Exam 13: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each statement below with the correct item -The method whereby two nodes using key encryption agree on common parameter for the keys they will use to encrypt data.

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

H

War driving is searching for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions. _________________________

Free
(True/False)
4.8/5
(44)
Correct Answer:
Verified

True

What term is used to describe the use of a microphone with a small RF transmitter placed near an audio source and a nearby receiver to eavesdrop?

Free
(Short Answer)
4.9/5
(42)
Correct Answer:
Verified

Bugging

In private key encryption, is data encrypted with two keys?

(True/False)
4.9/5
(31)

Which of the following is first phase of IPSec authentication which accomplishes key management?

(Multiple Choice)
4.8/5
(32)

Which of the following is a password-protected and encrypted file that holds an individual's identification information, including a private and a public key?

(Multiple Choice)
4.9/5
(32)

Does the term key pair refer to the combination of the public key and private key?

(True/False)
4.9/5
(35)

Does the term digital certificate refer to the way in which two nodes agree on common parameters for the keys they will use?

(True/False)
4.8/5
(33)

What term is used to describe the first phase of IPSec authentication in which key management is accomplished?

(Short Answer)
4.7/5
(40)

Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as ____________________.

(Short Answer)
4.9/5
(31)

Which of the following is the URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption?

(Multiple Choice)
4.8/5
(38)

A public-key server is a publicly accessible host that freely provides a list of users' public keys.

(True/False)
4.9/5
(33)

Which of the following is a method of encrypting TCP/IP transmissions en route between the client and server using public key encryption technology?

(Multiple Choice)
4.7/5
(35)

Match each statement below with the correct item -The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption.

(Multiple Choice)
4.8/5
(31)

Which of the following describes an association between the client and the server that is defined by an agreement on a specific set of encryption techniques?

(Multiple Choice)
4.7/5
(34)

The unique data block that results when an original piece of data is encrypted, is referred to as:

(Multiple Choice)
4.8/5
(33)

____________________ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.

(Short Answer)
4.9/5
(28)

Which of the following is also referred to as private key encryption?

(Multiple Choice)
4.7/5
(33)

The unauthorized use of a telephone line to complete long distance calls at another's expense is referred to as:

(Multiple Choice)
4.7/5
(26)

Which of the following is a router that operates at the Data Link and Transport layers of the OSI model, examining the header of every packet of data that it receives to determine whether that type of packet is authorized to continue to its destination?

(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 92
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)