Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ is a list of certificates that have been revoked before their originally scheduled expiration date.

(Multiple Choice)
4.9/5
(46)

The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.

(True/False)
4.9/5
(42)

____________________ (SSL) is an additional layer of software added between the application layer and the transport (TCP) layer that creates a secure connection between sender and receiver.

(Short Answer)
4.9/5
(30)

_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.

(Short Answer)
4.9/5
(33)

Top-level executives often have access to a narrow range of information within a company.

(True/False)
4.8/5
(35)

A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.

(Multiple Choice)
4.8/5
(33)

A computer ____________________ is a program that copies itself from one system to another over a network, without the assistance of a human being.

(Short Answer)
4.7/5
(48)

A(n) ____________________ is a condition in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.

(Short Answer)
4.8/5
(45)

Possibly the earliest example of a polyalphabetic cipher is the ____ cipher.

(Multiple Choice)
4.8/5
(37)

The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.

(Multiple Choice)
4.8/5
(35)

Public key cryptography is also called ____________________ encryption.

(Short Answer)
4.7/5
(35)

What are some of the standard rules for creating or changing a password?

(Essay)
4.8/5
(25)

The first security protocol for wireless LANs was ____.

(Multiple Choice)
4.9/5
(39)

A proxy server sits inside a company's corporate network.

(True/False)
4.8/5
(35)

A ____ virus is a common type of virus that is programmed into an attached macro file.

(Multiple Choice)
4.7/5
(38)

A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.

(Short Answer)
4.7/5
(32)

The two leading attack methods for the last few years have exploited known vulnerabilities in operating systems and in application software.

(True/False)
4.9/5
(36)

____ involves electronically monitoring data flow and system requests into and out of their systems.

(Multiple Choice)
4.8/5
(34)

Expensive computer systems should always be placed in the basements of buildings.

(True/False)
4.9/5
(35)

One of the inherent problems with protecting a single key is that it means that only one key is used to both encode and decode the message.

(True/False)
4.8/5
(42)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)