[["Question: Message authentication is a service beyond\nChoices:\nA. Message Condentiality\nB. Message Integrity\nC. Message Splashing\nD. Message Sending\nAnswer:", " Message Condentiality"], ["Question: Message authentication is a service beyond\nChoices:\nA. Message Condentiality\nB. Message Integrity\nC. Message Splashing\nD. Message Sending\nAnswer:", " Message Integrity"], ["Question: Message authentication is a service beyond\nChoices:\nA. Message Condentiality\nB. Message Integrity\nC. Message Splashing\nD. Message Sending\nAnswer:", " Message Splashing"], ["Question: Message authentication is a service beyond\nChoices:\nA. Message Condentiality\nB. Message Integrity\nC. Message Splashing\nD. Message Sending\nAnswer:", " Message Sending"], ["Question: When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________\nChoices:\nA. AP-handshaking\nB. 4-way handshake\nC. 4-way connection\nD. wireless handshaking\nAnswer:", " AP-handshaking"], ["Question: When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________\nChoices:\nA. AP-handshaking\nB. 4-way handshake\nC. 4-way connection\nD. wireless handshaking\nAnswer:", " 4-way handshake"], ["Question: When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________\nChoices:\nA. AP-handshaking\nB. 4-way handshake\nC. 4-way connection\nD. wireless handshaking\nAnswer:", " 4-way connection"], ["Question: When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________\nChoices:\nA. AP-handshaking\nB. 4-way handshake\nC. 4-way connection\nD. wireless handshaking\nAnswer:", " wireless handshaking"], ["Question: A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system\u2019s hardware.\nChoices:\nA. crypter\nB. virus\nC. backdoor\nD. key-logger\nAnswer:", " crypter"], ["Question: A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system\u2019s hardware.\nChoices:\nA. crypter\nB. virus\nC. backdoor\nD. key-logger\nAnswer:", " virus"], ["Question: A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system\u2019s hardware.\nChoices:\nA. crypter\nB. virus\nC. backdoor\nD. key-logger\nAnswer:", " backdoor"], ["Question: A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system\u2019s hardware.\nChoices:\nA. crypter\nB. virus\nC. backdoor\nD. key-logger\nAnswer:", " key-logger"], ["Question: Man in the middle attack can endanger the security of Diffie Hellman method if two parties are not\nChoices:\nA. Joined\nB. Authenticated\nC. Submitted\nD. Shared\nAnswer:", " Joined"], ["Question: Man in the middle attack can endanger the security of Diffie Hellman method if two parties are not\nChoices:\nA. Joined\nB. Authenticated\nC. Submitted\nD. Shared\nAnswer:", " Authenticated"], ["Question: Man in the middle attack can endanger the security of Diffie Hellman method if two parties are not\nChoices:\nA. Joined\nB. Authenticated\nC. Submitted\nD. Shared\nAnswer:", " Submitted"], ["Question: Man in the middle attack can endanger the security of Diffie Hellman method if two parties are not\nChoices:\nA. Joined\nB. Authenticated\nC. Submitted\nD. Shared\nAnswer:", " Shared"], ["Question: Statement 1| A U2F USB dongle prevents malware on the user\u2019s computer from stealing the user\u2019s second factor to authenticate as that user even when the user\u2019s computer is turned off. Statement 2| A server using U2F can reliably determine that the user who is attempting to login is indeed behind the computer that sent the login request.\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " True, True"], ["Question: Statement 1| A U2F USB dongle prevents malware on the user\u2019s computer from stealing the user\u2019s second factor to authenticate as that user even when the user\u2019s computer is turned off. Statement 2| A server using U2F can reliably determine that the user who is attempting to login is indeed behind the computer that sent the login request.\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " False, False"], ["Question: Statement 1| A U2F USB dongle prevents malware on the user\u2019s computer from stealing the user\u2019s second factor to authenticate as that user even when the user\u2019s computer is turned off. Statement 2| A server using U2F can reliably determine that the user who is attempting to login is indeed behind the computer that sent the login request.\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " True, False"], ["Question: Statement 1| A U2F USB dongle prevents malware on the user\u2019s computer from stealing the user\u2019s second factor to authenticate as that user even when the user\u2019s computer is turned off. Statement 2| A server using U2F can reliably determine that the user who is attempting to login is indeed behind the computer that sent the login request.\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " False, True"], ["Question: Applications developed by programming languages like ____ and ______ have this common buffer-overflow error.