finite fields play a crucial role in several areas of cryptography.
A)True
B)False
Q2) A zero-degree polynomial is called a __________ polynomial and is simply an element of the set of coefficients.
Q3) The Advanced Encryption Standard uses infinite fields.
A)True
B)False
Q4) A polynomial fx)over a field F is called __________ if and only if fx)cannot be expressed as a product of two polynomials,both over F,and both of degree lower than that of fx).
Q5) Cryptographic algorithms do not rely on properties of finite fields. A)True B)False
Q6) Two integers a and b are said to be congruent modulo n,if a mod n)= b mod n).
A)True
B)False

Page 6
Q7) A cyclic group is always commutative and may be finite or infinite. A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Page 7

Chapter 5: Advanced Encryption Standard
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80019
Sample Questions
Q1) The S-box is designed to be resistant to known cryptanalytic attacks.
A)True
B)False
Q2) The __________ is when a small change in plaintext or key produces a large change in the ciphertext.
A)avalanche effect
B)Rcon
C)key expansion
D)auxiliary exchange
Q3) InvSubBytes is the inverse of ShiftRows.
A)True
B)False
Q4) The inverse add round key transformation is identical to the forward add round key transformation because the XOR operation is its own inverse.
A)True
B)False
Q5) At each horizontal point,State is the same for both encryption and decryption.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 6: Block Cipher Operation
Available Study Resources on Quizplus for this Chatper
44 Verified Questions
44 Flashcards
Source URL: https://quizplus.com/quiz/80018
Sample Questions
Q1) Given the potential vulnerability of DES to a brute-force attack,an alternative has been found.
A)True
B)False
Q2) "Input is processed s bits at a time.Preceding ciphertext is used as input to the encryption algorithm to produce pseudorandom output,which is XORed with plaintext to produce next unit of ciphertext",is a description of the _________ mode of operation.
Q3) __________ modes of operation have been standardized by NIST for use with symmetric block ciphers such as DES and AES.
A)Three
B)Five
C)Nine
D)Seven
Q4) The _________ and _________ block cipher modes of operation are used for authentication.
A)OFB,CTR
B)ECB,CBC
C)CFB,OFB
D)CBC,CFB
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Random and Pseudorandom Number
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80017
Sample Questions
Q1) A pseudorandom number generator takes as input a fixed value called the __________ and produces a sequence of output bits using a deterministic algorithm.
A)seed
B)fixed skew
C)entropy source
D)keystream
Q2) In key distribution and reciprocal authentication schemes two communicating parties cooperate by exchanging messages to distribute keys and/or authenticate each other.In many cases ___________ are used for handshaking to prevent replay attacks.
A)session keys
B)nonces
C)RC4's
D)entropies
Q3) With true random sequences each number is statistically independent of other numbers in the sequence and therefore unpredictable.
A)True
B)False
Q4) The most important and widely used stream cipher is __________ .
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: More Number Theory
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80016
Sample Questions
Q1) Discrete logarithms are analogous to ordinary logarithms but are defined using modular arithmetic.
A)True
B)False
Q2) One of the useful features of the Chinese remainder theorem is that it provides a way to manipulate potentially very large numbers mod M in terms of tuples of smaller numbers.
A)True
B)False
Q3) Two numbers are relatively prime if they have ________ prime factors in common.
A)zero
B)two
C)several
D)one
Q4) The procedure TEST takes a candidate integer n as input and returns the result __________ if n is definitely not a prime.
A)discrete
B)composite
C)inconclusive
D)primitive
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Public-Key Cryptography and Rsa
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80015
Sample Questions
Q1) Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.
A)True
B)False
Q2) Asymmetric encryption utilizes only a public key for encryption and decryption.
A)True
B)False
Q3) The defense against the brute-force approach for RSA is to use a large key space.
A)True
B)False
Q4) The key used in symmetric encryption is referred to as a __________ key.
A)public
B)secret
C)private
D)decryption
Q5) Asymmetric encryption transforms plaintext into ciphertext.
A)True
B)False
Q6) A __________ is when two sides cooperate to exchange a session key.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Other Public-Key Cryptosystems
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80014
Sample Questions
Q1) The form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat different for GF2m)than for Zp.
A)True
B)False
Q2) A considerably larger key size can be used for ECC compared to RSA.
A)True
B)False
Q3) The key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.
Q4) A __________ GF2m)consists of 2m elements together with addition and multiplication operations that can be defined over polynomials.
Q5) Most of the products and standards that use public-key cryptography for encryption and digital signatures use RSA.
A)True
B)False
Q6) We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __________ over Zp.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Cryptographic Hash Functions
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80013
Sample Questions
Q1) The hash value of a message in the __________ application is encrypted with a user's private key.
Q2) __________ is a mechanism or service used to verify the integrity of a message.
A)Message authentication
B)Data compression
C)Data mapping
D)Message digest
Q3) An ideal hash algorithm will require a cryptanalytic effort __________ the brute-force effort.
A)less than or equal to B)greater than or equal to C)less than D)greater than
Q4) The SHA-512 algorithm has the property that every bit of the hash code is a function of every bit of the input.
A)True
B)False
Q5) Whirlpool is a popular cryptographic hash function.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Message Authentication Codes
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80012
Sample Questions
Q1) ___________ is a term used to describe encryption systems that simultaneously protect confidentiality and authenticity of communications.
Q2) The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.
A)True
B)False
Q3) Message authentication is a mechanism or service used to verify the integrity of a message.
A)True
B)False
Q4) The GCM mode makes use of two functions: __________,which is a keyed hash function,and GCTR.
A)CTR
B)HMAC
C)GHASH
D)CCM
Q5) One approach to constructing a MAC is to use a symmetric block cipher in such a way that it produces a __________ output for a variable length input.
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 13: Digital Signatures
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80011
Sample Questions
Q1) The ElGamal signature scheme involves the use of the public key for encryption and the private key for decryption.
A)True
B)False
Q2) _________ specifies that if the signature generation process results in a value of s = 0 a new value of k should be generated and the signature should be recalculated.
Q3) In addition to the NIST Digital Signature Algorithm and ECDSA,the 2009 version of FIPS 186 also includes several techniques based on _________ ,all of which were developed by RSA Laboratories and are in wide use.
Q4) The DSS approach makes use of a hash function.
A)True
B)False
Q5) The DSS makes use of the Secure Hash Algorithm and presents a new digital signature technique known as the ______________ .
Q6) The digital signature function does not include the authentication function.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Page 16

