Exam 12: Network Security
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections76 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
____________________ techniques that observe and record some aspect of the user,such as voiceprints,fingerprints,eyeprints,and faceprints,appear to be the wave of the future to replace passwords.
Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Biometric
A(n)______________________________ is either specialized software on a network or a trusted third-party organization or business that issues and manages certificates.
Free
(Short Answer)
4.9/5
(40)
Correct Answer:
certificate authority (CA)
certificate authority
CA
IEEE ____ addresses both weaknesses of WEP by allowing the keys,encryption algorithms,and negotiation to be dynamically assigned,and by adopting the AES encryption based on the Rijndael algorithm with 128-,192-,or 256-bit keys.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
A(n)____________________ is a condition in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.
(Short Answer)
4.9/5
(36)
Controlling access to a computer network involves deciding and then limiting who can use the system and when the system can be used.
(True/False)
4.7/5
(38)
One of the primary functions of Kerberos is to authenticate users.
(True/False)
4.9/5
(40)
A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.
(Short Answer)
4.7/5
(36)
____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.
(Multiple Choice)
4.9/5
(36)
The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.
(Multiple Choice)
4.9/5
(37)
A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.
(True/False)
4.8/5
(36)
Because of security concerns,modern network operating systems do not allow network administrators to create workgroups.
(True/False)
4.8/5
(41)
The opposite of asymmetric encryption is ____ encryption,in which one key is used to encrypt and decrypt.
(Multiple Choice)
4.8/5
(39)
The ____________________ substitution-based cipher uses multiple alphabetic strings to encode the plaintext,rather than one alphabetic string.
(Short Answer)
4.7/5
(38)
To authenticate electronic documents as yours,you need to create a digital signature.
(True/False)
5.0/5
(36)
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.
(Multiple Choice)
4.9/5
(30)
____________________ (SSL)is an additional layer of software added between the application layer and the transport (TCP)layer that creates a secure connection between sender and receiver.
(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)