Filters
Question type

Study Flashcards

Which technology has two modes of operation: transport and tunnel?


A) Secure Hypertext Transfer Protocol
B) Secure Shell
C) IP Security
D) Secure Sockets Layer

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A cryptographic technique developed at AT&T and known as the "one-timepad," this cipher uses a set of characters for encryption operations only one time and thendiscards it.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) B) and F)
L) C) and H)

Correct Answer

verifed

verified

The intermediate area between trusted and untrusted networks is referred to as which of the following?


A) Unfiltered area
B) Semi-trusted area
C) Demilitarized zone
D) Proxy zone

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is a commonly used criteria used to compare and evaluate biometric technologies?


A) False accept rate
B) Crossover error rate
C) False reject rate
D) Valid accept rate

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding?


A) Sending DoS packets to the source
B) Terminating the network connection
C) Reconfiguring network devices
D) Changing the attack's content

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A

There are six recommended best practices for firewall use according to Laura Taylor.List three of them.

Correct Answer

verifed

verified

All traffic from the trusted network is ...

View Answer

A software program or hardware/software appliance that allows administratorsto restrict content that comes into or leaves a network-for example,restricting user access toWeb sites with material that is not related to business,such as pornography or entertainment.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) C) and G)
L) A) and F)

Correct Answer

verifed

verified

I

Secure Shell (SSH)provides security for remote access connections over public networks by creating a secure and persistent connection..

A) True
B) False

Correct Answer

verifed

verified

A(n)____________________ is a secret word or combination of characters known only by the user.

Correct Answer

verifed

verified

Which of the following is used in conjunction with an algorithm to make computer data secure from anybody except the intended recipient of the data?


A) Key
B) Plaintext
C) Cipher
D) Cryptosystem

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is asymmetric encryption?

Correct Answer

verifed

verified

Asymmetric encryption is also known as p...

View Answer

Which of the following is NOT among the three types of authentication mechanisms?


A) Something a person knows
B) Something a person has
C) Something a person sees
D) Something a person can produce

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following biometric authentication systems is considered to be the most secure?


A) Fingerprint recognition
B) Signature recognition
C) Voice pattern recognition
D) Retina pattern recognition

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A(n)____________________ is any device that prevents a specific type of information from moving between an untrusted network and a trusted network.

Correct Answer

verifed

verified

________ recognition authentication captures the analog waveforms of human speech.

Correct Answer

verifed

verified

What is most commonly used for the goal of nonrepudiation in cryptography?


A) Block cipher
B) Secret key
C) PKI
D) Digital signature

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which type of firewall keeps track of each network connection established between internal and external systems?


A) Packet filtering
B) Stateful packet inspection
C) Application layer
D) Cache server

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

B

What is WEP and why is it no longer in favor?

Correct Answer

verifed

verified

WEP is designed to provide a basic level...

View Answer

Which type of IDPS is also known as a behavior-based intrusion detection system?


A) Network-based
B) Anomaly-based
C) Host-based
D) Signature-based

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

The KDC component of Kerberos knows the secret keys of all clients and servers on the network.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 61

Related Exams

Show Answer