Deck 13: Information Security

ملء الشاشة (f)
exit full mode
سؤال
A risk assessment is a thorough analysis of an organization's vulnerability to security breaches and an identification of its potential losses.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Social engineering involves manipulating social relationships to gain access to restricted resources.
سؤال
Digital certificate refers to the way in which two nodes agree on common parameters for the keys they will use.
سؤال
In bio-recognition, a device scans an individual's unique physical characteristics to verify identity.
سؤال
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as war dialers.
سؤال
In public key encryption, data is encrypted using a single key that only the sender and the receiver know.
سؤال
In private key encryption, data is encrypted using two keys.
سؤال
A public-key server is a publicly accessible host that freely provides a list of users' public keys.
سؤال
The combination of the public key and private key is known as a asymmetric encryption.
سؤال
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
سؤال
The combination of the public key and private key is known as a(n) key pair. _________________________
سؤال
A(n) digital certificate is a password-protected and encrypted file that holds an individual's identification information, including a public key. _________________________
سؤال
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system. _________________________
سؤال
Eavesdropping is the use of a transmission or recording device to capture conversations without the consent of the speakers. _________________________
سؤال
Bugging is the interception of a telephone conversation by accessing the telephone signal. _________________________
سؤال
A(n) authorization code is a sequence of numbers that allows an employee to gain access to a certain line through the PBX. _________________________
سؤال
A(n) telecommunications firewall is a type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network. _________________________
سؤال
A(n) packet-filtering firewall is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. _________________________
سؤال
The process of encapsulating one protocol to make it appear as another type of protocol is known as wiretapping. _________________________
سؤال
War driving is searching for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions. _________________________
سؤال
Which of he following represents a thorough analysis of an organizations's vulnerability to security breaches and an identification of its potential losses?

A) Server_hello
B) Risk assessment
C) SSL session
D) TLS
سؤال
Which of the following is a computer that, once connected to a network, can capture data packets traveling over the channel to which it is attached?

A) Sniffer
B) SSL session
C) Kerberos
D) Digital certificate
سؤال
The manipulation of social relationships to obtain information that could grant an intruder access to restricted resources, is referred to as:

A) SSL
B) Social engineering
C) Symmetric encryption
D) IP spoofing
سؤال
Which of the following is a method of encrypting TCP/IP transmissions en route between the client and server using public key encryption technology?

A) SSL session
B) TLS
C) SSL
D) WEP
سؤال
Which of the following describes an association between the client and the server that is defined by an agreement on a specific set of encryption techniques?

A) SSL session
B) Tunneling
C) HTTPS
D) Kerberos
سؤال
Which of the following is also referred to as private key encryption?

A) TLS
B) Symmetric encryption
C) Kerberos
D) Digital certificate
سؤال
A type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network, is referred to as:

A) Packet-filtering
B) Kerberos
C) PGP
D) Telecommunications
سؤال
The unauthorized use of a telephone line to complete long distance calls at another's expense is referred to as:

A) Tunneling
B) Toll fraud
C) War dialer
D) Sniffer
سؤال
The process of encapsulating one protocol to make it appear as another is referred to as:

A) IP spoofing
B) Bugging
C) Wiretapping
D) Tunneling
سؤال
A computer program that dials multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, is referred to as:

A) War dialer
B) War driver
C) Sniffer
D) None of the above
سؤال
The interception of a telephone conversation by accessing the telephone signal is referred to as:

A) Wiretapping
B) War dialing
C) Toll fraud
D) Sniffing
سؤال
Which of the following describes the use of a microphone with a small RF transmitter placed near an audio source an a nearby receiver to eavesdrop?

A) Kerberos
B) Key pair
C) Bugging
D) Wire tapping
سؤال
The unique data block that results when an original piece of data is encrypted, is referred to as:

A) Digital certificate
B) Cipher text
C) SSL session
D) None of the above
سؤال
Which of the following is a password-protected and encrypted file that holds an individual's identification information, including a private and a public key?

A) Key pair
B) Cipher text
C) Digital certificate
D) IPSec
سؤال
The use of a transmission or recording device to capture conversations without the consent of the speakers, is known as:

A) Bugging
B) Wiretapping
C) Social engineering
D) Eavesdropping
سؤال
Which of the following allows the client and server to authenticate and establish how they will securely exchange data during an SSL session?

A) IPSec
B) Handshake protocol
C) PGP
D) EAP
سؤال
Which of the following is the URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption?

A) HTPS
B) HTTP
C) HTTPS
D) HHTPS
سؤال
Which of the following is first phase of IPSec authentication which accomplishes key management?

