Exam 12: Network Security
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections76 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
A ____ virus is usually stored on some form of removable media.When the removable media (such as a flash drive)is connected to a new machine and is used to boot the machine,the virus moves from the media into the host system.
(Multiple Choice)
4.8/5
(34)
____ scanning works by recognizing the unique pattern of a virus.
(Multiple Choice)
4.9/5
(31)
A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.
(True/False)
4.9/5
(33)
A(n)____ is the computer program that converts plaintext into an enciphered form.
(Multiple Choice)
4.8/5
(35)
One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____.
(Multiple Choice)
4.9/5
(41)
Top-level executives often have access to a narrow range of information within a company.
(True/False)
4.8/5
(42)
____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.
(Multiple Choice)
4.9/5
(38)
When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password,the type of attack is termed ____________________.
(Short Answer)
4.9/5
(35)
A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.
(Multiple Choice)
4.8/5
(33)
A computer ____________________ is a program that copies itself from one system to another over a network,without the assistance of a human being.
(Short Answer)
4.9/5
(38)
The two leading attack methods for the last few years have exploited known vulnerabilities in operating systems and in application software.
(True/False)
4.8/5
(40)
A digital certificate,or simply a(n)____________________,is an electronic document,similar to a passport,that establishes your credentials when you are performing transactions on the World Wide Web.
(Short Answer)
4.8/5
(33)
The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.
(True/False)
4.9/5
(23)
The idea behind ____________________ spread spectrum transmission is to bounce the signal around on random frequencies rather than transmit it on one fixed frequency.
(Short Answer)
4.9/5
(31)
One of the most common ways to control access to a system is to require user IDs and passwords.
(True/False)
4.8/5
(32)
What are some of the standard rules for creating or changing a password?
(Essay)
4.8/5
(38)
A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.
(Short Answer)
4.9/5
(29)
____ cable represented a major improvement in the ability of transmission media to secure sensitive data.
(Multiple Choice)
4.7/5
(48)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)