Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.

(Multiple Choice)
4.8/5
(33)

The ____________________ is the data after the encryption algorithm has been applied.

(Short Answer)
4.8/5
(47)

In ____________________,a perpetrator sends an excessive amount of unwanted e-mail messages to someone.

(Short Answer)
4.8/5
(40)

Auditing a computer system is often a good way to deter crime.

(True/False)
4.8/5
(36)

Many people consider the Trojan horse to be a form of computer ____.

(Multiple Choice)
4.9/5
(34)

____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP)broadcast addressing and other aspects of Internet operation.

(Multiple Choice)
4.8/5
(45)

In computer terminology,a(n)____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource.

(Short Answer)
4.9/5
(36)

Public key cryptography is also called ____________________ encryption.

(Short Answer)
4.7/5
(35)

An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.

(Multiple Choice)
4.9/5
(44)

Early cryptography algorithms used the same key for both encryption and decryption.

(True/False)
4.9/5
(48)

A packet filter firewall is a computer running proxy server software,whose function is much like that of a librarian who controls access to books in a library's rare books room.

(True/False)
4.8/5
(42)

____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users.

(Multiple Choice)
4.8/5
(43)

A worm is a form of computer virus.

(True/False)
4.8/5
(40)

Both SSL and IPsec may eventually give way to S-HTTP,the newer security standard created by the Internet Engineering Task Force.

(True/False)
4.9/5
(37)

A(n)____ is the unique piece of information that is used to create ciphertext and then decrypt the ciphertext back into plaintext.

(Multiple Choice)
4.8/5
(41)

Many employees feel surveillance is an intrusion into their privacy.

(True/False)
4.9/5
(35)

What information does a certificate contain?

(Essay)
4.9/5
(30)

With ____________________,the data is encrypted using DES three times-the first time by a first key,the second time by a second key,and the third time by the first key again.

(Short Answer)
4.9/5
(30)

A ____ is a list of certificates that have been revoked before their originally scheduled expiration date.

(Multiple Choice)
4.8/5
(39)

Some computer systems generate random passwords that are very difficult to guess,but are also hard to remember.

(True/False)
4.8/5
(34)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)