A) IPSec
B) Internet Key Exchange
C) PPTP
D) PGP
سؤال
Which of the following is a Layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions?

A) IKE
B) IPSec
C) L2F
D) PPTP
سؤال
Which of the following is a security attack in which an outsider obtains internal IP addresses?

A) IP spoofing
B) Tunneling
C) Wiretapping
D) War driving
سؤال
Which of the following is a series of characters that is combined with a block of data during that data's encryption?

A) Key management
B) Key pair
C) Key
D) None of the above
سؤال
The method whereby two nodes using key encryption agree on common parameters for the keys they will use to encrypt data, is referred to as:

A) Key management
B) Key pair
C) Kerberos
D) Key encryption
سؤال
Which of the following represents the combination of a public and a private key?

A) L2F
B) Key pair
C) IKE
D) L2TP
سؤال
Which of the following provides tunneling for other protocols and can work with the authentication methods used by PPP?

A) L2F
B) L2TF
C) L2TPP
D) L2FT
سؤال
Which of the following is a router that operates at the Data Link and Transport layers of the OSI model, examining the header of every packet of data that it receives to determine whether that type of packet is authorized to continue to its destination?

A) Firewall
B) Packet-filtering firewall
C) Kerberos
D) None of the above
سؤال
Which of the following supports the encryption, authentication, and LAN access services provided by RAS?

A) PGP
B) L2TP
C) PPTP
D) WEP
سؤال
Which of the following is a key-based encryption system for e-mail that uses a two-step verification process?

A) PGP
B) L2TP
C) EAP
D) Kerberos
سؤال
Which of the following is a setting that allows NIC to indiscriminately accept all packets traversing the network channel to which it is attached?

A) Server_hello
B) Promiscuous mode
C) Proxy mode
D) None of the above
سؤال
Which of the following allows data to be encrypted with two keys?

A) Kerberos
B) Private key encryption
C) Public key encryption
D) Digital certificate
سؤال
A publicly available host that provides free access to a list of user's public keys, is referred to as:

A) Proxy server
B) DNS server
C) Public-key server
D) None of the above
سؤال
Which of the following is a sequence of numbers that allows an employee to gain access to a certain line or feature?

A) Key pair
B) DES
C) Authorization code
D) Key
سؤال
Which of the following is a person who masters the inner workings of operating systems and utilities in an effort to better understand them?

A) Hacker
B) Sniffer
C) Cracker
D) War dialer
سؤال
Which of the following is a method for granting access to restricted rooms in which a device scans an individual's unique physical characteristics?

A) Bio-recognition access
B) Social engineering
C) DISA
D) Tunneling
سؤال
Which of the following is a person who uses his or her knowledge of operating systems and utilities to intentionally damage or destroy data or systems?

A) Hacker
B) Sniffer
C) War dialer
D) Cracker
سؤال
Which of the following is a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting?

A) Cipher text
B) Client_hello
C) Digital certificate
D) HTTPS
سؤال
Does a risk assessment normally lead to recommendations for improving information security?
سؤال
Does public key encryption involve the use of a single key that only the sender and the receiver know?
سؤال
In private key encryption, is data encrypted with two keys?
سؤال
Does the term key pair refer to the combination of the public key and private key?
سؤال
Does the term digital certificate refer to the way in which two nodes agree on common parameters for the keys they will use?
سؤال
Does the term key management refer to a password-protected and encrypted file that holds an individual's identification information, including a public key?
سؤال
Is Kerberos a cross-platform authentication protocol that uses key encryption to verify the identity of clients?
سؤال
Can you use PGP to verify the authenticity of an e-mail sender?
سؤال
Does the handshake protocol authenticate the client and server, and establish terms for how they will securely exchange data?
سؤال
A(n) ____________________ should lead to recommendations for improving information security and must precede any of the protective measures described in this chapter.
سؤال
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as ____________________.
سؤال
In ____________________, data is encrypted using a single key that only the sender and the receiver know.
سؤال
In ____________________ encryption, data is encrypted using two keys.
سؤال
The combination of the public key and private key is known as a(n) ____________________.
سؤال
A(n) ____________________ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
سؤال
____________________ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
سؤال
____________________ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
سؤال
The ____________________ protocol authenticates (or introduces) the client and server to each other and establishes terms for how they will securely exchange data.
سؤال
____________________ is the use of a transmission or recording device to capture conversations without the consent of the speakers.
سؤال
Match each statement below with the correct item

-A security attack in which an outsider obtains internal IP addresses, then uses them to pretend that he or she has authority to access a private network from the Internet.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
سؤال
Match each statement below with the correct item

