A) Ticket Granting Service
B) Authentication Server
C) Authentication Client
D) Key Distribution Center
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) Network-based
B) Anomaly-based
C) Host-based
D) Signature-based
Correct Answer
verified
Multiple Choice
A) 1024-65,536
B) 0-1023
C) 0-65,536
D) 20, 21, 25, 53, 80
Correct Answer
verified
Multiple Choice
A) Keystroke pattern recognition
B) Fingerprint recognition
C) Signature recognition
D) Retina pattern recognition
Correct Answer
verified
Multiple Choice
A) Footprinting
B) Content filtering
C) Deciphering
D) Fingerprinting
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Network-address translation
B) Screened-subnet firewall
C) Port-address translation
D) Private address mapping
Correct Answer
verified
Multiple Choice
A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting
Correct Answer
verified
Multiple Choice
A) Unfiltered area
B) Semi-trusted area
C) Demilitarized zone
D) Proxy zone
Correct Answer
verified
Multiple Choice
A) Key
B) Plaintext
C) Cipher
D) Cryptosystem
Correct Answer
verified
Multiple Choice
A) Something a person knows
B) Something a person has
C) Something a person sees
D) Something a person can produce
Correct Answer
verified
Multiple Choice
A) Block cipher
B) Secret key
C) PKI
D) Digital signature
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Firewalls can interpret human actions and make decisions outside their programming
B) Because firewalls are not programmed like a computer, they are less error prone
C) Firewalls are flexible and can adapt to new threats
D) Firewalls deal strictly with defined patterns of measured observation
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting
Correct Answer
verified
Multiple Choice
A) Packet sniffer
B) Port scanner
C) Trap and trace
D) Honey pot
Correct Answer
verified
Multiple Choice
A) Dynamic packet filtering firewall
B) Proxy server
C) Intrusion detection system
D) Application layer firewall
Correct Answer
verified
Essay
Correct Answer
verified
Showing 1 - 20 of 61
Related Exams