Exam 11: Network Security
Exam 1: Introduction to Data Communications79 Questions
Exam 2: Application Layer99 Questions
Exam 3: Physical Layer143 Questions
Exam 4: Data Link Layer98 Questions
Exam 5: Network and Transport Layers117 Questions
Exam 6: Network Design76 Questions
Exam 7: Wired and Wireless Local Area Networks141 Questions
Exam 8: Backbone Networks68 Questions
Exam 9: Wide Area Networks77 Questions
Exam 10: The Internet73 Questions
Exam 11: Network Security127 Questions
Exam 12: Network Management69 Questions
Select questions type
Describe how symmetric encryption works, draw a chart of this approach.How does DES differ from 3DES? From RC4? From AES?
(Essay)
4.9/5
(34)
An) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.
(Multiple Choice)
4.9/5
(40)
A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.
(True/False)
4.9/5
(37)
Crackers are casual hackers with a limited knowledge of computer security.
(True/False)
4.8/5
(39)
DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM.
(True/False)
4.7/5
(37)
How does a packet level firewall work? Describe the proxy server function, the packet layer firewall function, the DMZ and the architecture of this design.
(Essay)
4.9/5
(33)
How does PGP differ from SSL? How does SSL differ from IPsec? Compare and contrast IPSec tunnel mode and IPSec transfer mode.
(Essay)
4.8/5
(42)
What is social engineering?
(Not Answered)
This question doesn't have any answer yet
Which of the following is not one of the major categories or sub-categories) into which network security threats can be placed?
(Multiple Choice)
4.9/5
(33)
Often, incidents of ___________ involve employees of the organization, surprisingly enough.
(Multiple Choice)
4.9/5
(46)
An) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks.
(Multiple Choice)
4.8/5
(41)
The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.
(True/False)
4.9/5
(38)
Showing 81 - 100 of 127
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)