Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Because of security concerns, modern network operating systems do not allow network administrators to create workgroups.

(True/False)
4.8/5
(43)

If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.

(Multiple Choice)
4.8/5
(37)

A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.

(Multiple Choice)
4.9/5
(35)

____ usually involves having a software program that monitors every transaction within a system.

(Multiple Choice)
4.7/5
(41)

The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.

(True/False)
4.9/5
(33)

The concept of two keys, public and private, is called ____ cryptography.

(Multiple Choice)
4.8/5
(37)

A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.

(Short Answer)
4.7/5
(30)

IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys.

(Multiple Choice)
4.8/5
(44)

Early cryptography algorithms used the same key for both encryption and decryption.

(True/False)
4.7/5
(38)

____ cable represented a major improvement in the ability of transmission media to secure sensitive data.

(Multiple Choice)
4.9/5
(37)

What information does a certificate contain?

(Essay)
4.9/5
(35)

All system attacks need a user to open an e-mail or Web page.

(True/False)
4.9/5
(51)

An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.

(Multiple Choice)
4.9/5
(33)

Internet systems are the only systems that experience security problems.

(True/False)
4.9/5
(43)

____ is the combination of encryption techniques, software, and services that involves all the necessary pieces to support digital certificates, certificate authorities, and public key generation, storage, and management.

(Multiple Choice)
4.9/5
(37)

____________________ techniques that observe and record some aspect of the user, such as voiceprints, fingerprints, eyeprints, and faceprints, appear to be the wave of the future to replace passwords.

(Short Answer)
4.9/5
(36)

One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____.

(Multiple Choice)
4.8/5
(42)

If you exclusive-OR a 0 and a 0, as is done with certain spread spectrum techniques, the result is 1.

(True/False)
4.7/5
(33)

A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.

(Multiple Choice)
4.8/5
(34)

In an effort to create an encryption scheme that could be used by the average person, an entrepreneur named Philip Zimmermann created encryption software called _________________________.

(Essay)
4.9/5
(36)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)