Clint Mayer
1. What is Kerckhoff's Principle?
a. The method must not need to be kept secret, and having it fall into the enemy's hands should not cause problems.
b. The system must be practically, if not mathematically, indecipherable.
c. Its key must be communicable and retainable without the help of written notes, and changeable or modifiable at the will of the correspondents.
d. It must be portable, and its usage and function must not require the concourse of several people.
2. What were the encryption activists of the 90s referred to as?
a. Cyberpunks
b. Cypherpunks
c. Digiratti
d. Scriptkiddies
3. What does escrow stand for in terms of encryption?
a. A dish of cooked landsnails, usually served as anappetizerinFrance
b. The original term for a pass phrase.
c. Where a trusted third party holds keys to encrypted data.
d. A known flaw in an encryption algorithm.
4. What encryption was made available to the world in response to government restrictions?
a. DES
b. AES
c. PGP
d. SSL
5. What restriction does the U.S. have on encryption?
a. Import
b. Export
c. Domestic use
d. Creation
Josh Towers
1. What is the order of components for a forward proxy?
a. Client → proxy → internet → content
b. Client → internet → content → proxy
c. Client → internet → proxy → content
d. Internet → content → client → proxy
2. What is the order of components for a reverse proxy?
a. Client → proxy → internet → content
b. Client → internet → content → proxy
c. Client → internet → proxy → content
d. Internet → content → client → proxy
3. What was the first use for a proxy server?
a. Filtering
b. Caching
c. Anonymity
d. Logging
4. Which use for a proxy server prevents content that is not approved from being accessed?
a. Logging
b. Bypassing filters
c. Anonymity
d. Filtering
5. When a user is using a proxy server for logging they are?
a. Keeping track of their work hours.
b. Monitoring information sent through the server.
c. Watching their favorite show on hulu.
d. Sending an email.
Khoa Nyugen
1. Layer Two Tunneling Protocol (L2TP) is in what layer in the OSI model:
a. Physical (Layer 1)
b. Data Link (Layer 2)
c. Network (Layer 3)
d. Transport (Layer 4)
2. Limitations of a VPN:
a. VPNs require detailed understanding of network security issues and careful installation / configuration
b. The reliability and performance of an Internet-based VPN is not under an organization's direct control
c. Historically, VPN products and solutions from different vendors have not always been compatible due to issues with VPN technology standards
d. All of the above
3. Internet Protocol Security can be shortened to:
a. IPsec
b. InterPS
c. IP
d. None of the above
4. The most popular VPN Tunneling Protocols include:
a. Point-to-Point Tunneling Protocol
b. Layer Two Tunneling Protocol
c. Internet Protocol Security
d. All of the above
5. VPN stands for:
a. Virtual Private Network
b. Vibrate Peris Network
c. Vocal Ping Network
d. Vendor Public Network
Wesley Morefield
1. Onion routing uses several layers of encryption while you browse the internet. Which server can see your unencrypted information?
a. The first Tor server
b. A middle Tor server
c. The last Tor server
d. A router between Tor servers
2. Which of the following does the Tor network do to help you remain anonymous online?
a. Block your cookies
b. Filter personal information
c. Hides your IP address
d. Protects you against viruses
3. Which of the following will help you remain anonymous online?
a. Enable all cookies
b. Use plugins
c. Ensure that you are using Tor before logging in to websites.
d. None of the above
4. Which of the following is a reason to use Tor?
a. Get around government censored internet.
b. Bypass corporate internet filtering.
c. Both a and b.
d. Neither a nor b.
5. When did AOL mistakenly give everyone access to their search engine tracking database?
a. 1996
b. 2000
c. 2006
d. 2010