Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

One of the primary functions of Kerberos is to authenticate users.

Free
(True/False)
4.7/5
(41)
Correct Answer:
Verified

True

____ is data before any encryption has been performed.

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

A

A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.

(True/False)
4.8/5
(32)

The idea behind ____________________ spread spectrum transmission is to bounce the signal around on random frequencies rather than transmit it on one fixed frequency.

(Short Answer)
4.9/5
(45)

Some computer systems generate random passwords that are very difficult to guess, but are also hard to remember.

(True/False)
4.7/5
(41)

With ____________________, the data is encrypted using DES three times-the first time by a first key, the second time by a second key, and the third time by the first key again.

(Short Answer)
4.9/5
(31)

____________________ is the art and science of hiding information inside other, seemingly ordinary messages or documents.

(Short Answer)
4.8/5
(33)

Pings are used most commonly by Unix-based systems.

(True/False)
4.7/5
(42)

____________________ is the study of creating and using encryption and decryption techniques.

(Short Answer)
4.9/5
(38)

A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.

(Multiple Choice)
4.8/5
(40)

Antivirus software with ________________________________________ runs in the background while an application that the user is executing runs in the foreground.

(Short Answer)
4.8/5
(38)

When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password, the type of attack is termed ____________________.

(Short Answer)
4.8/5
(38)

How does phishing work?

(Essay)
4.8/5
(43)

A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.

(Multiple Choice)
4.9/5
(35)

In ____, a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site.

(Multiple Choice)
4.9/5
(39)

____ may be considered a form of physical protection.

(Multiple Choice)
4.8/5
(35)

Auditing a computer system is often a good way to deter crime.

(True/False)
4.9/5
(38)

The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions.

(Multiple Choice)
4.8/5
(48)

Controlling access to a computer network involves deciding and then limiting who can use the system and when the system can be used.

(True/False)
4.9/5
(39)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)