Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Data Communications and Computer Networks
Quiz 12: Network Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.
Question 22
Multiple Choice
Some common types of denial of service include e-mail bombing, ____, and ping storm.
Question 23
True/False
A proxy server sits inside a company's corporate network.
Question 24
True/False
The DES algorithm works with 128-bit blocks of data.
Question 25
Multiple Choice
One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____.
Question 26
True/False
All certificates are issued by a certificate authority.
Question 27
Multiple Choice
A ____ virus mutates with every infection, thus making them difficult to locate.
Question 28
True/False
The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.
Question 29
True/False
To authenticate electronic documents as yours, you need to create a digital signature.
Question 30
Multiple Choice
Many people consider the Trojan horse to be a form of computer ____.
Question 31
Multiple Choice
A ____ virus is a common type of virus that is programmed into an attached macro file.
Question 32
True/False
If you exclusive-OR a 0 and a 0, as is done with certain spread spectrum techniques, the result is 1.
Question 33
Multiple Choice
____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation.
Question 34
True/False
WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP).
Question 35
True/False
A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.
Question 36
Multiple Choice
A ____ virus is usually stored on some form of removable media. When the removable media (such as a flash drive) is connected to a new machine and is used to boot the machine, the virus moves from the media into the host system.