ASSESSMENT RECORD / FEEDBACK SHEET Course: ICT60215 Advanced Diploma of Network Security Name: Student ID: Unit Code and Name: ICTNWK502 Implement secure encryption technologies Assessment Task Number...

1 answer below »


Short Answer Questions: There only 10 which needs to be done from this file




ASSESSMENT RECORD / FEEDBACK SHEET Course: ICT60215 Advanced Diploma of Network Security Name: Student ID: Unit Code and Name: ICTNWK502 Implement secure encryption technologies Assessment Task Number and Title: #1 Multiple Choice Questions and Short Answer Questions Date Submitted: Trainer’s Name: · All assessments must be in a neat and readable format. · Students are required to retain a duplicate of any assignment submitted, both written & disk copy. · Please refer to the Student Handbook for the Assessment Policy. · Plagiarism is an academic misconduct and is unacceptable to Pacific College of Technology. I certify that the work submitted is my own. I have acknowledged material taken from websites, textbooks and articles. Student Signature: Date: FEEDBACK Signed (Trainer/Assessor) Date: Feedback provided by the trainer Date: Please retain this as proof of submission Unit name: Assignment No: Received By: Date: Course : ICT60215 Advanced Diploma of Network Security Unit Code and Name : ICTNWK502 Implement secure encryption technologies Trainer/Assessor : Assessment item : #1- Multiple Choice Questions and Short Answer Questions Due date : Week 4 (Extension upon trainer’s approval only) Context and Purpose of the assessment: This assessment will assess your skills and knowledge in the area of ‘ICTNWK502 Implement secure encryption technologies’ unit. This assessment activity deals with the following elements of performance and critical aspects of evidence: Question Element Performance Criteria 1-20 MCQ 1-2 1.3, 1.5, 2.1, 2.2, 2.3 1-3 SAQ 1-2 1.3, 1.5, 2.1, 2.2, 2.3 4-10 SAQ 2-3 2.2, 2.3, 3.1 · The assessment tasks for the unit assume that you will work in the Information Technology industry. Case studies/ exercises used in this assessment reflect a workplace scenario. · The student must have access to a Computer, Printer and Microsoft Office Suite Applications for doing the assessment for this unit. · If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. If the assessment is not satisfactory, the trainer will allow one more attempt to the assessment item. · The responses to assessment questions should be in your own words and examples from workplace should be used wherever possible. Multiple Choice Questions: Select the most appropriate option 1. Which is not an encryption standard? a. AES b. DES c. Triple DES d. TES 2. MD5 produces __ bits hash data? a. 160 b. 150 c. 128 d. 112 3. SHA-1 produces __ bit of hash? a. 160 b. 128 c. 150 d. 112 4. In cryptography, the order of the letters in a message is rearranged by a. Substitution ciphers b. Transpositional ciphers c. Both (a. and (b. d. None of the mentioned 5. Cryptanalysis is used a. To find some insecurity in a cryptographic scheme b. To increase the speed c. To encrypt the data d. None of the mentioned 6. Which one of the following is a cryptographic protocol used to secure HTTP connection? a. Stream control transmission protocol (SCTP) b. Resource reservation protocol c. Explicit congestion notification (ECN) d. Transport layer security (TSL) 7. Which wireless protocol uses TKIP (Temporal Key Integrity Protocol)? a. WPA b. WEP c. WAP2 d. WPS 8. The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other. a. Plaintext attack b. Cipher text attack c. Man-in-the-middle d. None of the above 9. A(n. ______ algorithm transforms cipher text to plaintext. a. Encryption b. Decryption c. Either (A) or (B) d. Neither (A) nor (B) 10. The aspect of security that fails when a denial of service attack occurs is: a. Availability b. Privacy c. Integrity d. Authentication e. None of the above 11. This is an encryption/decryption key known only to the party or parties that exchange secret messages.  a. e-signature b. digital certificate  c. private key  d. security token 12. Today, many Internet businesses and users take advantage of cryptography based on this approach.  a. public key infrastructure  b. output feedback  c. Encrypting File System  d. single sign on 13. This is the inclusion of a secret message in otherwise unencrypted text or images.  a. masquerade  b. steganography  c. spoof  d. eye-in-hand system 14. This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.  a. chaffing and winnowing  b. cryptanalysis  c. serendipity  d. brute force cracking 15. In cryptography, what is cipher? a) algorithm for performing encryption and decryption b) encrypted message c) both (a) and (b) d) none of the mentioned 16. This is an encryption/decryption key known only to the party or parties that exchange secret messages.  a. e-signature b. digital certificate  c. private key  d. security token 17. This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.  a. Rijndael  b. Kerberos  c. Blowfish  d. IPsec 18. In password protection, this is a random string of data used to modify a password hash.  a. sheep dip  b. salt  c. bypass  d. dongle 19. This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies.  a. chaffing and winnowing  b. cryptanalysis  c. serendipity  d. brute force cracking 20. In asymmetric key cryptography, the private key is kept by a) sender b) receiver c) sender and receiver d) all the connected devices to the network Short Answer Questions: 1. What do you mean by Encryption and Decryption technique? .................................................................................................................................. .................................................................................................................................. .................................................................................................................................. .................................................................................................................................. .................................................................................................................................. .................................................................................................................................. 2. Explain briefly the two types of encryption. ................................................................................................................
Answered Same DayAug 31, 2020ICTNWK502Training.Gov.Au

