Exam 4: Engineering

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What identifies blocks of memory that were once allocated, but are no longer in use and de-allocates the blocks and marks them as free?

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

C

You know that databases, applications, and integrity services are necessary for systems to work. What integrity service has uniqueness constraints?

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

B

What do constant voltage transformers regulate?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

B

For a cipher to be strong and avoid being broken, two elements must be a part of the encryption. Which attribute pertains to making the relationship between the key and resulting ciphertext as complex as possible?

(Multiple Choice)
4.8/5
(37)

Jenny has hidden a message to a coworker about a love triangle involving the boss in the company logo she used in the e-mail. What is Jenny practicing?

(Multiple Choice)
4.8/5
(30)

Fire can cause massive losses and cost lots in damage. What type of gas is used to interfere with the chemical reaction of fire?

(Multiple Choice)
4.9/5
(33)

Fred is encrypting a message to a coworker that is full of gossip, so his encryption strength had better be good. What doesn't Fred have to worry about when it comes to encryption strength?

(Multiple Choice)
4.9/5
(40)

Shelia notices that her computer hardware isn't working properly. She has also noticed that the night cleaning crew hasn't been in for a week. What could be causing Shelia's hardware problems?

(Multiple Choice)
4.8/5
(36)

What type of air-conditioning system maintains air quality and lessens contaminants?

(Multiple Choice)
4.8/5
(34)

Cryptography is really an issue of mathematics being used to put code into an undecipherable form or algorithms. Which algorithm takes a variable-length string and message and produces a fixed-length value?

(Multiple Choice)
4.7/5
(33)

Cryptography is really an issue of mathematics being used to create code into an undecipherable form or algorithms. What algorithm is easier to perform than to decipher?

(Multiple Choice)
4.7/5
(39)

Today, I have been to 17 different websites and each has recorded my interest on the sites. What technology is being used?

(Multiple Choice)
4.8/5
(39)

There are two commonly used modes of encryption implantations. Which mode of encryption implementation enables attackers to learn about a captured packet and where it is headed?

(Multiple Choice)
4.9/5
(26)

You know that databases, applications, and integrity services are necessary for systems to work. What integrity service deals with foreign keys and primary keys?

(Multiple Choice)
4.9/5
(36)

If Janet wanted to know data about the data, where could she find that information?

(Multiple Choice)
4.8/5
(34)

What type of lock provides protection from bystanders learning a set code?

(Multiple Choice)
4.8/5
(37)

Where are wiring and cables strung?

(Multiple Choice)
4.9/5
(42)

Jack is happy that he has not had to pay for e-mail security since 1991 because of Phil Zimmerman. What email security does Jack use?

(Multiple Choice)
4.8/5
(36)

What algorithm enables two systems to exchange a symmetric key securely without requiring a previous relationship?

(Multiple Choice)
4.8/5
(36)

You are a security guard on the night shift. As you watch the CCTVs, you see the outside lights turn on within a specific area. What type of intrusion detection system are you evaluating?

(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)