Exam 7: Standards and Protocols
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
WEP is sometimes used to secure a wireless connection.What are the security issues related to WEP?
Free
(Essay)
4.9/5
(36)
Correct Answer:
1-The secret key is only 40 bits long,and is easy to crack.2-128-bit WEP2 keys are almost equally vulnerable.3-Many wireless network implementations do not come with WEP enabled.
The Certificate Authority is responsible for issuing,storing,and revoking certificates.
Free
(True/False)
4.8/5
(42)
Correct Answer:
True
_______________ provides a method for implementing a key exchange protocol and for negotiating a security policy.
(Essay)
5.0/5
(29)
_______________ allows the encapsulation of one packet inside another to hide the original packet.
(Short Answer)
4.8/5
(42)
The "S" in HTTPS signifies the protocol used when opening multiple web pages simultaneously.
(True/False)
4.8/5
(36)
What function does Tier 1of the XML protocol service,based on the client requests and application requirements,perform?
(Multiple Choice)
4.8/5
(40)
List and define 5 of the 12 sections detailed by the ISO/IEC 27002 Standard.
(Essay)
4.8/5
(27)
What are the documents developed by the government to aid in the development of a standard for use in areas such as security or system interoperability?
(Multiple Choice)
4.7/5
(26)
What is Internet Security Association and Key Management ISAKMP?
(Multiple Choice)
4.8/5
(37)
Certificates that should no longer be used due to compromise should be
(Multiple Choice)
4.8/5
(28)
_______________ is a message specification extension to the MIME standard,used to provide a way to send and receive signed and encrypted MIME data.
(Short Answer)
4.9/5
(33)
SSL provides secure connections for web transfers using encryption.
(True/False)
4.9/5
(33)
Showing 1 - 20 of 44
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)