Exam 6: Intrusion and Emailinternet Security Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which component is included in IP security?

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

A

Which of the following is not a strong security protocol?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

C

PGP makes use of which cryptographic algorithm?

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

C

An attempt to make a computer resource unavailable to its intended users is called

(Multiple Choice)
4.8/5
(39)

PGP security system uses

(Multiple Choice)
4.8/5
(39)

is used for hiding the payment information from the merchant.

(Multiple Choice)
4.7/5
(44)

Why did SSL certificate require in HTTP?

(Multiple Choice)
4.8/5
(41)

PGP is used in

(Multiple Choice)
4.7/5
(36)

If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.

(True/False)
4.9/5
(30)

In tunnel mode, IPSec protects the

(Multiple Choice)
4.8/5
(31)

The stored cookie which contains all your personal data about that website can be stolen away by________using or trojans.

(Multiple Choice)
4.8/5
(31)

Who created PGP?

(Multiple Choice)
4.9/5
(36)

The cryptography algorithms used in S/MIME are .

(Multiple Choice)
4.9/5
(39)

S/MIME stands for________ .

(Multiple Choice)
4.8/5
(40)

Which of them is not a proper method for email security?

(Multiple Choice)
4.8/5
(37)

What is the key size allowed in PGP?

(Multiple Choice)
4.7/5
(37)

What is the PGP stand for?

(Multiple Choice)
4.9/5
(41)

What are email security services?

(Multiple Choice)
4.8/5
(33)

In S/MIME,MLA stands for .

(Multiple Choice)
4.7/5
(31)

IPSec is designed to provide security at the

(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)