\nChoices:\nA. C, Ruby\nB. Python, Ruby\nC. C, C++\nD. Tcl, C#\nAnswer:", " C, Ruby"], ["Question: Applications developed by programming languages like ____ and ______ have this common buffer-overflow error.\nChoices:\nA. C, Ruby\nB. Python, Ruby\nC. C, C++\nD. Tcl, C#\nAnswer:", " Python, Ruby"], ["Question: Applications developed by programming languages like ____ and ______ have this common buffer-overflow error.\nChoices:\nA. C, Ruby\nB. Python, Ruby\nC. C, C++\nD. Tcl, C#\nAnswer:", " C, C++"], ["Question: Applications developed by programming languages like ____ and ______ have this common buffer-overflow error.\nChoices:\nA. C, Ruby\nB. Python, Ruby\nC. C, C++\nD. Tcl, C#\nAnswer:", " Tcl, C#"], ["Question: Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " True, True"], ["Question: Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " False, False"], ["Question: Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " True, False"], ["Question: Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don\u2019t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker replaying bytes that a client sent earlier.\n2. An attacker impersonating the server.\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " False, True"], ["Question: The openSSL implementation described in \u201cRemote Timing Attacks are Practical\u201d (by Brumley and Boneh) uses the following performance optimizations: Chinese Remainder (CR), Montgomery Representation (MR), Karatsuba Multiplication (KM), and Repeated squaring and Sliding windows (RS). Which of the following options would close the timing channel attack described in the paper if you turned the listed optimizations off?\n1. CR and MR\n2. CR\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " True, True"], ["Question: The openSSL implementation described in \u201cRemote Timing Attacks are Practical\u201d (by Brumley and Boneh) uses the following performance optimizations: Chinese Remainder (CR), Montgomery Representation (MR), Karatsuba Multiplication (KM), and Repeated squaring and Sliding windows (RS). Which of the following options would close the timing channel attack described in the paper if you turned the listed optimizations off?\n1. CR and MR\n2. CR\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " False, False"], ["Question: The openSSL implementation described in \u201cRemote Timing Attacks are Practical\u201d (by Brumley and Boneh) uses the following performance optimizations: Chinese Remainder (CR), Montgomery Representation (MR), Karatsuba Multiplication (KM), and Repeated squaring and Sliding windows (RS). Which of the following options would close the timing channel attack described in the paper if you turned the listed optimizations off?\n1. CR and MR\n2. CR\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " True, False"], ["Question: The openSSL implementation described in \u201cRemote Timing Attacks are Practical\u201d (by Brumley and Boneh) uses the following performance optimizations: Chinese Remainder (CR), Montgomery Representation (MR), Karatsuba Multiplication (KM), and Repeated squaring and Sliding windows (RS). Which of the following options would close the timing channel attack described in the paper if you turned the listed optimizations off?\n1. CR and MR\n2. CR\nChoices:\nA. True, True\nB. False, False\nC. True, False\nD. False, True\nAnswer:", " False, True"], ["Question: _______________ is the central node of 802.11 wireless operations.\nChoices:\nA. WPA\nB. Access Point\nC. WAP\nD. Access Port\nAnswer:", " WPA"], ["Question: _______________ is the central node of 802.11 wireless operations.\nChoices:\nA. WPA\nB. Access Point\nC. WAP\nD. Access Port\nAnswer:", " Access Point"], ["Question: _______________ is the central node of 802.11 wireless operations.\nChoices:\nA. WPA\nB. Access Point\nC. WAP\nD. Access Port\nAnswer:", " WAP"], ["Question: _______________ is the central node of 802.11 wireless operations.\nChoices:\nA. WPA\nB. Access Point\nC. WAP\nD. Access Port\nAnswer:", " Access Port"], ["Question: _______________ is a popular tool used for network analysis in multiprotocol diverse network.\nChoices:\nA. Snort\nB. SuperScan\nC. Burp Suit\nD. EtterPeak\nAnswer:", " Snort"], ["Question: _______________ is a popular tool used for network analysis in multiprotocol diverse network.\nChoices:\nA. Snort\nB. SuperScan\nC. Burp Suit\nD. EtterPeak\nAnswer:", " SuperScan"], ["Question: _______________ is a popular tool used for network analysis in multiprotocol diverse network.\nChoices:\nA. Snort\nB. SuperScan\nC. Burp Suit\nD. EtterPeak\nAnswer:", " Burp Suit"], ["Question: _______________ is a popular tool used for network analysis in multiprotocol diverse network.\nChoices:\nA. Snort\nB. SuperScan\nC. Burp Suit\nD. EtterPeak\nAnswer:", " EtterPeak"]]