Exam 19: Security Threats and Solutions in Cryptography and Access Control

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following is a limitation of packet-filtering firewalls?

(Multiple Choice)
4.9/5
(35)

Which of the following is not true of a capability?

(Multiple Choice)
4.9/5
(35)

A resident virus is a virus that ________.

(Multiple Choice)
4.7/5
(26)

________ is not required for secure transactions.

(Multiple Choice)
4.9/5
(31)

A substitution cipher ________.

(Multiple Choice)
4.9/5
(43)

How is authentication in Kerberos handled?

(Multiple Choice)
4.8/5
(32)

Access rights define how various ________ can access various ________.

(Multiple Choice)
4.8/5
(34)

The Secure Sockets Layer does not ________.

(Multiple Choice)
4.9/5
(32)

A common software exploitation is a ________.

(Multiple Choice)
4.7/5
(29)

Trojan horse viruses are difficult to detect because ________.

(Multiple Choice)
4.8/5
(32)

Which of the following is not true of PGP?

(Multiple Choice)
4.9/5
(33)

Cryptography is important because it ________.

(Multiple Choice)
4.9/5
(42)

According to the text, approximately how many attacks on corporate networks are internal?

(Multiple Choice)
4.7/5
(34)

Each cell in an access control matrix represents ________.

(Multiple Choice)
4.8/5
(42)

A distributed denial-of-service attack is ________.

(Multiple Choice)
4.8/5
(39)

The primary appeal of a role-based access control model is that ________.

(Multiple Choice)
4.8/5
(36)

A user can be identified by ________.

(Multiple Choice)
4.9/5
(36)

Which of the following is a problem for implementing wireless security?

(Multiple Choice)
4.8/5
(38)

________ is the most common key-agreement protocol.

(Multiple Choice)
5.0/5
(36)

A biometric is a(n) ________.

(Multiple Choice)
4.7/5
(35)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)