Exam 19: Computer and Network Security Techniques
Exam 1: Introduction45 Questions
Exam 2: Business Information44 Questions
Exam 3: Distributed Data Processing45 Questions
Exam 4: Data Transmission45 Questions
Exam 5: Data Communication Fundamentals45 Questions
Exam 6: Data Link Control and Multiplexing45 Questions
Exam 7: The Internet45 Questions
Exam 8: Tcp / Ip45 Questions
Exam 9: Client Server, intranet, and Cloud Computing45 Questions
Exam 10: Internet-Based Applications45 Questions
Exam 11: Internet Operation45 Questions
Exam 12: Lan Architecture and Infrastructure45 Questions
Exam 13: Ethernet, switches, and Virtual Lans45 Questions
Exam 14: Wireless Lans45 Questions
Exam 15: Wan Technology and Protocol45 Questions
Exam 16: Wan Services45 Questions
Exam 17: Wireless Lans45 Questions
Exam 18: Computer and Network Security Threats45 Questions
Exam 19: Computer and Network Security Techniques45 Questions
Select questions type
SSL performs encryption first,followed by computing a message authentication code.
(True/False)
4.8/5
(36)
Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.
(True/False)
4.9/5
(28)
Generic decryption (GD)technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.
(True/False)
4.9/5
(35)
A _________ is a hardware or software entity inserted between a system or network to be protected and the Internet or other outside access network to control traffic in both directions to enforce a security policy.
(Short Answer)
4.7/5
(38)
A(n)__________ looks for user behavior that differs from that expected from a legitimate user.
(Multiple Choice)
4.8/5
(28)
Malware defense can involve a combination of prevention,__________,and removal.
(Short Answer)
4.8/5
(35)
Transport mode in IPSec provides protection to the entire IP packet.
(True/False)
4.7/5
(31)
In order to accelerate the introduction of strong security into WLANs,the Wi-Fi Alliance promulgated __________ as a Wi-Fi standard.
(Short Answer)
4.9/5
(38)
IEEE 802.11i consists of two main functions: authentication and access control.
(True/False)
4.9/5
(46)
Ports are logical entities defined within the authenticator and refer to physical network connections.
(True/False)
4.9/5
(37)
An uncontrolled port allows the exchange of PDUs between a supplicant and other systems on the LAN only if the current state of the supplicant authorizes such an exchange.
(True/False)
4.8/5
(41)
The ________________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.
(Short Answer)
4.7/5
(37)
The Host-based IDS monitors network traffic for particular network segments or devices and analyzes network,transport, and application protocols to identify suspicious activity.
(True/False)
4.9/5
(32)
Which of the following is not a central element of a typical antivirus scheme?
(Multiple Choice)
4.9/5
(29)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)