Filters
Question type

Study Flashcards

In which cipher method are values rearranged within a block to create the ciphertext? 


A)  Permutation
B)  Vernam 
C)  Substitution
D)  Monoalphabetic

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n)____________________ is a secret word or combination of characters known only by the user.

Correct Answer

verifed

verified

Describe in basic terms what an IDPS is.

Correct Answer

verifed

verified

Intrusion detection and prevention syste...

View Answer

A private,secure network operated over a public and insecure network.


A)  VPN
B)  transport mode
C)  SSL
D)  PKI
E)  digital certificate
F)  asymmetric encryption
G)  Vernam cipher
H)  transposition cipher
I)  content filter
J)  footprinting

K) C) and H)
L) B) and H)

Correct Answer

verifed

verified

Which technology has two modes of operation: transport and tunnel? 


A)  Secure Hypertext Transfer Protocol
B)  Secure Shell 
C)  IP Security
D)  Secure Sockets Layer

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Technical controls alone,when properly configured,can secure an IT environment.

A) True
B) False

Correct Answer

verifed

verified

The organized research and investigation of Internet addresses owned or controlled by a target organization.


A)  VPN
B)  transport mode
C)  SSL
D)  PKI
E)  digital certificate
F)  asymmetric encryption
G)  Vernam cipher
H)  transposition cipher
I)  content filter
J)  footprinting

K) A) and G)
L) A) and E)

Correct Answer

verifed

verified

What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems? 


A)  Port scanner
B)  Packet sniffer 
C)  Vulnerability scanner
D)  Content filter

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which port number is commonly used for the Simple Mail Transfer Protocol service? 


A)  25
B)  53 
C)  68
D)  443

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following characteristics currently used today for authentication purposes is the LEAST unique? 


A)  Fingerprints
B)  Iris 
C)  Retina
D)  Face geometry

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Briefly describe how biometric technologies are generally evaluated.

Correct Answer

verifed

verified

Biometric technologies are generally eva...

View Answer

A cryptographic operation that involves simply rearranging the values within a block based on an established pattern.


A)  VPN
B)  transport mode
C)  SSL
D)  PKI
E)  digital certificate
F)  asymmetric encryption
G)  Vernam cipher
H)  transposition cipher
I)  content filter
J)  footprinting

K) A) and I)
L) B) and D)

Correct Answer

verifed

verified

Describe and provide an example for each of the types of authentication mechanisms.

Correct Answer

verifed

verified

There are three types of authentication ...

View Answer

Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding? 


A)  Sending DoS packets to the source
B)  Terminating the network connection 
C)  Reconfiguring network devices
D)  Changing the attack's content

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following is a Kerberos service that initially exchanges information with the client and server by using secret keys? 


A)  Authentication Server
B)  Authentication Client 
C)  Key Distribution Center
D)  Ticket Granting Service

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The Ticket Granting Service (TGS)is one of three services in the __________ system,and provides tickets to clients who request services.

Correct Answer

verifed

verified

Public key container files that allow PKI system components and end users to validate a public key and identify its owner.


A)  VPN
B)  transport mode
C)  SSL
D)  PKI
E)  digital certificate
F)  asymmetric encryption
G)  Vernam cipher
H)  transposition cipher
I)  content filter
J)  footprinting

K) B) and E)
L) B) and H)

Correct Answer

verifed

verified

What is asymmetric encryption?

Correct Answer

verifed

verified

Asymmetric encryption is also known as p...

View Answer

In IPSec,an encryption method in which only a packet's IP data is encrypted,?not the IP headers themselves; this method allows intermediate nodes to read the source and?destination addresses.


A)  VPN
B)  transport mode
C)  SSL
D)  PKI
E)  digital certificate
F)  asymmetric encryption
G)  Vernam cipher
H)  transposition cipher
I)  content filter
J)  footprinting

K) A) and I)
L) G) and I)

Correct Answer

verifed

verified

The "something a person has" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 61

Related Exams

Show Answer