Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Data Communications Study Set 1
Quiz 12: Network Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Short Answer
A(n)____________________ is a condition in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.
Question 62
Multiple Choice
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.
Question 63
Short Answer
____________________ techniques that observe and record some aspect of the user,such as voiceprints,fingerprints,eyeprints,and faceprints,appear to be the wave of the future to replace passwords.
Question 64
Short Answer
A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.
Question 65
Multiple Choice
The first security protocol for wireless LANs was ____.
Question 66
Short Answer
_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.
Question 67
Short Answer
In ____________________,a perpetrator sends an excessive amount of unwanted e-mail messages to someone.
Question 68
Multiple Choice
Many certificates conform to the ____ standard.
Question 69
Multiple Choice
A ____ is a list of certificates that have been revoked before their originally scheduled expiration date.
Question 70
Short Answer
A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.
Question 71
Short Answer
When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password,the type of attack is termed ____________________.
Question 72
Multiple Choice
The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.
Question 73
Multiple Choice
IEEE ____ addresses both weaknesses of WEP by allowing the keys,encryption algorithms,and negotiation to be dynamically assigned,and by adopting the AES encryption based on the Rijndael algorithm with 128-,192-,or 256-bit keys.