Deck 12: Network Security

Full screen (f)
exit full mode
Question
Controlling access to a computer network involves deciding and then limiting who can use the system and when the system can be used.
Use Space or
up arrow
down arrow
to flip the card.
Question
Both SSL and IPsec may eventually give way to S-HTTP,the newer security standard created by the Internet Engineering Task Force.
Question
Because of security concerns,modern network operating systems do not allow network administrators to create workgroups.
Question
One of the most common ways to control access to a system is to require user IDs and passwords.
Question
Internet systems are the only systems that experience security problems.
Question
Expensive computer systems should always be placed in the basements of buildings.
Question
Some computer systems generate random passwords that are very difficult to guess,but are also hard to remember.
Question
The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.
Question
A worm is a form of computer virus.
Question
Auditing a computer system is often a good way to deter crime.
Question
Many employees feel surveillance is an intrusion into their privacy.
Question
Rarely,passwords become known,or "misplaced," and fall into the wrong hands.
Question
Pings are used most commonly by Unix-based systems.
Question
The two leading attack methods for the last few years have exploited known vulnerabilities in operating systems and in application software.
Question
Top-level executives often have access to a narrow range of information within a company.
Question
All system attacks need a user to open an e-mail or Web page.
Question
One of the inherent problems with protecting a single key is that it means that only one key is used to both encode and decode the message.
Question
Early cryptography algorithms used the same key for both encryption and decryption.
Question
One popular application of IPsec is in the support of virtual private networks.
Question
A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.
Question
A proxy server sits inside a company's corporate network.
Question
To authenticate electronic documents as yours,you need to create a digital signature.
Question
A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.

A) ping
B) firewall
C) router
D) DNS
Question
A ____ virus mutates with every infection,thus making them difficult to locate.

A) polymorphic
B) macro
C) boot sector
D) file infector
Question
The DES algorithm works with 128-bit blocks of data.
Question
A packet filter firewall is a computer running proxy server software,whose function is much like that of a librarian who controls access to books in a library's rare books room.
Question
Some common types of denial of service include e-mail bombing,____,and ping storm.

A) firewalling
B) filtering
C) smurfing
D) routing
Question
A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.

A) polymorphic
B) macro
C) boot sector
D) file infector
Question
One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____.

A) NOS
B) firewall
C) proxy
D) mobile malicious code
Question
All certificates are issued by a certificate authority.
Question
A ____ virus is a common type of virus that is programmed into an attached macro file.

A) boot sector
B) macro
C) polymorphic
D) file infector
Question
A ____ virus is usually stored on some form of removable media.When the removable media (such as a flash drive)is connected to a new machine and is used to boot the machine,the virus moves from the media into the host system.

A) polymorphic
B) macro
C) boot sector
D) file infector
Question
____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP)broadcast addressing and other aspects of Internet operation.

A) E-mail bombing
B) Spoofing
C) Smurfing
D) Firewalling
Question
If e-mail messages have a return address of someone other than the person actually sending the e-mail,then the sender is ____.

A) e-mail bombing
B) spoofing
C) smurfing
D) firewalling
Question
If you exclusive-OR a 0 and a 0,as is done with certain spread spectrum techniques,the result is 1.
Question
WAP has been replaced by a new standard,Wired Equivalency Protocol (WEP).
Question
The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.
Question
A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.
Question
Many people consider the Trojan horse to be a form of computer ____.

A) virus
B) firewall
C) router
D) switch
Question
One of the primary functions of Kerberos is to authenticate users.
Question
____ is data before any encryption has been performed.

A) Plaintext
B) Ciphertext
C) Encriptext
D) Cryptotext
Question
____ involves electronically monitoring data flow and system requests into and out of their systems.

A) Worms
B) Intrusion detection
C) Firewalls
D) Routers
Question
____ cable represented a major improvement in the ability of transmission media to secure sensitive data.

A) Coaxial
B) Twisted
C) Fiber-optic
D) Copper
Question
A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.

A) certificate
B) certificate authority
C) PKI
D) digital signature
Question
A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.

