ASSESSMENT RECORD / FEEDBACK SHEET
Course: ICT60215 Advanced Diploma of Network Security
Name:
Student ID:
Unit Code and Name: ICTNWK502 Implement secure encryption technologies
Assessment Task Number and Title: #1 Multiple Choice Questions and Short Answer Questions
Date Submitted:
Trainer’s Name:
· All assessments must be in a neat and readable format.
· Students are required to retain a duplicate of any assignment submitted, both written & disk copy.
· Please refer to the Student Handbook for the Assessment Policy.
· Plagiarism is an academic misconduct and is unacceptable to Pacific College of Technology.
I certify that the work submitted is my own. I have acknowledged material taken from websites, textbooks and articles.
Student Signature:
Date:
FEEDBACK
Signed (Traine
Assessor)
Date:
Feedback provided by the trainer
Date:
Please retain this as proof of submission
Unit name:
Assignment No:
Received By:
Date:
Course
: ICT60215 Advanced Diploma of Network Security
Unit Code and Name
: ICTNWK502 Implement secure encryption technologies
Traine
Assesso
:
Assessment item
: #1- Multiple Choice Questions and Short Answer Questions
Due date
: Week 4 (Extension upon trainer’s approval only)
Context and Purpose of the assessment:
This assessment will assess your skills and knowledge in the area of ‘ICTNWK502 Implement secure encryption technologies’ unit. This assessment activity deals with the following elements of performance and critical aspects of evidence:
Question
Element
Performance Criteria
1-20 MCQ
1-2
1.3, 1.5, 2.1, 2.2, 2.3
1-3 SAQ
1-2
1.3, 1.5, 2.1, 2.2, 2.3
4-10 SAQ
2-3
2.2, 2.3, 3.1
· The assessment tasks for the unit assume that you will work in the Information Technology industry. Case studies/ exercises used in this assessment reflect a workplace scenario.
· The student must have access to a Computer, Printer and Microsoft Office Suite Applications for doing the assessment for this unit.
· If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. If the assessment is not satisfactory, the trainer will allow one more attempt to the assessment item.
· The responses to assessment questions should be in your own words and examples from workplace should be used wherever possible.
Multiple Choice Questions: Select the most appropriate option
1. Which is not an encryption standard?
a. AES
. DES
c. Triple DES
d. TES
2. MD5 produces __ bits hash data?
a. 160
. 150
c. 128
d. 112
3. SHA-1 produces __ bit of hash?
a. 160
. 128
c. 150
d. 112
4. In cryptography, the order of the letters in a message is rea
anged by
a. Substitution ciphers
. Transpositional ciphers
c. Both (a. and (b.
d. None of the mentioned
5. Cryptanalysis is used
a. To find some insecurity in a cryptographic scheme
. To increase the speed
c. To encrypt the data
d. None of the mentioned
6. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a. Stream control transmission protocol (SCTP)
. Resource reservation protocol
c. Explicit congestion notification (ECN)
d. Transport layer security (TSL)
7. Which wireless protocol uses TKIP (Temporal Key Integrity Protocol)?
a. WPA
. WEP
c. WAP2
d. WPS
8. The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
a. Plaintext attack
. Cipher text attack
c. Man-in-the-middle
d. None of the above
9. A(n. ______ algorithm transforms cipher text to plaintext.
a. Encryption
. Decryption
c. Either (A) or (B)
d. Neither (A) nor (B)
10. The aspect of security that fails when a denial of service attack occurs is:
a. Availability
. Privacy
c. Integrity
d. Authentication
e. None of the above
11. This is an encryption/decryption key known only to the party or parties that exchange secret messages.Â
a. e-signature
. digital certificateÂ
c. private keyÂ
d. security token
12. Today, many Internet businesses and users take advantage of cryptography based on this approach.Â
a. public key infrastructureÂ
. output feedbackÂ
c. Encrypting File SystemÂ
d. single sign on
13. This is the inclusion of a secret message in otherwise unencrypted text or images.Â
a. masqueradeÂ
. steganographyÂ
c. spoofÂ
d. eye-in-hand system
14. This is a trial and e
or method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.Â
a. chaffing and winnowingÂ
. cryptanalysisÂ
c. serendipityÂ
d.
ute force cracking
15. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
) encrypted message
c) both (a) and (b)
d) none of the mentioned
16. This is an encryption/decryption key known only to the party or parties that exchange secret messages.Â
a. e-signature
. digital certificateÂ
c. private keyÂ
d. security token
17. This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.Â
a. RijndaelÂ
. Ke
erosÂ
c. BlowfishÂ
d. IPsec
18. In password protection, this is a random string of data used to modify a password hash.Â
a. sheep dipÂ
. saltÂ
c. bypassÂ
d. dongle
19. This is a trial and e
or method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.Â
a. chaffing and winnowingÂ
. cryptanalysisÂ
c. serendipityÂ
d.
ute force cracking
20. In asymmetric key cryptography, the private key is kept by
a) sende
) receive
c) sender and receive
d) all the connected devices to the network
Short Answer Questions:
1. What do you mean by Encryption and Decryption technique?
..................................................................................................................................
..................................................................................................................................
..................................................................................................................................
..................................................................................................................................
..................................................................................................................................
..................................................................................................................................
2. Explain
iefly the two types of encryption.
................................................................................................................