Exam 13: Information Security
Exam 1: Telecommunications Overview92 Questions
Exam 2: Principles of Telecommunications Technology83 Questions
Exam 3: The Evolution of Telecommunications Technology and Policy93 Questions
Exam 4: The Public Network94 Questions
Exam 5: Customer Premise Equipment and Applications94 Questions
Exam 6: Signaling and Switching93 Questions
Exam 7: Data Networking Fundamentals89 Questions
Exam 8: Physical Transmission Media94 Questions
Exam 9: Wireless Transmission and Services95 Questions
Exam 10: Network Access and Transmission Methods93 Questions
Exam 11: Data Network Connectivity92 Questions
Exam 12: Internet Standards and Services91 Questions
Exam 13: Information Security92 Questions
Exam 14: Convergence of Voice, Video, and Data93 Questions
Select questions type
Match each statement below with the correct item
-The method whereby two nodes using key encryption agree on common parameter for the keys they will use to encrypt data.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
H
War driving is searching for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions. _________________________
Free
(True/False)
4.8/5
(44)
Correct Answer:
True
What term is used to describe the use of a microphone with a small RF transmitter placed near an audio source and a nearby receiver to eavesdrop?
Free
(Short Answer)
4.9/5
(42)
Correct Answer:
Bugging
Which of the following is first phase of IPSec authentication which accomplishes key management?
(Multiple Choice)
4.8/5
(32)
Which of the following is a password-protected and encrypted file that holds an individual's identification information, including a private and a public key?
(Multiple Choice)
4.9/5
(32)
Does the term key pair refer to the combination of the public key and private key?
(True/False)
4.9/5
(35)
Does the term digital certificate refer to the way in which two nodes agree on common parameters for the keys they will use?
(True/False)
4.8/5
(33)
What term is used to describe the first phase of IPSec authentication in which key management is accomplished?
(Short Answer)
4.7/5
(40)
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as ____________________.
(Short Answer)
4.9/5
(31)
Which of the following is the URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption?
(Multiple Choice)
4.8/5
(38)
A public-key server is a publicly accessible host that freely provides a list of users' public keys.
(True/False)
4.9/5
(33)
Which of the following is a method of encrypting TCP/IP transmissions en route between the client and server using public key encryption technology?
(Multiple Choice)
4.7/5
(35)
Match each statement below with the correct item
-The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption.
(Multiple Choice)
4.8/5
(31)
Which of the following describes an association between the client and the server that is defined by an agreement on a specific set of encryption techniques?
(Multiple Choice)
4.7/5
(34)
The unique data block that results when an original piece of data is encrypted, is referred to as:
(Multiple Choice)
4.8/5
(33)
____________________ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
(Short Answer)
4.9/5
(28)
Which of the following is also referred to as private key encryption?
(Multiple Choice)
4.7/5
(33)
The unauthorized use of a telephone line to complete long distance calls at another's expense is referred to as:
(Multiple Choice)
4.7/5
(26)
Which of the following is a router that operates at the Data Link and Transport layers of the OSI model, examining the header of every packet of data that it receives to determine whether that type of packet is authorized to continue to its destination?
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 92
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)