Deck 12: Network Security

ملء الشاشة (f)
exit full mode
سؤال
Auditing a computer system is often a good way to deter crime.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
One of the most common ways to control access to a system is to require user IDs and passwords.
سؤال
Because of security concerns, modern network operating systems do not allow network administrators to create workgroups.
سؤال
The two leading attack methods for the last few years have exploited known vulnerabilities in operating systems and in application software.
سؤال
Both SSL and IPsec may eventually give way to S-HTTP, the newer security standard created by the Internet Engineering Task Force.
سؤال
Rarely, passwords become known, or "misplaced," and fall into the wrong hands.
سؤال
Top-level executives often have access to a narrow range of information within a company.
سؤال
Early cryptography algorithms used the same key for both encryption and decryption.
سؤال
Some computer systems generate random passwords that are very difficult to guess, but are also hard to remember.
سؤال
Pings are used most commonly by Unix-based systems.
سؤال
A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.
سؤال
The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.
سؤال
Many employees feel surveillance is an intrusion into their privacy.
سؤال
A worm is a form of computer virus.
سؤال
Controlling access to a computer network involves deciding and then limiting who can use the system and when the system can be used.
سؤال
One of the inherent problems with protecting a single key is that it means that only one key is used to both encode and decode the message.
سؤال
Internet systems are the only systems that experience security problems.
سؤال
One popular application of IPsec is in the support of virtual private networks.
سؤال
Expensive computer systems should always be placed in the basements of buildings.
سؤال
All system attacks need a user to open an e-mail or Web page.
سؤال
If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.

A)e-mail bombing
B)spoofing
C)smurfing
D)firewalling
سؤال
Some common types of denial of service include e-mail bombing, ____, and ping storm.

A)firewalling
B)filtering
C)smurfing
D)routing
سؤال
A proxy server sits inside a company's corporate network.
سؤال
The DES algorithm works with 128-bit blocks of data.
سؤال
One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____.

A)NOS
B)firewall
C)proxy
D)mobile malicious code
سؤال
All certificates are issued by a certificate authority.
سؤال
A ____ virus mutates with every infection, thus making them difficult to locate.

A)polymorphic
B)macro
C)boot sector
D)file infector
سؤال
The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.
سؤال
To authenticate electronic documents as yours, you need to create a digital signature.
سؤال
Many people consider the Trojan horse to be a form of computer ____.

A)virus
B)firewall
C)router
D)switch
سؤال
A ____ virus is a common type of virus that is programmed into an attached macro file.

A)boot sector
B)macro
C)polymorphic
D)file infector
سؤال
If you exclusive-OR a 0 and a 0, as is done with certain spread spectrum techniques, the result is 1.
سؤال
____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation.

A)E-mail bombing
B)Spoofing
C)Smurfing
D)Firewalling
سؤال
WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP).
سؤال
A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.
سؤال
A ____ virus is usually stored on some form of removable media. When the removable media (such as a flash drive) is connected to a new machine and is used to boot the machine, the virus moves from the media into the host system.

A)polymorphic
B)macro
C)boot sector
D)file infector
سؤال
A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.

A)polymorphic
B)macro
C)boot sector
D)file infector
سؤال
One of the primary functions of Kerberos is to authenticate users.
سؤال
A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.

A)ping
B)firewall
C)router
D)DNS
سؤال
A packet filter firewall is a computer running proxy server software, whose function is much like that of a librarian who controls access to books in a library's rare books room.
سؤال
A(n) ____ is the computer program that converts plaintext into an enciphered form.

A)worm
B)Trojan horse
C)firewall
D)encryption algorithm
سؤال
A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.

A)certificate
B)certificate authority
C)PKI
D)digital signature
سؤال
____ cable represented a major improvement in the ability of transmission media to secure sensitive data.

A)Coaxial
B)Twisted
C)Fiber-optic
D)Copper
سؤال
In ____, a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site.

