Exam 19: Computer and Network Security Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which security area is addressed in IEEE 802.11i ?

(Multiple Choice)
4.8/5
(32)

SSL performs encryption first,followed by computing a message authentication code.

(True/False)
4.8/5
(36)

__________ is a monitored behavior.

(Multiple Choice)
4.9/5
(40)

Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.

(True/False)
4.9/5
(28)

Generic decryption (GD)technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.

(True/False)
4.9/5
(35)

Ipsec is based primarily upon the DES standard.

(True/False)
4.8/5
(29)

A _________ is a hardware or software entity inserted between a system or network to be protected and the Internet or other outside access network to control traffic in both directions to enforce a security policy.

(Short Answer)
4.7/5
(38)

A(n)__________ looks for user behavior that differs from that expected from a legitimate user.

(Multiple Choice)
4.8/5
(28)

The ideal solution to the threat of viruses is:

(Multiple Choice)
4.9/5
(29)

Malware defense can involve a combination of prevention,__________,and removal.

(Short Answer)
4.8/5
(35)

Transport mode in IPSec provides protection to the entire IP packet.

(True/False)
4.7/5
(31)

In order to accelerate the introduction of strong security into WLANs,the Wi-Fi Alliance promulgated __________ as a Wi-Fi standard.

(Short Answer)
4.9/5
(38)

IEEE 802.11i consists of two main functions: authentication and access control.

(True/False)
4.9/5
(46)

The most complex part of SSL is the ___________ Protocol.

(Multiple Choice)
4.8/5
(33)

Ports are logical entities defined within the authenticator and refer to physical network connections.

(True/False)
4.9/5
(37)

An uncontrolled port allows the exchange of PDUs between a supplicant and other systems on the LAN only if the current state of the supplicant authorizes such an exchange.

(True/False)
4.8/5
(41)

The ________________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.

(Short Answer)
4.7/5
(37)

The higher-layer protocols defined as part of SSL include:

(Multiple Choice)
4.7/5
(34)

The Host-based IDS monitors network traffic for particular network segments or devices and analyzes network,transport, and application protocols to identify suspicious activity.

(True/False)
4.9/5
(32)

Which of the following is not a central element of a typical antivirus scheme?

(Multiple Choice)
4.9/5
(29)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)