Exam 11: Network Security
Exam 1: Introduction to Data Communications79 Questions
Exam 2: Application Layer99 Questions
Exam 3: Physical Layer143 Questions
Exam 4: Data Link Layer98 Questions
Exam 5: Network and Transport Layers117 Questions
Exam 6: Network Design76 Questions
Exam 7: Wired and Wireless Local Area Networks141 Questions
Exam 8: Backbone Networks68 Questions
Exam 9: Wide Area Networks77 Questions
Exam 10: The Internet73 Questions
Exam 11: Network Security127 Questions
Exam 12: Network Management69 Questions
Select questions type
Triple DES uses a total of 512 bits as the key.
Free
(True/False)
4.8/5
(42)
Correct Answer:
False
Macro viruses can spread when an infected file is opened.
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
A fundamental technique to determine if an intrusion is in progress in a stable network is:
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
A
Using a chart format, describe 8 possible threats to a data network such as hardware, software, files, circuits, internal personnel, physical security, external people, and users).Describe 8 possible solutions to these conceivable threats.
(Essay)
4.8/5
(37)
Describe the three main reasons why there has been an increase in computer security over the past few years.
(Essay)
4.9/5
(41)
According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they
(Multiple Choice)
4.8/5
(30)
For Ethernet networks, a _______ switch can make eavesdropping more difficult.
(Multiple Choice)
4.8/5
(32)
The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as:
(Multiple Choice)
4.9/5
(36)
Describe five biometric technologies.How can a biometric enhance security in a network? What are some of the advantages and disadvantages of biometrics?
(Essay)
4.8/5
(32)
An example of _____ of data would be if a computer virus eliminated files on that computer.
(Multiple Choice)
4.8/5
(35)
What is the difference between a network-based IPS, host-based IPS and application-based IPS?
(Essay)
4.9/5
(41)
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
(True/False)
4.9/5
(30)
A tornado that eliminates a network control center would be an example of a natural __________
(Multiple Choice)
4.8/5
(45)
The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.
(True/False)
4.9/5
(40)
Researchers estimate that only one or two new viruses are developed every week.
(True/False)
4.9/5
(34)
A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000.
(True/False)
4.8/5
(37)
Describe how asymmetric encryption works, using a chart to help to explain this approach.
(Essay)
4.9/5
(34)
Showing 1 - 20 of 127
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)