A)smurfing
B)pharming
C)worming
D)e-mail bombing
سؤال
The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions.

A)firewall
B)Trojan horse
C)Data Encryption Standard (DES)
D)TCP
سؤال
Possibly the earliest example of a polyalphabetic cipher is the ____ cipher.

A)Caesars
B)Roman
C)Enigma
D)Vigenére
سؤال
____ involves electronically monitoring data flow and system requests into and out of their systems.

A)Worms
B)Intrusion detection
C)Firewalls
D)Routers
سؤال
____ may be considered a form of physical protection.

A)Router
B)Worms
C)Trojan horses
D)Surveillance
سؤال
____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.

A)Kerberos
B)DES
C)3DES
D)AES
سؤال
Perhaps the most common form of protection from unauthorized use of a computer system is the ____.

A)password
B)certificate
C)PKI
D)digital signature
سؤال
____ is data before any encryption has been performed.

A)Plaintext
B)Ciphertext
C)Encriptext
D)Cryptotext
سؤال
____ is a set of protocols created to support the secure transfer of data at the IP layer.

A)Transport Layer Security (TLS)
B)IPsec (IP security)
C)Date Encryption Standard (DES)
D)Advanced Encryption Standard (AES)
سؤال
SSL's successor is ____, which is based upon SSL version 3 and contains a few technical improvements over SSL.

A)Transport Layer Security (TLS)
B)IPsec
C)Date Encryption Standard (DES)
D)Advanced Encryption Standard (AES)
سؤال
A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.

A)transposition-based
B)monoalphabetic
C)polyalphabetic
D)multialphabetic
سؤال
The opposite of asymmetric encryption is ____ encryption, in which one key is used to encrypt and decrypt.

A)available key
B)asymmetric key
C)symmetric
D)public key
سؤال
____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users.

A)DES
B)PGP
C)3DES
D)AES
سؤال
____ usually involves having a software program that monitors every transaction within a system.

A)Firewalling
B)Routing
C)Access rights
D)Computer auditing
سؤال
The concept of two keys, public and private, is called ____ cryptography.

A)private key
B)public key
C)secret key
D)symmetric
سؤال
A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.

A)transposition
B)monoalphabetic
C)monotransposition
D)polytransposition
سؤال
A(n) ____ is the unique piece of information that is used to create ciphertext and then decrypt the ciphertext back into plaintext.

A)encryption algorithm
B)firewall
C)key
D)IP address
سؤال
A ____ is a list of certificates that have been revoked before their originally scheduled expiration date.

A)PKI
B)public key cryptography
C)digital certificate
D)certificate revocation list (CRL)
سؤال
The first security protocol for wireless LANs was ____.

A)Wi-Fi Protected Access (WPA)
B)Wired Equivalency Protocol (WEP)
C)IPsec
D)IEEE 802.11i
سؤال
In ____________________, a perpetrator sends an excessive amount of unwanted e-mail messages to someone.
سؤال
____ is the combination of encryption techniques, software, and services that involves all the necessary pieces to support digital certificates, certificate authorities, and public key generation, storage, and management.

A)3DES
B)Advanced Encryption Standard (AES)
C)Data Encryption Standard (DES)
D)Public key infrastructure (PKI)
سؤال
IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys.

A)802.11a
B)802.11b
C)802.11g
D)802.11i
سؤال
The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.

A)proxy server
B)switch
C)packet filter
D)hub
سؤال
____________________ define the network resources that a user or set of users can access.
سؤال
A computer ____________________ is a program that copies itself from one system to another over a network, without the assistance of a human being.
سؤال
Many certificates conform to the ____ standard.

A)X.309
B)X.409
C)X.509
D)X.609
سؤال
____________________ techniques that observe and record some aspect of the user, such as voiceprints, fingerprints, eyeprints, and faceprints, appear to be the wave of the future to replace passwords.
سؤال
In computer terminology, a(n) ____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource.
سؤال
____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.

