Exam 10: Protection Mechanisms

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Digital key infrastructure is the entire set of hardware,software,and cryptosystems necessary to implement asymmetric key encryption in online commerce.

Free
(True/False)
4.8/5
(43)
Correct Answer:
Verified

False

____________________ is the confirmation of the identity of the entity accessing a logical or physical area.

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

Authentication

A(n)____________________ is a private word or combination of characters known only by the user.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

password

____________________ is the organized research of Internet addresses owned or controlled by a target organization,identified from public Internet data sources..

(Short Answer)
5.0/5
(28)

Fourth generation firewalls,known as ____,allow only specific packets with a particular source,destination,and port address to pass through it.

(Multiple Choice)
4.7/5
(34)

____ are scanning and analysis tools that are capable of scanning networks for very detailed information.

(Multiple Choice)
4.8/5
(34)

What should you look for when selecting a firewall for your network?

(Essay)
4.9/5
(38)

A dumb card is a category that includes ID and ATM cards with magnetic strips containing the digital PIN against which a user's input is compared.

(True/False)
4.8/5
(35)

Port number ____ is commonly used for the Simple Mail Transfer Protocol service.

(Multiple Choice)
4.8/5
(40)

____ controls defend against threats from within the organization.

(Multiple Choice)
4.8/5
(32)

____________________ or genetic authentication is not yet a cost-effective and socially accepted technology that can be included in the "something you are" category.

(Short Answer)
4.8/5
(33)

Which of the following characteristics currently used today for authentication purposes is NOT considered truly unique?

(Multiple Choice)
4.8/5
(39)

A ____ commonly combines a separate dedicated firewall such as an application proxy server with a packet filtering router.

(Multiple Choice)
4.9/5
(35)

Trap and Trace applications collect and analyze copies of packets from the network.

(True/False)
4.8/5
(30)

A firewall uses its ____ to decide whether or not to allow packets into the network.

(Multiple Choice)
4.8/5
(33)

____ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP/IP family of protocol standards,including use for VPNs.

(Multiple Choice)
4.8/5
(32)

The transformation of individual components such as characters or bits of an unencrypted message into encrypted components is known as ____.

(Multiple Choice)
4.8/5
(33)

The "something you have" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.

(True/False)
4.8/5
(27)

The trace function in a trap and trace scanning tool entices individuals who are illegally perusing the internal sections of a network,in order to determine who they are._________________________

(True/False)
5.0/5
(29)

Technical controls alone are adequately equipped to ensure a secure IT environment.

(True/False)
4.8/5
(36)
Showing 1 - 20 of 133
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)