Exam 13: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In network security,a firewall is a device which lies between two networks and _____.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

The limitations of firewalls include all the following except _____.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

C

Controls are _____.

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

C

Most commercial encryption technologies such as SSL and VPN _____.

(Multiple Choice)
4.8/5
(32)

Authorization is _____.

(Multiple Choice)
4.9/5
(44)

Vulnerabilities are _____.

(Multiple Choice)
4.8/5
(27)

Confidentiality is defined as _____.

(Multiple Choice)
4.9/5
(45)

Authentication is _____.

(Multiple Choice)
4.8/5
(31)

Encryption is the process of _____.

(Multiple Choice)
4.9/5
(31)

All the following are properties of asymmetric key encryption except _____.

(Multiple Choice)
4.8/5
(34)

Information security controls are commonly classified in the industry as _____.

(Multiple Choice)
4.9/5
(33)

In symmetric key encryption _____.

(Multiple Choice)
4.7/5
(27)

Integrity is defined as _____.

(Multiple Choice)
4.8/5
(36)

Threats are _____.

(Multiple Choice)
4.7/5
(38)

Information security is defined as _____.

(Multiple Choice)
4.7/5
(41)

A mobile worker requires secure access to corporate business applications from his hotel room.The most suitable encryption technology for this purpose is _____.

(Multiple Choice)
4.8/5
(41)

A denial-of-service attack _____.

(Multiple Choice)
4.8/5
(30)

In the context of network security,patching _____.

(Multiple Choice)
4.8/5
(34)

In the context of network security,the de-militarized zone _____.

(Multiple Choice)
4.7/5
(31)

Redundancy is _____.

(Multiple Choice)
4.9/5
(30)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)