Exam 12: Network Security
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections76 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.
(Multiple Choice)
4.8/5
(33)
The ____________________ is the data after the encryption algorithm has been applied.
(Short Answer)
4.8/5
(47)
In ____________________,a perpetrator sends an excessive amount of unwanted e-mail messages to someone.
(Short Answer)
4.8/5
(40)
Many people consider the Trojan horse to be a form of computer ____.
(Multiple Choice)
4.9/5
(34)
____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP)broadcast addressing and other aspects of Internet operation.
(Multiple Choice)
4.8/5
(45)
In computer terminology,a(n)____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource.
(Short Answer)
4.9/5
(36)
Public key cryptography is also called ____________________ encryption.
(Short Answer)
4.7/5
(35)
An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.
(Multiple Choice)
4.9/5
(44)
Early cryptography algorithms used the same key for both encryption and decryption.
(True/False)
4.9/5
(48)
A packet filter firewall is a computer running proxy server software,whose function is much like that of a librarian who controls access to books in a library's rare books room.
(True/False)
4.8/5
(42)
____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users.
(Multiple Choice)
4.8/5
(43)
Both SSL and IPsec may eventually give way to S-HTTP,the newer security standard created by the Internet Engineering Task Force.
(True/False)
4.9/5
(37)
A(n)____ is the unique piece of information that is used to create ciphertext and then decrypt the ciphertext back into plaintext.
(Multiple Choice)
4.8/5
(41)
Many employees feel surveillance is an intrusion into their privacy.
(True/False)
4.9/5
(35)
With ____________________,the data is encrypted using DES three times-the first time by a first key,the second time by a second key,and the third time by the first key again.
(Short Answer)
4.9/5
(30)
A ____ is a list of certificates that have been revoked before their originally scheduled expiration date.
(Multiple Choice)
4.8/5
(39)
Some computer systems generate random passwords that are very difficult to guess,but are also hard to remember.
(True/False)
4.8/5
(34)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)