A)Frequency hopping
B)Direct sequence
C)Time hopping
D)Amplitude sequence
سؤال
_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.
سؤال
A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.
سؤال
____ scanning works by recognizing the unique pattern of a virus.

A)Time-based
B)Amplitude-based
C)Signature-based
D)Frequency-based
سؤال
An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.

A)integrity checking
B)time division
C)direct sequence
D)frequency hopping
سؤال
A(n) ____________________ is a condition in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.
سؤال
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.

A)Spread spectrum
B)3DES
C)AES
D)PKI
سؤال
When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password, the type of attack is termed ____________________.
سؤال
A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Network Security
1
Auditing a computer system is often a good way to deter crime.
True
2
One of the most common ways to control access to a system is to require user IDs and passwords.
True
3
Because of security concerns, modern network operating systems do not allow network administrators to create workgroups.
False
4
The two leading attack methods for the last few years have exploited known vulnerabilities in operating systems and in application software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
Both SSL and IPsec may eventually give way to S-HTTP, the newer security standard created by the Internet Engineering Task Force.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
Rarely, passwords become known, or "misplaced," and fall into the wrong hands.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
Top-level executives often have access to a narrow range of information within a company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
Early cryptography algorithms used the same key for both encryption and decryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
Some computer systems generate random passwords that are very difficult to guess, but are also hard to remember.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
Pings are used most commonly by Unix-based systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
Many employees feel surveillance is an intrusion into their privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
A worm is a form of computer virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
Controlling access to a computer network involves deciding and then limiting who can use the system and when the system can be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
One of the inherent problems with protecting a single key is that it means that only one key is used to both encode and decode the message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
Internet systems are the only systems that experience security problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
One popular application of IPsec is in the support of virtual private networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
Expensive computer systems should always be placed in the basements of buildings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
All system attacks need a user to open an e-mail or Web page.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.

A)e-mail bombing
B)spoofing
C)smurfing
D)firewalling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
Some common types of denial of service include e-mail bombing, ____, and ping storm.

A)firewalling
B)filtering
C)smurfing
D)routing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
A proxy server sits inside a company's corporate network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
The DES algorithm works with 128-bit blocks of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____.

A)NOS
B)firewall
C)proxy
D)mobile malicious code
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
All certificates are issued by a certificate authority.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
A ____ virus mutates with every infection, thus making them difficult to locate.

A)polymorphic
B)macro
C)boot sector
D)file infector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
To authenticate electronic documents as yours, you need to create a digital signature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
Many people consider the Trojan horse to be a form of computer ____.

A)virus
B)firewall
C)router
D)switch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
A ____ virus is a common type of virus that is programmed into an attached macro file.

A)boot sector
B)macro
C)polymorphic
D)file infector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
If you exclusive-OR a 0 and a 0, as is done with certain spread spectrum techniques, the result is 1.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation.

A)E-mail bombing
B)Spoofing
C)Smurfing
D)Firewalling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
A ____ virus is usually stored on some form of removable media. When the removable media (such as a flash drive) is connected to a new machine and is used to boot the machine, the virus moves from the media into the host system.

A)polymorphic
B)macro
C)boot sector
D)file infector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.

A)polymorphic
B)macro
C)boot sector
D)file infector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
One of the primary functions of Kerberos is to authenticate users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.

A)ping
B)firewall
C)router
D)DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
A packet filter firewall is a computer running proxy server software, whose function is much like that of a librarian who controls access to books in a library's rare books room.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n) ____ is the computer program that converts plaintext into an enciphered form.

A)worm
B)Trojan horse
C)firewall
D)encryption algorithm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.

A)certificate
B)certificate authority
C)PKI
D)digital signature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
____ cable represented a major improvement in the ability of transmission media to secure sensitive data.

A)Coaxial
B)Twisted
C)Fiber-optic
D)Copper
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
In ____, a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site.

A)smurfing
B)pharming
C)worming
D)e-mail bombing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions.

