Exam 12: Network Security
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections79 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
A digital certificate, or simply a(n) ____________________, is an electronic document, similar to a passport, that establishes your credentials when you are performing transactions on the World Wide Web.
(Short Answer)
4.8/5
(34)
A(n) ____ is the computer program that converts plaintext into an enciphered form.
(Multiple Choice)
4.9/5
(40)
One popular application of IPsec is in the support of virtual private networks.
(True/False)
4.7/5
(33)
In computer terminology, a(n) ____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource.
(Short Answer)
4.8/5
(41)
Rarely, passwords become known, or "misplaced," and fall into the wrong hands.
(True/False)
4.7/5
(33)
____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.
(Multiple Choice)
4.9/5
(37)
A packet filter firewall is a computer running proxy server software, whose function is much like that of a librarian who controls access to books in a library's rare books room.
(True/False)
4.7/5
(35)
____ scanning works by recognizing the unique pattern of a virus.
(Multiple Choice)
4.9/5
(48)
The ____________________ substitution-based cipher uses multiple alphabetic strings to encode the plaintext, rather than one alphabetic string.
(Short Answer)
4.7/5
(26)
____________________ define the network resources that a user or set of users can access.
(Short Answer)
4.8/5
(38)
WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP).
(True/False)
4.8/5
(49)
Many employees feel surveillance is an intrusion into their privacy.
(True/False)
4.9/5
(30)
The ____________________ cipher was devised by Blaise de Vigenére in 1586.
(Short Answer)
4.7/5
(35)
____ is a set of protocols created to support the secure transfer of data at the IP layer.
(Multiple Choice)
4.9/5
(34)
In ____________________, a perpetrator sends an excessive amount of unwanted e-mail messages to someone.
(Short Answer)
4.9/5
(26)
____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.
(Multiple Choice)
4.8/5
(38)
The ____________________ is the data after the encryption algorithm has been applied.
(Short Answer)
4.9/5
(33)
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.
(Multiple Choice)
4.7/5
(36)
A(n) ____________________ is a system or combination of systems that supports an access control policy between two networks.
(Short Answer)
4.9/5
(29)
To authenticate electronic documents as yours, you need to create a digital signature.
(True/False)
4.8/5
(41)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)