Exam 19: Computer and Network Security Techniques
Exam 1: Introduction25 Questions
Exam 2: Business Information23 Questions
Exam 3: Distributed Data Processing20 Questions
Exam 4: Internet History and Architecture18 Questions
Exam 5: Tcp/ip and Osi15 Questions
Exam 6: Clientserver and Intranet Computing13 Questions
Exam 7: Internet-Based Applications20 Questions
Exam 8: Internet Operation16 Questions
Exam 9: Lan Architecture and Protocols17 Questions
Exam 10: Ethernet and Fibre Channel13 Questions
Exam 11: Wireless Lans15 Questions
Exam 12: Circuit Switching and Packet Switching17 Questions
Exam 13: Frame Relay and Atm24 Questions
Exam 14: Wireless Wans23 Questions
Exam 15: Data Transmission25 Questions
Exam 16: Data Communication Fundamentals23 Questions
Exam 17: Data Link Control and Multiplexing15 Questions
Exam 18: Computer and Network Security Threats27 Questions
Exam 19: Computer and Network Security Techniques18 Questions
Exam 20: Network Management15 Questions
Select questions type
Transport mode in IPSec provides protection to the entire IP packet.
Free
(True/False)
4.9/5
(37)
Correct Answer:
False
The WiFi standard known as Privacy with message integrity can be described as follows:
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
B
Which of the following is not a central element of a typical antivirus scheme
(Multiple Choice)
4.9/5
(37)
SSL performs encryption first,followed by computing a message authentication code.
(True/False)
4.8/5
(33)
8,Generic decryption (GD)technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.
(True/False)
4.8/5
(38)
IEEE 802.11i makes use of another standard that was designed to provide access control functions for LANs.The standard is .
(Essay)
4.9/5
(28)
IPSec provides authentication,encryption,and key exchange functions.
(True/False)
4.9/5
(30)
IEEE 802.11i consists of two main functions: authentication and access control.
(True/False)
4.8/5
(36)
Typically,a firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.
(True/False)
4.8/5
(28)
A security intrusion is defined as a successful attempt by a user to gain access to a system or system resource without proper authorization.
(True/False)
4.7/5
(39)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)