Exam 10: Introduction to Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

______________________________ (WEP)provides data encryption so that a casual attacker who gains access to your wireless signals sees only encrypted gibberish.

(Short Answer)
4.8/5
(36)

Digital certificates involve a third party called a(n)_________________________ (CA).

(Short Answer)
4.9/5
(35)

How can you create VPNs in a Windows environment?

(Essay)
4.8/5
(42)

____ allows administrators to control who has access to the network.

(Multiple Choice)
4.8/5
(45)

____ are temporary or permanent connections across a public network-such as the Internet-that use encryption technology to transmit and receive data.

(Multiple Choice)
4.7/5
(30)

____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.

(Multiple Choice)
4.9/5
(31)

A(n)____________________ firewall is installed on a computer or server and simply inspects all packets coming into or leaving the computer.

(Short Answer)
4.9/5
(29)

In Windows OSs, with ____ permissions administrators can assign permissions to files as well as folders, so one level of permission can be assigned to a folder but a different level of permission assigned to files in the folder, if needed.

(Multiple Choice)
5.0/5
(40)
Showing 41 - 48 of 48
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)