Exam 12: Network Security
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections79 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
A ____ is a list of certificates that have been revoked before their originally scheduled expiration date.
(Multiple Choice)
4.9/5
(46)
The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.
(True/False)
4.9/5
(42)
____________________ (SSL) is an additional layer of software added between the application layer and the transport (TCP) layer that creates a secure connection between sender and receiver.
(Short Answer)
4.9/5
(30)
_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.
(Short Answer)
4.9/5
(33)
Top-level executives often have access to a narrow range of information within a company.
(True/False)
4.8/5
(35)
A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.
(Multiple Choice)
4.8/5
(33)
A computer ____________________ is a program that copies itself from one system to another over a network, without the assistance of a human being.
(Short Answer)
4.7/5
(48)
A(n) ____________________ is a condition in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.
(Short Answer)
4.8/5
(45)
Possibly the earliest example of a polyalphabetic cipher is the ____ cipher.
(Multiple Choice)
4.8/5
(37)
The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.
(Multiple Choice)
4.8/5
(35)
Public key cryptography is also called ____________________ encryption.
(Short Answer)
4.7/5
(35)
What are some of the standard rules for creating or changing a password?
(Essay)
4.8/5
(25)
A ____ virus is a common type of virus that is programmed into an attached macro file.
(Multiple Choice)
4.7/5
(38)
A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.
(Short Answer)
4.7/5
(32)
The two leading attack methods for the last few years have exploited known vulnerabilities in operating systems and in application software.
(True/False)
4.9/5
(36)
____ involves electronically monitoring data flow and system requests into and out of their systems.
(Multiple Choice)
4.8/5
(34)
Expensive computer systems should always be placed in the basements of buildings.
(True/False)
4.9/5
(35)
One of the inherent problems with protecting a single key is that it means that only one key is used to both encode and decode the message.
(True/False)
4.8/5
(42)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)