Exam 19: Computer and Network Security Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The WiFi standard known as Privacy with message integrity can be described as follows:

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

B

At _________ the IP header is exposed and so filtering or firewalls can be applied to IP addresses.

Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
Verified

C

IP-level security encompasses three functional areas: authentication, confidentiality,and _________.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

key management

A typical use of circuit-level gateways is a situation in which the system administrator trusts the internal users.

(True/False)
4.9/5
(35)

The Secure Sockets Layer (SSL)and the follow-on Internet standard known as __________ provide a reliable end-to-end secure transport service over TCP.

(Short Answer)
4.7/5
(32)

A security intrusion is defined as a successful attempt by a user to gain access to a system or system resource without proper authorization.

(True/False)
4.9/5
(35)

A stateful inspection firewall ________.

(Multiple Choice)
4.9/5
(32)

Two important SSL concepts are the SSL session and the SSL connection.

(True/False)
4.8/5
(22)

The _________ mechanism assures that a received packet was,in fact,transmitted by the party identified as the source in the packet header

(Short Answer)
4.8/5
(46)

____________ integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions and then blocks potentially malicious actions before they have a chance to affect the system.

(Short Answer)
4.9/5
(30)

_________ mode is used when at least one of the two ends is a security gateway, such as a firewall or router,that implements IPsec.

(Short Answer)
5.0/5
(45)

The SSL Record Protocol provides two services for SSL connections: confidentiality and ___________.

(Short Answer)
4.9/5
(28)

The primary benefit of a host-based IDS is that it can detect both external and internal intrusions.

(True/False)
4.9/5
(37)

Which of the following is a higher-layer protocol defined as part of SSL?

(Multiple Choice)
4.8/5
(36)

Most organizations agree that __________ become their worst security problem.

(Multiple Choice)
4.8/5
(43)

An IDS comprises three logical components: sensors,user interface,and _______.

(Short Answer)
4.8/5
(39)

Typically,a firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.

(True/False)
4.9/5
(40)

___________ is a set of protocols for providing encryption,authentication,and key management for IP.

(Short Answer)
4.8/5
(36)

A key logical component of an IDS is:

(Multiple Choice)
4.7/5
(29)

IPSec provides authentication,encryption,and key exchange functions.

(True/False)
4.8/5
(43)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)