Exam 4: Engineering
Exam 1: Assessment7 Questions
Exam 2: Assets9 Questions
Exam 3: Communication39 Questions
Exam 4: Engineering69 Questions
Exam 5: ID and Access17 Questions
Exam 6: Management51 Questions
Exam 7: Operations85 Questions
Exam 8: Software22 Questions
Select questions type
What identifies blocks of memory that were once allocated, but are no longer in use and de-allocates the blocks and marks them as free?
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
C
You know that databases, applications, and integrity services are necessary for systems to work. What integrity service has uniqueness constraints?
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
B
What do constant voltage transformers regulate?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
B
For a cipher to be strong and avoid being broken, two elements must be a part of the encryption. Which attribute pertains to making the relationship between the key and resulting ciphertext as complex as possible?
(Multiple Choice)
4.8/5
(37)
Jenny has hidden a message to a coworker about a love triangle involving the boss in the company logo she used in the e-mail. What is Jenny practicing?
(Multiple Choice)
4.8/5
(30)
Fire can cause massive losses and cost lots in damage. What type of gas is used to interfere with the chemical reaction of fire?
(Multiple Choice)
4.9/5
(33)
Fred is encrypting a message to a coworker that is full of gossip, so his encryption strength had better be good. What doesn't Fred have to worry about when it comes to encryption strength?
(Multiple Choice)
4.9/5
(40)
Shelia notices that her computer hardware isn't working properly. She has also noticed that the night cleaning crew hasn't been in for a week. What could be causing Shelia's hardware problems?
(Multiple Choice)
4.8/5
(36)
What type of air-conditioning system maintains air quality and lessens contaminants?
(Multiple Choice)
4.8/5
(34)
Cryptography is really an issue of mathematics being used to put code into an undecipherable form or algorithms. Which algorithm takes a variable-length string and message and produces a fixed-length value?
(Multiple Choice)
4.7/5
(33)
Cryptography is really an issue of mathematics being used to create code into an undecipherable form or algorithms. What algorithm is easier to perform than to decipher?
(Multiple Choice)
4.7/5
(39)
Today, I have been to 17 different websites and each has recorded my interest on the sites. What technology is being used?
(Multiple Choice)
4.8/5
(39)
There are two commonly used modes of encryption implantations. Which mode of encryption implementation enables attackers to learn about a captured packet and where it is headed?
(Multiple Choice)
4.9/5
(26)
You know that databases, applications, and integrity services are necessary for systems to work. What integrity service deals with foreign keys and primary keys?
(Multiple Choice)
4.9/5
(36)
If Janet wanted to know data about the data, where could she find that information?
(Multiple Choice)
4.8/5
(34)
What type of lock provides protection from bystanders learning a set code?
(Multiple Choice)
4.8/5
(37)
Jack is happy that he has not had to pay for e-mail security since 1991 because of Phil Zimmerman. What email security does Jack use?
(Multiple Choice)
4.8/5
(36)
What algorithm enables two systems to exchange a symmetric key securely without requiring a previous relationship?
(Multiple Choice)
4.8/5
(36)
You are a security guard on the night shift. As you watch the CCTVs, you see the outside lights turn on within a specific area. What type of intrusion detection system are you evaluating?
(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)