Exam 12: Network Security
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections79 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
Because of security concerns, modern network operating systems do not allow network administrators to create workgroups.
(True/False)
4.8/5
(43)
If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.
(Multiple Choice)
4.8/5
(37)
A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.
(Multiple Choice)
4.9/5
(35)
____ usually involves having a software program that monitors every transaction within a system.
(Multiple Choice)
4.7/5
(41)
The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.
(True/False)
4.9/5
(33)
The concept of two keys, public and private, is called ____ cryptography.
(Multiple Choice)
4.8/5
(37)
A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.
(Short Answer)
4.7/5
(30)
IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys.
(Multiple Choice)
4.8/5
(44)
Early cryptography algorithms used the same key for both encryption and decryption.
(True/False)
4.7/5
(38)
____ cable represented a major improvement in the ability of transmission media to secure sensitive data.
(Multiple Choice)
4.9/5
(37)
An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.
(Multiple Choice)
4.9/5
(33)
Internet systems are the only systems that experience security problems.
(True/False)
4.9/5
(43)
____ is the combination of encryption techniques, software, and services that involves all the necessary pieces to support digital certificates, certificate authorities, and public key generation, storage, and management.
(Multiple Choice)
4.9/5
(37)
____________________ techniques that observe and record some aspect of the user, such as voiceprints, fingerprints, eyeprints, and faceprints, appear to be the wave of the future to replace passwords.
(Short Answer)
4.9/5
(36)
One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____.
(Multiple Choice)
4.8/5
(42)
If you exclusive-OR a 0 and a 0, as is done with certain spread spectrum techniques, the result is 1.
(True/False)
4.7/5
(33)
A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.
(Multiple Choice)
4.8/5
(34)
In an effort to create an encryption scheme that could be used by the average person, an entrepreneur named Philip Zimmermann created encryption software called _________________________.
(Essay)
4.9/5
(36)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)