A) transposition-based
B) monoalphabetic
C) polyalphabetic
D) multialphabetic
Question
A(n)____ is the computer program that converts plaintext into an enciphered form.

A) worm
B) Trojan horse
C) firewall
D) encryption algorithm
Question
____ is a set of protocols created to support the secure transfer of data at the IP layer.

A) Transport Layer Security (TLS)
B) IPsec (IP security)
C) Date Encryption Standard (DES)
D) Advanced Encryption Standard (AES)
Question
The concept of two keys,public and private,is called ____ cryptography.

A) private key
B) public key
C) secret key
D) symmetric
Question
Perhaps the most common form of protection from unauthorized use of a computer system is the ____.

A) password
B) certificate
C) PKI
D) digital signature
Question
____ usually involves having a software program that monitors every transaction within a system.

A) Firewalling
B) Routing
C) Access rights
D) Computer auditing
Question
SSL's successor is ____,which is based upon SSL version 3 and contains a few technical improvements over SSL.

A) Transport Layer Security (TLS)
B) IPsec
C) Date Encryption Standard (DES)
D) Advanced Encryption Standard (AES)
Question
____ may be considered a form of physical protection.

A) Router
B) Worms
C) Trojan horses
D) Surveillance
Question
Possibly the earliest example of a polyalphabetic cipher is the ____ cipher.

A) Caesars
B) Roman
C) Enigma
D) Vigenére
Question
The opposite of asymmetric encryption is ____ encryption,in which one key is used to encrypt and decrypt.

A) available key
B) asymmetric key
C) symmetric
D) public key
Question
____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.

A) Kerberos
B) DES
C) 3DES
D) AES
Question
A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.

A) transposition
B) monoalphabetic
C) monotransposition
D) polytransposition
Question
A(n)____ is the unique piece of information that is used to create ciphertext and then decrypt the ciphertext back into plaintext.

A) encryption algorithm
B) firewall
C) key
D) IP address
Question
The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions.

A) firewall
B) Trojan horse
C) Data Encryption Standard (DES)
D) TCP
Question
____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users.

A) DES
B) PGP
C) 3DES
D) AES
Question
In ____,a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site.

A) smurfing
B) pharming
C) worming
D) e-mail bombing
Question
A(n)____________________ is a condition in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.
Question
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.

A) Spread spectrum
B) 3DES
C) AES
D) PKI
Question
____________________ techniques that observe and record some aspect of the user,such as voiceprints,fingerprints,eyeprints,and faceprints,appear to be the wave of the future to replace passwords.
Question
A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.
Question
The first security protocol for wireless LANs was ____.

A) Wi-Fi Protected Access (WPA)
B) Wired Equivalency Protocol (WEP)
C) IPsec
D) IEEE 802.11i
Question
_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.
Question
In ____________________,a perpetrator sends an excessive amount of unwanted e-mail messages to someone.
Question
Many certificates conform to the ____ standard.

A) X.309
B) X.409
C) X.509
D) X.609
Question
A ____ is a list of certificates that have been revoked before their originally scheduled expiration date.

A) PKI
B) public key cryptography
C) digital certificate
D) certificate revocation list (CRL)
Question
A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.
Question
When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password,the type of attack is termed ____________________.
Question
The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.

A) proxy server
B) switch
C) packet filter
D) hub
Question
IEEE ____ addresses both weaknesses of WEP by allowing the keys,encryption algorithms,and negotiation to be dynamically assigned,and by adopting the AES encryption based on the Rijndael algorithm with 128-,192-,or 256-bit keys.

A) 802.11a
B) 802.11b
C) 802.11g
D) 802.11i
Question
In computer terminology,a(n)____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource.
Question
____ is the combination of encryption techniques,software,and services that involves all the necessary pieces to support digital certificates,certificate authorities,and public key generation,storage,and management.

A) 3DES
B) Advanced Encryption Standard (AES)
C) Data Encryption Standard (DES)
D) Public key infrastructure (PKI)
Question
____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.

A) Frequency hopping
B) Direct sequence
C) Time hopping
D) Amplitude sequence
Question
____ scanning works by recognizing the unique pattern of a virus.