-The combination of a public and private key used to decipher data that has been encrypted using public key encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
سؤال
Match each statement below with the correct item

-The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
سؤال
Match each statement below with the correct item

-A series of characters that is combined with a block of data during that data's encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
سؤال
Match each statement below with the correct item

-The use of a microphone with a small RF transmitter placed near an audio source and a nearby receiver to eavesdrop.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
سؤال
Match each statement below with the correct item

-The unique data block that results when an original piece of data is encrypted.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/92
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Information Security
1
A risk assessment is a thorough analysis of an organization's vulnerability to security breaches and an identification of its potential losses.
True
2
Social engineering involves manipulating social relationships to gain access to restricted resources.
True
3
Digital certificate refers to the way in which two nodes agree on common parameters for the keys they will use.
False
4
In bio-recognition, a device scans an individual's unique physical characteristics to verify identity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
5
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as war dialers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
6
In public key encryption, data is encrypted using a single key that only the sender and the receiver know.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
7
In private key encryption, data is encrypted using two keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
8
A public-key server is a publicly accessible host that freely provides a list of users' public keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
9
The combination of the public key and private key is known as a asymmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
10
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
11
The combination of the public key and private key is known as a(n) key pair. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
12
A(n) digital certificate is a password-protected and encrypted file that holds an individual's identification information, including a public key. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
13
PGP is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
14
Eavesdropping is the use of a transmission or recording device to capture conversations without the consent of the speakers. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
15
Bugging is the interception of a telephone conversation by accessing the telephone signal. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
16
A(n) authorization code is a sequence of numbers that allows an employee to gain access to a certain line through the PBX. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
17
A(n) telecommunications firewall is a type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
18
A(n) packet-filtering firewall is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
19
The process of encapsulating one protocol to make it appear as another type of protocol is known as wiretapping. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
20
War driving is searching for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of he following represents a thorough analysis of an organizations's vulnerability to security breaches and an identification of its potential losses?

A) Server_hello
B) Risk assessment
C) SSL session
D) TLS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is a computer that, once connected to a network, can capture data packets traveling over the channel to which it is attached?

A) Sniffer
B) SSL session
C) Kerberos
D) Digital certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
23
The manipulation of social relationships to obtain information that could grant an intruder access to restricted resources, is referred to as:

A) SSL
B) Social engineering
C) Symmetric encryption
D) IP spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is a method of encrypting TCP/IP transmissions en route between the client and server using public key encryption technology?

A) SSL session
B) TLS
C) SSL
D) WEP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following describes an association between the client and the server that is defined by an agreement on a specific set of encryption techniques?

A) SSL session
B) Tunneling
C) HTTPS
D) Kerberos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is also referred to as private key encryption?

A) TLS
B) Symmetric encryption
C) Kerberos
D) Digital certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
27
A type of firewall that monitors incoming and outgoing voice traffic and selectively blocks telephone calls between different areas of a voice network, is referred to as:

A) Packet-filtering
B) Kerberos
C) PGP
D) Telecommunications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
28
The unauthorized use of a telephone line to complete long distance calls at another's expense is referred to as:

A) Tunneling
B) Toll fraud
C) War dialer
D) Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
29
The process of encapsulating one protocol to make it appear as another is referred to as:

A) IP spoofing
B) Bugging
C) Wiretapping
D) Tunneling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
30
A computer program that dials multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, is referred to as:

A) War dialer
B) War driver
C) Sniffer
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
31
The interception of a telephone conversation by accessing the telephone signal is referred to as:

A) Wiretapping
B) War dialing
C) Toll fraud
D) Sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following describes the use of a microphone with a small RF transmitter placed near an audio source an a nearby receiver to eavesdrop?

A) Kerberos
B) Key pair
C) Bugging
D) Wire tapping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
33
The unique data block that results when an original piece of data is encrypted, is referred to as:

A) Digital certificate
B) Cipher text
C) SSL session
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is a password-protected and encrypted file that holds an individual's identification information, including a private and a public key?

A) Key pair
B) Cipher text
C) Digital certificate
D) IPSec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
35
The use of a transmission or recording device to capture conversations without the consent of the speakers, is known as:

A) Bugging
B) Wiretapping
C) Social engineering
D) Eavesdropping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following allows the client and server to authenticate and establish how they will securely exchange data during an SSL session?

A) IPSec
B) Handshake protocol
C) PGP
D) EAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is the URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption?

A) HTPS
B) HTTP
C) HTTPS
D) HHTPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is first phase of IPSec authentication which accomplishes key management?

A) IPSec
B) Internet Key Exchange
C) PPTP
D) PGP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is a Layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions?

