Exam 11: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe how symmetric encryption works, draw a chart of this approach.How does DES differ from 3DES? From RC4? From AES?

(Essay)
4.9/5
(34)

An) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.

(Multiple Choice)
4.9/5
(40)

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.

(True/False)
4.9/5
(37)

In transport mode, IPSec encrypts the entire IP packet.

(True/False)
4.7/5
(33)

Crackers are casual hackers with a limited knowledge of computer security.

(True/False)
4.8/5
(39)

How does IPS anomaly detection differ from misuse detection?

(Short Answer)
4.8/5
(28)

DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM.

(True/False)
4.7/5
(37)

IP Security Protocol:

(Multiple Choice)
4.7/5
(37)

A brute force attack against an encryption system:

(Multiple Choice)
4.8/5
(34)

How does a packet level firewall work? Describe the proxy server function, the packet layer firewall function, the DMZ and the architecture of this design.

(Essay)
4.9/5
(33)

How does PGP differ from SSL? How does SSL differ from IPsec? Compare and contrast IPSec tunnel mode and IPSec transfer mode.

(Essay)
4.8/5
(42)

What is social engineering?

(Not Answered)
This question doesn't have any answer yet
Ask our community

Which of the following is not one of the major categories or sub-categories) into which network security threats can be placed?

(Multiple Choice)
4.9/5
(33)

Often, incidents of ___________ involve employees of the organization, surprisingly enough.

(Multiple Choice)
4.9/5
(46)

Compare and contrast DES and public key encryption.

(Essay)
4.9/5
(40)

Network cables are the easiest target for eavesdropping.

(True/False)
4.7/5
(34)

Explain how a Trojan horse works.

(Short Answer)
4.8/5
(37)

An) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks.

(Multiple Choice)
4.8/5
(41)

Spyware, adware and DDOS agents are three types of:

(Multiple Choice)
4.9/5
(40)

The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.

(True/False)
4.9/5
(38)
Showing 81 - 100 of 127
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)