A) Time-based
B) Amplitude-based
C) Signature-based
D) Frequency-based
Question
____________________ define the network resources that a user or set of users can access.
Question
A computer ____________________ is a program that copies itself from one system to another over a network,without the assistance of a human being.
Question
An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.

A) integrity checking
B) time division
C) direct sequence
D) frequency hopping
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Network Security
1
Controlling access to a computer network involves deciding and then limiting who can use the system and when the system can be used.
True
2
Both SSL and IPsec may eventually give way to S-HTTP,the newer security standard created by the Internet Engineering Task Force.
False
3
Because of security concerns,modern network operating systems do not allow network administrators to create workgroups.
False
4
One of the most common ways to control access to a system is to require user IDs and passwords.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Internet systems are the only systems that experience security problems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Expensive computer systems should always be placed in the basements of buildings.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Some computer systems generate random passwords that are very difficult to guess,but are also hard to remember.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
A worm is a form of computer virus.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Auditing a computer system is often a good way to deter crime.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Many employees feel surveillance is an intrusion into their privacy.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Rarely,passwords become known,or "misplaced," and fall into the wrong hands.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Pings are used most commonly by Unix-based systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
The two leading attack methods for the last few years have exploited known vulnerabilities in operating systems and in application software.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Top-level executives often have access to a narrow range of information within a company.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
All system attacks need a user to open an e-mail or Web page.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
One of the inherent problems with protecting a single key is that it means that only one key is used to both encode and decode the message.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Early cryptography algorithms used the same key for both encryption and decryption.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
One popular application of IPsec is in the support of virtual private networks.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
A proxy server sits inside a company's corporate network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
To authenticate electronic documents as yours,you need to create a digital signature.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.

A) ping
B) firewall
C) router
D) DNS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
A ____ virus mutates with every infection,thus making them difficult to locate.

A) polymorphic
B) macro
C) boot sector
D) file infector
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
The DES algorithm works with 128-bit blocks of data.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
A packet filter firewall is a computer running proxy server software,whose function is much like that of a librarian who controls access to books in a library's rare books room.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
Some common types of denial of service include e-mail bombing,____,and ping storm.

A) firewalling
B) filtering
C) smurfing
D) routing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.

A) polymorphic
B) macro
C) boot sector
D) file infector
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____.

A) NOS
B) firewall
C) proxy
D) mobile malicious code
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
All certificates are issued by a certificate authority.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
A ____ virus is a common type of virus that is programmed into an attached macro file.

A) boot sector
B) macro
C) polymorphic
D) file infector
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
A ____ virus is usually stored on some form of removable media.When the removable media (such as a flash drive)is connected to a new machine and is used to boot the machine,the virus moves from the media into the host system.

A) polymorphic
B) macro
C) boot sector
D) file infector
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP)broadcast addressing and other aspects of Internet operation.

A) E-mail bombing
B) Spoofing
C) Smurfing
D) Firewalling
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
If e-mail messages have a return address of someone other than the person actually sending the e-mail,then the sender is ____.

A) e-mail bombing
B) spoofing
C) smurfing
D) firewalling
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
If you exclusive-OR a 0 and a 0,as is done with certain spread spectrum techniques,the result is 1.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
WAP has been replaced by a new standard,Wired Equivalency Protocol (WEP).
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Many people consider the Trojan horse to be a form of computer ____.

A) virus
B) firewall
C) router
D) switch
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
One of the primary functions of Kerberos is to authenticate users.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
____ is data before any encryption has been performed.

A) Plaintext
B) Ciphertext
C) Encriptext
D) Cryptotext
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
____ involves electronically monitoring data flow and system requests into and out of their systems.

A) Worms
B) Intrusion detection
C) Firewalls
D) Routers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
____ cable represented a major improvement in the ability of transmission media to secure sensitive data.

A) Coaxial
B) Twisted
C) Fiber-optic
D) Copper
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.

A) certificate
B) certificate authority
C) PKI
D) digital signature
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.

A) transposition-based
B) monoalphabetic
C) polyalphabetic
D) multialphabetic
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)____ is the computer program that converts plaintext into an enciphered form.