A) IKE
B) IPSec
C) L2F
D) PPTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is a security attack in which an outsider obtains internal IP addresses?

A) IP spoofing
B) Tunneling
C) Wiretapping
D) War driving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of the following is a series of characters that is combined with a block of data during that data's encryption?

A) Key management
B) Key pair
C) Key
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
42
The method whereby two nodes using key encryption agree on common parameters for the keys they will use to encrypt data, is referred to as:

A) Key management
B) Key pair
C) Kerberos
D) Key encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following represents the combination of a public and a private key?

A) L2F
B) Key pair
C) IKE
D) L2TP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following provides tunneling for other protocols and can work with the authentication methods used by PPP?

A) L2F
B) L2TF
C) L2TPP
D) L2FT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following is a router that operates at the Data Link and Transport layers of the OSI model, examining the header of every packet of data that it receives to determine whether that type of packet is authorized to continue to its destination?

A) Firewall
B) Packet-filtering firewall
C) Kerberos
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following supports the encryption, authentication, and LAN access services provided by RAS?

A) PGP
B) L2TP
C) PPTP
D) WEP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following is a key-based encryption system for e-mail that uses a two-step verification process?

A) PGP
B) L2TP
C) EAP
D) Kerberos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is a setting that allows NIC to indiscriminately accept all packets traversing the network channel to which it is attached?

A) Server_hello
B) Promiscuous mode
C) Proxy mode
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following allows data to be encrypted with two keys?

A) Kerberos
B) Private key encryption
C) Public key encryption
D) Digital certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
50
A publicly available host that provides free access to a list of user's public keys, is referred to as:

A) Proxy server
B) DNS server
C) Public-key server
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following is a sequence of numbers that allows an employee to gain access to a certain line or feature?

A) Key pair
B) DES
C) Authorization code
D) Key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following is a person who masters the inner workings of operating systems and utilities in an effort to better understand them?

A) Hacker
B) Sniffer
C) Cracker
D) War dialer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following is a method for granting access to restricted rooms in which a device scans an individual's unique physical characteristics?

A) Bio-recognition access
B) Social engineering
C) DISA
D) Tunneling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is a person who uses his or her knowledge of operating systems and utilities to intentionally damage or destroy data or systems?

A) Hacker
B) Sniffer
C) War dialer
D) Cracker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following is a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting?

A) Cipher text
B) Client_hello
C) Digital certificate
D) HTTPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
56
Does a risk assessment normally lead to recommendations for improving information security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
57
Does public key encryption involve the use of a single key that only the sender and the receiver know?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
58
In private key encryption, is data encrypted with two keys?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
59
Does the term key pair refer to the combination of the public key and private key?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
60
Does the term digital certificate refer to the way in which two nodes agree on common parameters for the keys they will use?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
61
Does the term key management refer to a password-protected and encrypted file that holds an individual's identification information, including a public key?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
62
Is Kerberos a cross-platform authentication protocol that uses key encryption to verify the identity of clients?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
63
Can you use PGP to verify the authenticity of an e-mail sender?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
64
Does the handshake protocol authenticate the client and server, and establish terms for how they will securely exchange data?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
65
A(n) ____________________ should lead to recommendations for improving information security and must precede any of the protective measures described in this chapter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
66
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
67
In ____________________, data is encrypted using a single key that only the sender and the receiver know.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
68
In ____________________ encryption, data is encrypted using two keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
69
The combination of the public key and private key is known as a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
70
A(n) ____________________ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
71
____________________ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
72
____________________ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
73
The ____________________ protocol authenticates (or introduces) the client and server to each other and establishes terms for how they will securely exchange data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
74
____________________ is the use of a transmission or recording device to capture conversations without the consent of the speakers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
75
Match each statement below with the correct item

-A security attack in which an outsider obtains internal IP addresses, then uses them to pretend that he or she has authority to access a private network from the Internet.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
76
Match each statement below with the correct item

-The combination of a public and private key used to decipher data that has been encrypted using public key encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
77
Match each statement below with the correct item

-The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
78
Match each statement below with the correct item

-A series of characters that is combined with a block of data during that data's encryption.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
79
Match each statement below with the correct item

-The use of a microphone with a small RF transmitter placed near an audio source and a nearby receiver to eavesdrop.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
80
Match each statement below with the correct item

-The unique data block that results when an original piece of data is encrypted.

A)HTTPS
B)Cipher text
C)IP spoofing
D)Bio-recognition access
E)Key
F)Bugging
G)Denial of service attack
H)Key management
I)Key pair
J)Eavesdropping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 92 في هذه المجموعة.