Exam 12: Network Security
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections79 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
One of the primary functions of Kerberos is to authenticate users.
Free
(True/False)
4.7/5
(41)
Correct Answer:
True
____ is data before any encryption has been performed.
Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
A
A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.
(True/False)
4.8/5
(32)
The idea behind ____________________ spread spectrum transmission is to bounce the signal around on random frequencies rather than transmit it on one fixed frequency.
(Short Answer)
4.9/5
(45)
Some computer systems generate random passwords that are very difficult to guess, but are also hard to remember.
(True/False)
4.7/5
(41)
With ____________________, the data is encrypted using DES three times-the first time by a first key, the second time by a second key, and the third time by the first key again.
(Short Answer)
4.9/5
(31)
____________________ is the art and science of hiding information inside other, seemingly ordinary messages or documents.
(Short Answer)
4.8/5
(33)
____________________ is the study of creating and using encryption and decryption techniques.
(Short Answer)
4.9/5
(38)
A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.
(Multiple Choice)
4.8/5
(40)
Antivirus software with ________________________________________ runs in the background while an application that the user is executing runs in the foreground.
(Short Answer)
4.8/5
(38)
When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password, the type of attack is termed ____________________.
(Short Answer)
4.8/5
(38)
A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.
(Multiple Choice)
4.9/5
(35)
In ____, a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site.
(Multiple Choice)
4.9/5
(39)
The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions.
(Multiple Choice)
4.8/5
(48)
Controlling access to a computer network involves deciding and then limiting who can use the system and when the system can be used.
(True/False)
4.9/5
(39)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)