A)firewall
B)Trojan horse
C)Data Encryption Standard (DES)
D)TCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
Possibly the earliest example of a polyalphabetic cipher is the ____ cipher.

A)Caesars
B)Roman
C)Enigma
D)Vigenére
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
____ involves electronically monitoring data flow and system requests into and out of their systems.

A)Worms
B)Intrusion detection
C)Firewalls
D)Routers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
____ may be considered a form of physical protection.

A)Router
B)Worms
C)Trojan horses
D)Surveillance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.

A)Kerberos
B)DES
C)3DES
D)AES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
Perhaps the most common form of protection from unauthorized use of a computer system is the ____.

A)password
B)certificate
C)PKI
D)digital signature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
____ is data before any encryption has been performed.

A)Plaintext
B)Ciphertext
C)Encriptext
D)Cryptotext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
____ is a set of protocols created to support the secure transfer of data at the IP layer.

A)Transport Layer Security (TLS)
B)IPsec (IP security)
C)Date Encryption Standard (DES)
D)Advanced Encryption Standard (AES)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
SSL's successor is ____, which is based upon SSL version 3 and contains a few technical improvements over SSL.

A)Transport Layer Security (TLS)
B)IPsec
C)Date Encryption Standard (DES)
D)Advanced Encryption Standard (AES)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.

A)transposition-based
B)monoalphabetic
C)polyalphabetic
D)multialphabetic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
The opposite of asymmetric encryption is ____ encryption, in which one key is used to encrypt and decrypt.

A)available key
B)asymmetric key
C)symmetric
D)public key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users.

A)DES
B)PGP
C)3DES
D)AES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
____ usually involves having a software program that monitors every transaction within a system.

A)Firewalling
B)Routing
C)Access rights
D)Computer auditing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
The concept of two keys, public and private, is called ____ cryptography.

A)private key
B)public key
C)secret key
D)symmetric
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.

A)transposition
B)monoalphabetic
C)monotransposition
D)polytransposition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
A(n) ____ is the unique piece of information that is used to create ciphertext and then decrypt the ciphertext back into plaintext.

A)encryption algorithm
B)firewall
C)key
D)IP address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
A ____ is a list of certificates that have been revoked before their originally scheduled expiration date.

A)PKI
B)public key cryptography
C)digital certificate
D)certificate revocation list (CRL)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
The first security protocol for wireless LANs was ____.

A)Wi-Fi Protected Access (WPA)
B)Wired Equivalency Protocol (WEP)
C)IPsec
D)IEEE 802.11i
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
In ____________________, a perpetrator sends an excessive amount of unwanted e-mail messages to someone.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
____ is the combination of encryption techniques, software, and services that involves all the necessary pieces to support digital certificates, certificate authorities, and public key generation, storage, and management.

A)3DES
B)Advanced Encryption Standard (AES)
C)Data Encryption Standard (DES)
D)Public key infrastructure (PKI)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys.

A)802.11a
B)802.11b
C)802.11g
D)802.11i
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.

A)proxy server
B)switch
C)packet filter
D)hub
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
____________________ define the network resources that a user or set of users can access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
A computer ____________________ is a program that copies itself from one system to another over a network, without the assistance of a human being.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
Many certificates conform to the ____ standard.

A)X.309
B)X.409
C)X.509
D)X.609
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
____________________ techniques that observe and record some aspect of the user, such as voiceprints, fingerprints, eyeprints, and faceprints, appear to be the wave of the future to replace passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
In computer terminology, a(n) ____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.

A)Frequency hopping
B)Direct sequence
C)Time hopping
D)Amplitude sequence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
____ scanning works by recognizing the unique pattern of a virus.

A)Time-based
B)Amplitude-based
C)Signature-based
D)Frequency-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.

A)integrity checking
B)time division
C)direct sequence
D)frequency hopping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
A(n) ____________________ is a condition in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.

A)Spread spectrum
B)3DES
C)AES
D)PKI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password, the type of attack is termed ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.