Filters
Question type

Study Flashcards

Which of the following provides an identification card of sorts to clients who request services in a Kerberos system? 


A)  Ticket Granting Service
B)  Authentication Server 
C)  Authentication Client
D)  Key Distribution Center

Correct Answer

verifed

verified

You might put a proxy server in the __________________,which is exposed to the outside world,neither in the trusted nor untrusted network.

Correct Answer

verifed

verified

demilitari...

View Answer

Which type of IDPS is also known as a behavior-based intrusion detection system? 


A)  Network-based
B)  Anomaly-based 
C)  Host-based
D)  Signature-based

Correct Answer

verifed

verified

What is the range of the well-known ports used by TCP and UDP? 


A)  1024-65,536
B)  0-1023 
C)  0-65,536
D)  20, 21, 25, 53, 80

Correct Answer

verifed

verified

Which of the following biometric authentication systems is the most accepted by users? 


A)  Keystroke pattern recognition
B)  Fingerprint recognition 
C)  Signature recognition
D)  Retina pattern recognition

Correct Answer

verifed

verified

What is the next phase of the preattack data gathering process after an attacker has collected all of an organization's Internet addresses? 


A)  Footprinting
B)  Content filtering 
C)  Deciphering
D)  Fingerprinting

Correct Answer

verifed

verified

​____________  is a technology in which multiple real,routable external IP addresses are converted to special ranges of internal IP addresses,usually on a one-to-one basis.

Correct Answer

verifed

verified

Network-address tran...

View Answer

Which technology employs sockets to map internal private network addresses to a public address using a one-to-many mapping? 


A)  Network-address translation
B)  Screened-subnet firewall 
C)  Port-address translation
D)  Private address mapping

Correct Answer

verifed

verified

Was developed by Netscape in 1994 to provide security for online e-commerce transactions.


A)  VPN
B)  transport mode
C)  SSL
D)  PKI
E)  digital certificate
F)  asymmetric encryption
G)  Vernam cipher
H)  transposition cipher
I)  content filter
J)  footprinting

Correct Answer

verifed

verified

The intermediate area between trusted and untrusted networks is referred to as which of the following? 


A)  Unfiltered area
B)  Semi-trusted area 
C)  Demilitarized zone
D)  Proxy zone

Correct Answer

verifed

verified

C

Which of the following is used in conjunction with an algorithm to make computer data secure from anybody except the intended recipient of the data? 


A)  Key
B)  Plaintext 
C)  Cipher
D)  Cryptosystem

Correct Answer

verifed

verified

A

Which of the following is NOT among the three types of authentication mechanisms? 


A)  Something a person knows
B)  Something a person has 
C)  Something a person sees
D)  Something a person can produce

Correct Answer

verifed

verified

What is most commonly used for the goal of nonrepudiation in cryptography? 


A)  Block cipher
B)  Secret key 
C)  PKI
D)  Digital signature

Correct Answer

verifed

verified

A(n)____________________ token uses a challenge-response system in which the server challenges the user with a number,that when entered into the token provides a response that provides access.

Correct Answer

verifed

verified

Which of the following is true about firewalls and their ability to adapt in a network? 


A)  Firewalls can interpret human actions and make decisions outside their programming 
B)  Because firewalls are not programmed like a computer, they are less error prone 
C)  Firewalls are flexible and can adapt to new threats 
D)  Firewalls deal strictly with defined patterns of measured observation

Correct Answer

verifed

verified

____________________ presents a threat to wireless communications,a practice that makes it prudent to use a wireless encryption protocol to prevent unauthorized use of your Wi-Fi network.

Correct Answer

verifed

verified

​A cryptographic method that incorporates mathematical operations involving both a public key and a private key to encipher or decipher a message.


A)  VPN
B)  transport mode
C)  SSL
D)  PKI
E)  digital certificate
F)  asymmetric encryption
G)  Vernam cipher
H)  transposition cipher
I)  content filter
J)  footprinting

Correct Answer

verifed

verified

Which tool can best identify active computers on a network? 


A)  Packet sniffer 
B)  Port scanner 
C)  Trap and trace 
D)  Honey pot

Correct Answer

verifed

verified

Which type of device allows only specific packets with a particular source,destination,and port address to pass through it.


A)  Dynamic packet filtering firewall
B)  Proxy server 
C)  Intrusion detection system
D)  Application layer firewall

Correct Answer

verifed

verified

List the most common firewall implementation architectures.

Correct Answer

verifed

verified

Three architectural implementations of firewalls are especially common: single bastion hosts,screened-host firewalls,and screened-subnet firewalls. ​

Showing 1 - 20 of 61

Related Exams

Show Answer