Answer To: ASSESSMENT RECORD / FEEDBACK SHEET Course: ICT60215 Advanced Diploma of Network Security Name:...

Vignesh answered on Sep 05 2020
150 Votes
ASSESSMENT RECORD / FEEDBACK SHEET
Course: ICT60215 Advanced Diploma of Network Security
Name:
Student ID:
Unit Code and Name: ICTNWK502 Implement secure encryption technologies
Assessment Task Number and Title: #1 Multiple Choice Questions and Short Answer Questions
Date Submitted:
Trainer’s Name:
· All assessments must be in a neat and readable format.
· Students are required to retain a duplicate of any assignment submitted, both written & disk copy.
· Please refer to the Student Handbook for the Assessment Policy.
· Plagiarism is an academic misconduct and is unacceptable to Pacific College of Technology.
I certify that the work submitted is my own. I have acknowledged material taken from websites, textbooks and articles.
Student Signature:
Date:
FEEDBACK
Signed (Trainer/Assessor)
Date:
Feedback provided by the trainer
Date:
Please retain this as proof of submission
Unit name:
Assignment No:
Received By:

Date:
Course
: ICT60215 Advanced Diploma of Network Security
Unit Code and Name
: ICTNWK502 Implement secure encryption technologies
Trainer/Assessor
:
Assessment item
: #1- Multiple Choice Questions and Short Answer Questions
Due date
: Week 4 (Extension upon trainer’s approval only)
Context and Purpose of the assessment:
This assessment will assess your skills and knowledge in the area of ‘ICTNWK502 Implement secure encryption technologies’ unit. This assessment activity deals with the following elements of performance and critical aspects of evidence:
    Question
    Element
    Performance Criteria
    1-20 MCQ
    1-2
     1.3, 1.5, 2.1, 2.2, 2.3
    1-3 SAQ
    1-2
    1.3, 1.5, 2.1, 2.2, 2.3
    4-10 SAQ
    2-3
    2.2, 2.3, 3.1
· The assessment tasks for the unit assume that you will work in the Information Technology industry. Case studies/ exercises used in this assessment reflect a workplace scenario.
· The student must have access to a Computer, Printer and Microsoft Office Suite Applications for doing the assessment for this unit.
· If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. If the assessment is not satisfactory, the trainer will allow one more attempt to the assessment item.
· The responses to assessment questions should be in your own words and examples from workplace should be used wherever possible.
Multiple Choice Questions: Select the most appropriate option
1. Which is not an encryption standard?
a. AES
b. DES
c. Triple DES
d. TES
2. MD5 produces __ bits hash data?
a. 160
b. 150
c. 128
d. 112
3. SHA-1 produces __ bit of hash?
a. 160
b. 128
c. 150
d. 112
4. In cryptography, the order of the letters in a message is rearranged by
a. Substitution ciphers
b. Transpositional...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here