Chapter 14: Key Management and Distribution
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80010
Sample Questions
Q1) Key distribution often involves the use of _________ which are generated and distributed for temporary use between two parties.
A)public key certificates
B)session keys
C)master keys
D)private key certificates
Q2) X.509 is an important standard because the certificate structure and authentication protocols defined in X.509 are used in a variety of contexts.
A)True
B)False
Q3) If __________ is done at a network or IP level a key is needed for each pair of hosts on the network that wish to communicate.
A)end-to-end encryption
B)key management
C)key distribution
D)link encryption
Q4) The directory entry for each certification authority includes two types of certificates: forward certificates and ___________ .
To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: User Authentication Protocols
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80009
Sample Questions
Q1) There are four general means of authenticating a user's identity.They are: something the individual knows,something the individual possesses,something the individual is,and something the individual __________ .
Q2) Kerberos provides a trusted third party authentication service that enables clients and servers to establish authenticated communication.
A)True
B)False
Q3) It is the ticket that proves the client's identity.
A)True
B)False
Q4) ________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
A)Identification
B)Message authentication
C)Verification
D)User authentication
Q5) __________ is an authentication service developed as part of Project Athena at MIT.
To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 16: Network Access Control and Cloud Security
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80008
Sample Questions
Q1) The Extensible Authentication Protocol supports multiple authentication methods.
A)True
B)False
Q2) A __________ provides a form of NAC by allowing or denying network traffic between an enterprise host and an external user.
Q3) For many clients,the most devastating impact from a security breach is the loss or leakage of data.
A)True
B)False
Q4) __________ are third party audits of cloud services.
Q5) The _________ is the node that is attempting to access the network and may be any device that is managed by the network access control system.
A)AR
B)RAS
C)IP
D)PS
Q6) The ___________ functions as an access control point for users in remote locations connecting to an enterprise's internal network.
To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 17: Transport-Level Security
Available Study Resources on Quizplus for this Chatper
26 Verified Questions
26 Flashcards
Source URL: https://quizplus.com/quiz/80007
Sample Questions
Q1) An SSL session is an association between a client and a server and is created by the
A)Handshake Protocol
B)user
C)Spec Protocol
D)administrator
Q2) The TLS Record Format is the same as that of the SSL Record Format.
A)True
B)False
Q3) __________ provides security services between Transport Layer Protocol and applications that use TCP.
Q4) One way to classify Web security threats is in terms of the location of the threat: Web server,Web browser,and network traffic between browser and server.
A)True
B)False
Q5) TLS makes use of a pseudorandom function referred to as __________ to expand secrets into blocks of data for purposes of key generation or validation.
Q6) Two important SSL concepts are the SSL session and the SSL _________ .
To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 18: Wireless Network Security
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80006
Sample Questions
Q1) The __________ layer is responsible for detecting errors and discarding any frames that contain errors.
Q2) The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other,agree on a set of security capabilities,and establish an association for future communication using those security capabilities.
A)WPA
B)RSN
C)TKIP
D)WAE
Q3) The use of 802.1X cannot prevent rogue access points and other unauthorized devices from becoming insecure backdoors.
A)True
B)False
Q4) Sensors and robots,are not vulnerable to physical attacks.
A)True
B)False
Q5) Derived from the GMK,the _________ is used to provide confidentiality and integrity protection for multicast/broadcast user traffic.
To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 19: Electronic Mail Security
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80005
Sample Questions
Q1) Computed by PGP,a _________ field indicates the extent to which PGP will trust that this is a valid public key for this user;the higher the level of trust,the stronger the binding of this user ID to this key.
Q2) The __________ enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication.
A)key ID of the sender's public key
B)timestamp
C)filename
D)leading two octets of message digest
Q3) The _________ accepts the message submitted by a Message User Agent and enforces the policies of the hosting domain and the requirements of Internet standards.
A)Message Store
B)Mail Submission Agent
C)Message Transfer Agent
D)Mail Delivery Agent
Q4) The __________ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address.
Q5) PGP provides compression using the __________ algorithm.
To view all questions and flashcards with answers, click on the resource link above. Page 22

Chapter 20: Ip Security
Available Study Resources on Quizplus for this Chatper
44 Verified Questions
44 Flashcards
Source URL: https://quizplus.com/quiz/80004
Sample Questions
Q1) IPsec encompasses three functional areas: authentication,key management,and
Q2) A __________ attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination.
Q3) The term _________ refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services.
Q4) Generic in that it does not dictate specific formats,the _________ is a key exchange protocol based on the Diffie-Hellman algorithm with added security.
Q5) Any traffic from the local host to a remote host for purposes of an IKE exchange bypasses the IPsec processing.
A)True B)False
Q6) A security association is uniquely identified by three parameters: Security Protocol Identifier,IP Destination Address,and ________ .
Q7) An individual SA can implement both the AH and the ESP protocol.
A)True B)False
To view all questions and flashcards with answers, click on the resource link above. Page 23