Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ techniques that observe and record some aspect of the user,such as voiceprints,fingerprints,eyeprints,and faceprints,appear to be the wave of the future to replace passwords.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

Biometric

A(n)______________________________ is either specialized software on a network or a trusted third-party organization or business that issues and manages certificates.

Free
(Short Answer)
4.9/5
(40)
Correct Answer:
Verified

certificate authority (CA)
certificate authority
CA

IEEE ____ addresses both weaknesses of WEP by allowing the keys,encryption algorithms,and negotiation to be dynamically assigned,and by adopting the AES encryption based on the Rijndael algorithm with 128-,192-,or 256-bit keys.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

A(n)____________________ is a condition in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.

(Short Answer)
4.9/5
(36)

Controlling access to a computer network involves deciding and then limiting who can use the system and when the system can be used.

(True/False)
4.7/5
(38)

One of the primary functions of Kerberos is to authenticate users.

(True/False)
4.9/5
(40)

A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.

(Short Answer)
4.7/5
(36)

____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.

(Multiple Choice)
4.9/5
(36)

The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.

(Multiple Choice)
4.9/5
(37)

A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.

(True/False)
4.8/5
(36)

Because of security concerns,modern network operating systems do not allow network administrators to create workgroups.

(True/False)
4.8/5
(41)

The opposite of asymmetric encryption is ____ encryption,in which one key is used to encrypt and decrypt.

(Multiple Choice)
4.8/5
(39)

The ____________________ substitution-based cipher uses multiple alphabetic strings to encode the plaintext,rather than one alphabetic string.

(Short Answer)
4.7/5
(38)

How does phishing work?

(Essay)
4.9/5
(39)

To authenticate electronic documents as yours,you need to create a digital signature.

(True/False)
5.0/5
(36)

Pings are used most commonly by Unix-based systems.

(True/False)
4.9/5
(36)

Many certificates conform to the ____ standard.

(Multiple Choice)
4.8/5
(28)

The DES algorithm works with 128-bit blocks of data.

(True/False)
4.7/5
(33)

____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.

(Multiple Choice)
4.9/5
(30)

____________________ (SSL)is an additional layer of software added between the application layer and the transport (TCP)layer that creates a secure connection between sender and receiver.

(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)