Exam 3: Security Through Authentication and Encryption
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
Is MD4 incorporated into Microsoft's MS-CHAP v2 hashing algorithm?
Free
(True/False)
4.8/5
(30)
Correct Answer:
False
What encryption method does Red Hat Linux use by default?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
B
Does each security token have a unique identification number built into it, so that the authentication server can verify the security token before issuing a password?
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
What authentication method was designed using SSL as a model and is supported by the IETF as an Internet standard for secure communications?
(Multiple Choice)
4.8/5
(35)
What is the RSA key size used by MPPE when it is configured for strongest encryption?
(Multiple Choice)
4.7/5
(37)
In a(n) ____________________ attack every character combination is used in an attempt to determine the password of an account.
(Short Answer)
4.9/5
(34)
List eight different encryption techniques that are designed to help protect stored or transmitted data.
(Essay)
4.8/5
(38)
TLS uses private-key symmetric data encryption and the TLS Handshake Protocol for secure communications.
(True/False)
4.9/5
(29)
The ethereal sniffer software only functions on Linux/UNIX computers.
(True/False)
4.9/5
(29)
Which of the following operating systems recognizes the original NTLM logon authentication?
(Multiple Choice)
4.8/5
(36)
Which of the following cipher command-line parameters provides the account employing cipher with a new encryption key?
(Multiple Choice)
4.8/5
(34)
____________________ authenticates by using tickets to verify client and server communications, and employs private-key encryption.
(Short Answer)
4.8/5
(32)
When Windows 2000 Server or Windows Server 2003 is contacted by a client using IPSec configured in the Client (____________________) role, it will respond by using IPSec communication.
(Short Answer)
4.8/5
(24)
_____ is a set of IP-based secure communications and encryption standards created by the IETF, and was developed to provide secure network communications.
(Multiple Choice)
4.8/5
(34)
What needs to be installed in order for Windows 95 and Windows 98 to use NTLM v2?
(Multiple Choice)
5.0/5
(28)
Which of the following cipher command-line parameters decrypts the contents of the specified folder and sets the folder so that any files added to the folder are not encrypted?
(Multiple Choice)
4.9/5
(33)
Which authentication method employs a unique set of digital information or a digital signature with a communication or a file as a means to verify the source and uses public-key asymmetrical encryption?
(Multiple Choice)
4.9/5
(46)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)