Exam 1: Cybersecurity and Network Protocols
Exam 1: Cybersecurity and Network Protocols23 Questions
Exam 2: DNS, IDS/IPS, and Digital Investigations9 Questions
Exam 3: Investigative Techniques and Digital Evidence in Crime Investigations5 Questions
Exam 4: Information Security and Encryption Terminology23 Questions
Exam 5: Cryptography and Data Protection22 Questions
Exam 6: Cryptography and VPNS23 Questions
Exam 7: Cryptography and Security Measures in Network Communication23 Questions
Exam 8: Cryptography Terminology and Techniques25 Questions
Exam 9: Cryptography and Network Security22 Questions
Exam 10: Information Security and Network Protocols23 Questions
Exam 11: Cryptography and Cryptographic Protocols23 Questions
Exam 12: Security Protocols, VPNS, and Firewalls21 Questions
Exam 13: Understanding Cyber-Crime and Firewall Technologies in IT Act29 Questions
Select questions type
Imagine a social networking web app (like Twitter) that allows users to post short blurbs of text.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
D
The domain name space (tree) is devided into---------different sections
(Multiple Choice)
4.8/5
(33)
The _____domains define registered hosts according to their generic behaviour.
(Multiple Choice)
4.9/5
(39)
An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL
(Multiple Choice)
4.9/5
(31)
The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.
(Multiple Choice)
4.8/5
(39)
A ___________ is an extension of an enterprise's private intranet across a public network such as the internet, creating a secure private connection.
(Multiple Choice)
4.9/5
(41)
In the _______ mode, IPSec protects the whole IP packet, including the original IP header.
(Multiple Choice)
4.9/5
(30)
For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm's principal and the principal's associated "secret keys".
(Multiple Choice)
4.8/5
(36)
What are the two primary classifications of cross-site scripting?
(Multiple Choice)
4.9/5
(30)
What is necessary for a cross-site script attack with cookies to be thwarted
(Multiple Choice)
4.9/5
(39)
For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.
(Multiple Choice)
4.7/5
(39)
Showing 1 - 20 of 23
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)