Exam 16: Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

User authentication can be based on_______________

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

B

MS Word documents in RTF format are resistant to macro viruses.

Free
(True/False)
5.0/5
(31)
Correct Answer:
Verified

True

It is much faster for a computer to encode and decode ciphertext by using the usual symmetric algorithms than by using asymmetric algorithms.

Free
(True/False)
4.8/5
(39)
Correct Answer:
Verified

True

In a symmetric encryption algorithm, one key is used to encrypt and a different one is used to decrypt.

(True/False)
4.9/5
(40)

How are one-time password systems implemented?

(Essay)
4.8/5
(36)

Vulnerability scans can check:

(Multiple Choice)
4.8/5
(30)

________________ encrypts the information on the target computer and renders it inaccessible to the owner

(Multiple Choice)
4.9/5
(42)

A firewall is installed between the trusted and the untrusted.

(True/False)
4.9/5
(42)

Port scanning allows a hacker to__________________

(Multiple Choice)
4.9/5
(42)

To protect the systems we have to ensure security on the following level:

(Multiple Choice)
4.9/5
(37)

TLS provides security at the _______ layer.

(Multiple Choice)
4.8/5
(32)

When a user logs on, MW Windows 10 creates a list of files which can be used by the user.

(True/False)
4.8/5
(34)

Why an asymmetric encryption algorithm uses two keys?

(Essay)
4.8/5
(32)

Transport Layer Security (TLS) employs server's certificate from certification authority (CA).

(True/False)
4.8/5
(33)

______________ virus changes each time it is installed to avoid detection by antivirus software.

(Multiple Choice)
4.8/5
(34)

Describe the idea of masquerading attack.

(Essay)
4.8/5
(43)

What does a security policy include?

(Essay)
4.8/5
(43)

The attack surface is the set of points at which an attacker can try to break into the system.

(True/False)
4.7/5
(34)

What is the reason to use a stream cipher?

(Essay)
4.8/5
(29)

Describe the problem of a buffer overflow.

(Essay)
4.8/5
(43)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)