Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.

(Multiple Choice)
4.9/5
(46)

In ____,a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site.

(Multiple Choice)
4.8/5
(38)

All certificates are issued by a certificate authority.

(True/False)
4.9/5
(46)

One popular application of IPsec is in the support of virtual private networks.

(True/False)
4.8/5
(42)

A(n)____________________ is a system or combination of systems that supports an access control policy between two networks.

(Short Answer)
4.9/5
(35)

____________________ define the network resources that a user or set of users can access.

(Short Answer)
4.9/5
(40)

The ____________________ cipher was devised by Blaise de Vigenére in 1586.

(Short Answer)
4.8/5
(33)

The concept of two keys,public and private,is called ____ cryptography.

(Multiple Choice)
4.9/5
(36)

The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.

(True/False)
4.9/5
(44)

Perhaps the most common form of protection from unauthorized use of a computer system is the ____.

(Multiple Choice)
4.8/5
(41)

____ may be considered a form of physical protection.

(Multiple Choice)
4.8/5
(35)

____ is a set of protocols created to support the secure transfer of data at the IP layer.

(Multiple Choice)
4.7/5
(40)

____________________ is the art and science of hiding information inside other,seemingly ordinary messages or documents.

(Short Answer)
5.0/5
(46)

Antivirus software with ________________________________________ runs in the background while an application that the user is executing runs in the foreground.

(Short Answer)
4.9/5
(42)

WAP has been replaced by a new standard,Wired Equivalency Protocol (WEP).

(True/False)
4.9/5
(45)

All system attacks need a user to open an e-mail or Web page.

(True/False)
4.7/5
(38)

_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.

(Short Answer)
4.8/5
(40)

A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.

(Multiple Choice)
4.9/5
(34)

SSL's successor is ____,which is based upon SSL version 3 and contains a few technical improvements over SSL.

(Multiple Choice)
4.9/5
(43)

Some common types of denial of service include e-mail bombing,____,and ping storm.

(Multiple Choice)
5.0/5
(40)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)