Filters
Question type

Study Flashcards

A software program or hardware/software appliance that allows administratorsto restrict content that comes into or leaves a network-for example,restricting user access toWeb sites with material that is not related to business,such as pornography or entertainment.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

Correct Answer

verifed

verified

I

Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding?


A) Sending DoS packets to the source
B) Terminating the network connection
C) Reconfiguring network devices
D) Changing the attack's content

Correct Answer

verifed

verified

A

Which of the following is used in conjunction with an algorithm to make computer data secure from anybody except the intended recipient of the data?


A) Key
B) Plaintext
C) Cipher
D) Cryptosystem

Correct Answer

verifed

verified

Which of the following biometric authentication systems is considered to be the most secure?


A) Fingerprint recognition
B) Signature recognition
C) Voice pattern recognition
D) Retina pattern recognition

Correct Answer

verifed

verified

What is most commonly used for the goal of nonrepudiation in cryptography?


A) Block cipher
B) Secret key
C) PKI
D) Digital signature

Correct Answer

verifed

verified

A cryptographic technique developed at AT&T and known as the "one-timepad," this cipher uses a set of characters for encryption operations only one time and thendiscards it.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

Correct Answer

verifed

verified

Which technology has two modes of operation: transport and tunnel?


A) Secure Hypertext Transfer Protocol
B) Secure Shell
C) IP Security
D) Secure Sockets Layer

Correct Answer

verifed

verified

The KDC component of Kerberos knows the secret keys of all clients and servers on the network.

Correct Answer

verifed

verified

What is asymmetric encryption?

Correct Answer

verifed

verified

Asymmetric encryption is also known as p...

View Answer

What is WEP and why is it no longer in favor?

Correct Answer

verifed

verified

WEP is designed to provide a basic level...

View Answer

________ recognition authentication captures the analog waveforms of human speech.

Correct Answer

verifed

verified

Which type of IDPS is also known as a behavior-based intrusion detection system?


A) Network-based
B) Anomaly-based
C) Host-based
D) Signature-based

Correct Answer

verifed

verified

A(n)____________________ is any device that prevents a specific type of information from moving between an untrusted network and a trusted network.

Correct Answer

verifed

verified

A(n)____________________ is a secret word or combination of characters known only by the user.

Correct Answer

verifed

verified

Which of the following is a commonly used criteria used to compare and evaluate biometric technologies?


A) False accept rate
B) Crossover error rate
C) False reject rate
D) Valid accept rate

Correct Answer

verifed

verified

Secure Shell (SSH)provides security for remote access connections over public networks by creating a secure and persistent connection..

Correct Answer

verifed

verified

There are six recommended best practices for firewall use according to Laura Taylor.List three of them.

Correct Answer

verifed

verified

All traffic from the trusted network is ...

View Answer

Which type of firewall keeps track of each network connection established between internal and external systems?


A) Packet filtering
B) Stateful packet inspection
C) Application layer
D) Cache server

Correct Answer

verifed

verified

B

Which of the following is NOT among the three types of authentication mechanisms?


A) Something a person knows
B) Something a person has
C) Something a person sees
D) Something a person can produce

Correct Answer

verifed

verified

The intermediate area between trusted and untrusted networks is referred to as which of the following?


A) Unfiltered area
B) Semi-trusted area
C) Demilitarized zone
D) Proxy zone

Correct Answer

verifed

verified

Showing 1 - 20 of 61

Related Exams

Show Answer