Exam 11: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ protocols are the rules that computers follow to accomplish authentication.

(Multiple Choice)
4.9/5
(36)

____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.

(Multiple Choice)
4.7/5
(41)

In ____, both computers verify the credentials of the other.

(Multiple Choice)
4.8/5
(32)

A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

(Multiple Choice)
4.8/5
(28)

A router that is not configured to drop packets that match certain or suspicious characteristics is an example of a risk associated with ____.

(Multiple Choice)
4.8/5
(35)

A(n) ____________________ identifies an organization's security risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.

(Short Answer)
4.7/5
(36)

RADIUS and TACACS belong to a category of protocols known as AAA (____).

(Multiple Choice)
4.8/5
(34)

A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.

(True/False)
4.8/5
(32)

A ____ attack occurs when a system becomes unable to function because it has inundated with requests for services and can't respond to any of them.

(Multiple Choice)
4.8/5
(43)

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

(Multiple Choice)
4.8/5
(29)

Describe who should conduct a security audit and the advantages of doing so, if any.

(Essay)
4.8/5
(33)

Encryption is the last means of defense against data theft.

(True/False)
4.8/5
(39)

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

(Multiple Choice)
5.0/5
(33)

By default, the 802.11 standard offers substantial security.

(True/False)
4.8/5
(24)

The use of certificate authorities to associate public keys with certain users is known as ____.

(Multiple Choice)
4.9/5
(33)

____ is a method of encrypting TCP/IP transmissions above the network layer.

(Multiple Choice)
4.8/5
(34)

Describe the SCP (Secure CoPy) utility.

(Essay)
4.8/5
(39)

A(n) ____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.

(Multiple Choice)
4.8/5
(30)

In a ____ attack, a person redirects or captures secure transmissions as they occur.

(Multiple Choice)
4.9/5
(31)

____ software searches a node for open ports.

(Multiple Choice)
4.7/5
(33)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)