Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A digital certificate, or simply a(n) ____________________, is an electronic document, similar to a passport, that establishes your credentials when you are performing transactions on the World Wide Web.

(Short Answer)
4.8/5
(34)

A(n) ____ is the computer program that converts plaintext into an enciphered form.

(Multiple Choice)
4.9/5
(40)

One popular application of IPsec is in the support of virtual private networks.

(True/False)
4.7/5
(33)

In computer terminology, a(n) ____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource.

(Short Answer)
4.8/5
(41)

Rarely, passwords become known, or "misplaced," and fall into the wrong hands.

(True/False)
4.7/5
(33)

____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.

(Multiple Choice)
4.9/5
(37)

A packet filter firewall is a computer running proxy server software, whose function is much like that of a librarian who controls access to books in a library's rare books room.

(True/False)
4.7/5
(35)

____ scanning works by recognizing the unique pattern of a virus.

(Multiple Choice)
4.9/5
(48)

The ____________________ substitution-based cipher uses multiple alphabetic strings to encode the plaintext, rather than one alphabetic string.

(Short Answer)
4.7/5
(26)

____________________ define the network resources that a user or set of users can access.

(Short Answer)
4.8/5
(38)

WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP).

(True/False)
4.8/5
(49)

Many employees feel surveillance is an intrusion into their privacy.

(True/False)
4.9/5
(30)

The ____________________ cipher was devised by Blaise de Vigenére in 1586.

(Short Answer)
4.7/5
(35)

____ is a set of protocols created to support the secure transfer of data at the IP layer.

(Multiple Choice)
4.9/5
(34)

In ____________________, a perpetrator sends an excessive amount of unwanted e-mail messages to someone.

(Short Answer)
4.9/5
(26)

____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.

(Multiple Choice)
4.8/5
(38)

The ____________________ is the data after the encryption algorithm has been applied.

(Short Answer)
4.9/5
(33)

____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.

(Multiple Choice)
4.7/5
(36)

A(n) ____________________ is a system or combination of systems that supports an access control policy between two networks.

(Short Answer)
4.9/5
(29)

To authenticate electronic documents as yours, you need to create a digital signature.

(True/False)
4.8/5
(41)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)