A) worm
B) Trojan horse
C) firewall
D) encryption algorithm
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
____ is a set of protocols created to support the secure transfer of data at the IP layer.

A) Transport Layer Security (TLS)
B) IPsec (IP security)
C) Date Encryption Standard (DES)
D) Advanced Encryption Standard (AES)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The concept of two keys,public and private,is called ____ cryptography.

A) private key
B) public key
C) secret key
D) symmetric
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
Perhaps the most common form of protection from unauthorized use of a computer system is the ____.

A) password
B) certificate
C) PKI
D) digital signature
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
____ usually involves having a software program that monitors every transaction within a system.

A) Firewalling
B) Routing
C) Access rights
D) Computer auditing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
SSL's successor is ____,which is based upon SSL version 3 and contains a few technical improvements over SSL.

A) Transport Layer Security (TLS)
B) IPsec
C) Date Encryption Standard (DES)
D) Advanced Encryption Standard (AES)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
____ may be considered a form of physical protection.

A) Router
B) Worms
C) Trojan horses
D) Surveillance
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Possibly the earliest example of a polyalphabetic cipher is the ____ cipher.

A) Caesars
B) Roman
C) Enigma
D) Vigenére
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
The opposite of asymmetric encryption is ____ encryption,in which one key is used to encrypt and decrypt.

A) available key
B) asymmetric key
C) symmetric
D) public key
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.

A) Kerberos
B) DES
C) 3DES
D) AES
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.

A) transposition
B) monoalphabetic
C) monotransposition
D) polytransposition
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
A(n)____ is the unique piece of information that is used to create ciphertext and then decrypt the ciphertext back into plaintext.

A) encryption algorithm
B) firewall
C) key
D) IP address
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions.

A) firewall
B) Trojan horse
C) Data Encryption Standard (DES)
D) TCP
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users.

A) DES
B) PGP
C) 3DES
D) AES
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
In ____,a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site.

A) smurfing
B) pharming
C) worming
D) e-mail bombing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
A(n)____________________ is a condition in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.

A) Spread spectrum
B) 3DES
C) AES
D) PKI
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
____________________ techniques that observe and record some aspect of the user,such as voiceprints,fingerprints,eyeprints,and faceprints,appear to be the wave of the future to replace passwords.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
The first security protocol for wireless LANs was ____.

A) Wi-Fi Protected Access (WPA)
B) Wired Equivalency Protocol (WEP)
C) IPsec
D) IEEE 802.11i
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
In ____________________,a perpetrator sends an excessive amount of unwanted e-mail messages to someone.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
Many certificates conform to the ____ standard.

A) X.309
B) X.409
C) X.509
D) X.609
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
A ____ is a list of certificates that have been revoked before their originally scheduled expiration date.

A) PKI
B) public key cryptography
C) digital certificate
D) certificate revocation list (CRL)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password,the type of attack is termed ____________________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.

A) proxy server
B) switch
C) packet filter
D) hub
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
IEEE ____ addresses both weaknesses of WEP by allowing the keys,encryption algorithms,and negotiation to be dynamically assigned,and by adopting the AES encryption based on the Rijndael algorithm with 128-,192-,or 256-bit keys.

A) 802.11a
B) 802.11b
C) 802.11g
D) 802.11i
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
In computer terminology,a(n)____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
____ is the combination of encryption techniques,software,and services that involves all the necessary pieces to support digital certificates,certificate authorities,and public key generation,storage,and management.

A) 3DES
B) Advanced Encryption Standard (AES)
C) Data Encryption Standard (DES)
D) Public key infrastructure (PKI)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.

A) Frequency hopping
B) Direct sequence
C) Time hopping
D) Amplitude sequence
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
____ scanning works by recognizing the unique pattern of a virus.

A) Time-based
B) Amplitude-based
C) Signature-based
D) Frequency-based
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
____________________ define the network resources that a user or set of users can access.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
A computer ____________________ is a program that copies itself from one system to another over a network,without the assistance of a human being.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.

A) integrity checking
B) time division
C) direct sequence
D) frequency hopping
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.