Exam 19: Computer and Network Security Techniques
Exam 1: Introduction45 Questions
Exam 2: Business Information44 Questions
Exam 3: Distributed Data Processing45 Questions
Exam 4: Data Transmission45 Questions
Exam 5: Data Communication Fundamentals45 Questions
Exam 6: Data Link Control and Multiplexing45 Questions
Exam 7: The Internet45 Questions
Exam 8: Tcp / Ip45 Questions
Exam 9: Client Server, intranet, and Cloud Computing45 Questions
Exam 10: Internet-Based Applications45 Questions
Exam 11: Internet Operation45 Questions
Exam 12: Lan Architecture and Infrastructure45 Questions
Exam 13: Ethernet, switches, and Virtual Lans45 Questions
Exam 14: Wireless Lans45 Questions
Exam 15: Wan Technology and Protocol45 Questions
Exam 16: Wan Services45 Questions
Exam 17: Wireless Lans45 Questions
Exam 18: Computer and Network Security Threats45 Questions
Exam 19: Computer and Network Security Techniques45 Questions
Select questions type
The WiFi standard known as Privacy with message integrity can be described as follows:
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
B
At _________ the IP header is exposed and so filtering or firewalls can be applied to IP addresses.
Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
C
IP-level security encompasses three functional areas: authentication, confidentiality,and _________.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
key management
A typical use of circuit-level gateways is a situation in which the system administrator trusts the internal users.
(True/False)
4.9/5
(35)
The Secure Sockets Layer (SSL)and the follow-on Internet standard known as __________ provide a reliable end-to-end secure transport service over TCP.
(Short Answer)
4.7/5
(32)
A security intrusion is defined as a successful attempt by a user to gain access to a system or system resource without proper authorization.
(True/False)
4.9/5
(35)
Two important SSL concepts are the SSL session and the SSL connection.
(True/False)
4.8/5
(22)
The _________ mechanism assures that a received packet was,in fact,transmitted by the party identified as the source in the packet header
(Short Answer)
4.8/5
(46)
____________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions and then blocks potentially malicious actions before they have a chance to affect the system.
(Short Answer)
4.9/5
(30)
_________ mode is used when at least one of the two ends is a security gateway, such as a firewall or router,that implements IPsec.
(Short Answer)
5.0/5
(45)
The SSL Record Protocol provides two services for SSL connections: confidentiality and ___________.
(Short Answer)
4.9/5
(28)
The primary benefit of a host-based IDS is that it can detect both external and internal intrusions.
(True/False)
4.9/5
(37)
Which of the following is a higher-layer protocol defined as part of SSL?
(Multiple Choice)
4.8/5
(36)
Most organizations agree that __________ become their worst security problem.
(Multiple Choice)
4.8/5
(43)
An IDS comprises three logical components: sensors,user interface,and _______.
(Short Answer)
4.8/5
(39)
Typically,a firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.
(True/False)
4.9/5
(40)
___________ is a set of protocols for providing encryption,authentication,and key management for IP.
(Short Answer)
4.8/5
(36)
IPSec provides authentication,encryption,and key exchange functions.
(True/False)
4.8/5
(43)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)