Exam 11: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Threat of intrusion comes from ____________.

(Multiple Choice)
4.7/5
(35)

DES:

(Multiple Choice)
4.8/5
(34)

Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.

(True/False)
4.7/5
(33)

With application level firewalls, any access that has not been disabled is permitted.

(True/False)
4.9/5
(36)

A security hole is a bug that permits intrusion to a computer.

(True/False)
4.9/5
(45)

________ controls discover unwanted events.

(Multiple Choice)
4.8/5
(27)

Which of the following are usually the first choice for eavesdropping?

(Multiple Choice)
4.9/5
(35)

A symmetric encryption system has two parts: the key and the ____________.

(Multiple Choice)
4.8/5
(37)

Corrective controls reveal or discover unwanted events.

(True/False)
4.8/5
(32)

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

(Multiple Choice)
4.8/5
(40)

Compare and contrast symmetric and asymmetric encryption.

(Essay)
4.8/5
(39)

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication.

(Multiple Choice)
5.0/5
(32)

__________ provide authentication which can legally prove who sent a message over a network.

(Multiple Choice)
4.9/5
(38)

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.

(True/False)
4.9/5
(32)

Asymmetric encryption uses the same key to encrypt and decrypt an message..

(True/False)
4.7/5
(45)

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.

(True/False)
4.9/5
(38)

Integrity is not a primary goal of security.

(True/False)
4.9/5
(34)

Intrusion refers to confidentiality and integrity of data

(True/False)
4.8/5
(44)

Disk mirroring writes duplicate copies of all data on at least two different disks.

(True/False)
4.8/5
(41)

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.

(Multiple Choice)
4.9/5
(32)
Showing 101 - 120 of 127
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)