Exam 11: Network Security
Exam 1: Introduction to Data Communications79 Questions
Exam 2: Application Layer99 Questions
Exam 3: Physical Layer143 Questions
Exam 4: Data Link Layer98 Questions
Exam 5: Network and Transport Layers117 Questions
Exam 6: Network Design76 Questions
Exam 7: Wired and Wireless Local Area Networks141 Questions
Exam 8: Backbone Networks68 Questions
Exam 9: Wide Area Networks77 Questions
Exam 10: The Internet73 Questions
Exam 11: Network Security127 Questions
Exam 12: Network Management69 Questions
Select questions type
Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.
(True/False)
4.7/5
(33)
With application level firewalls, any access that has not been disabled is permitted.
(True/False)
4.9/5
(36)
Which of the following are usually the first choice for eavesdropping?
(Multiple Choice)
4.9/5
(35)
A symmetric encryption system has two parts: the key and the ____________.
(Multiple Choice)
4.8/5
(37)
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.
(Multiple Choice)
4.8/5
(40)
A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication.
(Multiple Choice)
5.0/5
(32)
__________ provide authentication which can legally prove who sent a message over a network.
(Multiple Choice)
4.9/5
(38)
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
(True/False)
4.9/5
(32)
Asymmetric encryption uses the same key to encrypt and decrypt an message..
(True/False)
4.7/5
(45)
Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.
(True/False)
4.9/5
(38)
Disk mirroring writes duplicate copies of all data on at least two different disks.
(True/False)
4.8/5
(41)
__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.
(Multiple Choice)
4.9/5
(32)
Showing 101 - 120 of 127
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)