Exam 12: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe one potential flaw in CHAP and MS-CHAP authentication and explain how it is resolved.

(Essay)
4.7/5
(30)

The use of certificate authorities to associate public keys with certain users is known as ____.

(Multiple Choice)
4.8/5
(30)

Describe the three-way handshake used in CHAP.

(Essay)
4.8/5
(39)

MATCHING Match each item with a statement below: a.IPS f.proxy server b.IDS g.proxy service c.content filtering h.public key encryption d.host-based i.private key encryption e.stateful -Software that can react to suspicious activity.

(Short Answer)
4.8/5
(34)

A(n)____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.

(Short Answer)
4.9/5
(30)

A ____ attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

(Multiple Choice)
4.8/5
(49)

____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information.

(Multiple Choice)
4.8/5
(31)

____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.

(Multiple Choice)
4.8/5
(40)

A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.

(Multiple Choice)
4.8/5
(38)

A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

(Multiple Choice)
4.9/5
(38)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)