Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The combination of a public key and a private key is known as a ____.

(Multiple Choice)
4.8/5
(36)

In ____,both computers verify the credentials of the other.

(Multiple Choice)
4.7/5
(28)

An NOS that contains a "back door"is an example of a risk associated with ____.

(Multiple Choice)
4.9/5
(34)

A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.

(Multiple Choice)
4.8/5
(41)

____ software searches a node for open ports.

(Multiple Choice)
4.7/5
(39)

In a ____ attack,a person redirects or captures secure transmissions as they occur.

(Multiple Choice)
4.8/5
(37)

Define and describe PAP.

(Essay)
4.8/5
(38)

MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -Software that can only detect and log suspicious activity.

(Short Answer)
4.8/5
(31)

A security policy should state exactly which hardware,software,architecture,or protocols will be used to ensure security.

(True/False)
4.9/5
(37)

MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -Data is encrypted using a single key.

(Short Answer)
4.7/5
(37)

Define SSH (secure shell)and explain threats it guards against.Include an explanation of the encryption algorithms that may be used with it.

(Essay)
4.9/5
(27)

MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -The host that runs the proxy service.

(Short Answer)
4.8/5
(37)

Describe the SCP (Secure CoPy)utility.

(Essay)
4.7/5
(33)

Describe what distinguishes 802.1x from other authentication standards.

(Essay)
4.8/5
(28)

MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -A firewall that can view a data stream.

(Short Answer)
4.7/5
(38)

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

(Multiple Choice)
4.8/5
(35)

MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -Data is encrypted using two keys.

(Short Answer)
4.8/5
(33)

A(n)____________________ is a software application on a network host that acts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic.

(Short Answer)
4.9/5
(40)

In ____ ,a hacker forges name server records to falsify his host's identity.

(Multiple Choice)
4.9/5
(37)

A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.

(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)