Guide To Firewalls and Network Security: Chapter 7 Solutions
Guide To Firewalls and Network Security: Chapter 7 Solutions
Guide To Firewalls and Network Security: Chapter 7 Solutions
Chapter 7 Solutions
Review Questions
1. Encryption is used to protect data at what point?
Answer: A. Firewalls are unable to encrypt data in transit on the Internet. Also, it makes no sense to
encrypt data arriving on the external interface from the Internet.
2. Encryption preserves what aspect of digital data passing between networks? (Choose all that apply.)
Answer: A, B, and C are correct. Encryption has nothing to do with the usefulness or truthfulness of
the content of communications—that is the responsibility of the author.
5. Complete this sentence: An attack in which a hacker intercepts a public key is called a
______________…
Answer: C
9. You handle security for a corporation with 10 branch offices and 5,000 employees. You are tasked with
issuing security keys to each of these employees. How would you handle this?
Answer: Don’t try to do the key management manually; turn instead to a Certification Authority (CA)
to handle the issuance and management—to function as a Key Distribution Center (KDC), in other
words.
11. Finish this sentence: IPSec can save you the time and expense of installing...
Answer: A.
15. Finish the following sentence: IPSec is not a security method that provides __________....
Answer: ...end-to-end (in other words, end-user to end-user) security.
17. Digital certificates contain digital signatures and public keys as well as detailed information about the
certificate holder. However, the quality of all that information depends on one thing that neither you nor the
certificate holder can control. What is it?
Answer: C. You need to place trust in the Certification Authority that the holder of the certificate is
indeed who he or she claims to be.
18. What function of PGP can effectively erase unencrypted files from hard disks?
Answer: A
19. Which of the following is a “hybrid” security scheme that uses both symmetric and asymmetric encryption?
(Choose all that apply.)
Answer: C, D
20. What do the terms “thumbprint” or “fingerprint” mean in the context of encryption?
Answer: They describe the digital signature that is part of a digital certificate.
Hands-on Projects
Project 1
The digital “fingerprint of your PGP signing key consists of a hexadecimal code that can also be expressed
in English. The hexadecimal code consists of ten groups with four characters each. The English version
consists of twenty separate words. You toggle between the two versions of the fingerprint by checking or
un-checking the Hexadecimal box.
Project 2
You get the size in data bits of the key; the KeyID; the date the key was issued; the user’s name, and the
user’s e-mail address.
Project 3
N/A
Project 4
You see the original file plus an encrypted version, which has the file extension .pgp as well as the label
PGP Encrypted File
Project 5
You can select a standard key size (768, 1024, 1536, 2048, or 3072 bits), or enter a custom key size up to
4096 bits.
Project 6
The name of the certificate is now listed in the Root Certificate box.
Case Project 2
Both individuals should obtain a public/private key pair generated by an encryption program (The freeware
version of PGP would be an obvious choice.) You would obtain each other’s public key from a key server.
Then, attach the key to an e-mail address and use the key to encrypt your communications. The recipient
can then use his or her private key to decrypt the communications.
Case Project 3
Change the subkey associated with the signing key and use the new subkey to generate encryption keys.
You can then use the encryption keys to encrypt your e-mail or individual files.
Case Project 4
Right-click the file, point to PGP in the popup menu, and choose Encrypt to encrypt the file. Then right-
click the unencrypted version of the file, point to PGP, and choose Wipe, which erases the file completely
from your hard disk.