Network Security
Q32.
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow external hosts to send packets on existing open TCP connections or connections that are being opened (by internal hosts) but not allow them to open TCP connections to hosts in the private network. To achieve this the minimum capability of the firewall should be that ofQ33.
You are given the following four bytes : \begin{array}{|l|l|l|l|l|l|l|l|l|l|} \hline 10100011 & 00110111 & 11101001 & 10101011 \\ \hline \end{array} Which of the following are substrings of the base 64 encoding of the above four bytes?Q35.
Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key isQ36.
Which of the following statement(s) is TRUE? I. A hash function takes a message of arbitrary length and generates a fixed length code. II. A hash function takes a message of fixed length and generates a code of variable length. III. A hash function may give the same hash value for distinct messages.Q38.
A sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is TRUE?