Exam 12: Network Security
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections76 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.
(Multiple Choice)
4.9/5
(46)
In ____,a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site.
(Multiple Choice)
4.8/5
(38)
One popular application of IPsec is in the support of virtual private networks.
(True/False)
4.8/5
(42)
A(n)____________________ is a system or combination of systems that supports an access control policy between two networks.
(Short Answer)
4.9/5
(35)
____________________ define the network resources that a user or set of users can access.
(Short Answer)
4.9/5
(40)
The ____________________ cipher was devised by Blaise de Vigenére in 1586.
(Short Answer)
4.8/5
(33)
The concept of two keys,public and private,is called ____ cryptography.
(Multiple Choice)
4.9/5
(36)
The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.
(True/False)
4.9/5
(44)
Perhaps the most common form of protection from unauthorized use of a computer system is the ____.
(Multiple Choice)
4.8/5
(41)
____ is a set of protocols created to support the secure transfer of data at the IP layer.
(Multiple Choice)
4.7/5
(40)
____________________ is the art and science of hiding information inside other,seemingly ordinary messages or documents.
(Short Answer)
5.0/5
(46)
Antivirus software with ________________________________________ runs in the background while an application that the user is executing runs in the foreground.
(Short Answer)
4.9/5
(42)
WAP has been replaced by a new standard,Wired Equivalency Protocol (WEP).
(True/False)
4.9/5
(45)
_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.
(Short Answer)
4.8/5
(40)
A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.
(Multiple Choice)
4.9/5
(34)
SSL's successor is ____,which is based upon SSL version 3 and contains a few technical improvements over SSL.
(Multiple Choice)
4.9/5
(43)
Some common types of denial of service include e-mail bombing,____,and ping storm.
(Multiple Choice)
5.0/5
(40)
Showing 81 - 100 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)