Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Choose the correct answer: 1. , backs up everything changed since the last backup of any kind. While backs up everything changed sinee the last

image text in transcribed
image text in transcribed
image text in transcribed
Choose the correct answer: 1. , backs up everything changed since the last backup of any kind. While backs up everything changed sinee the last full backup a. Incremental backup; Differential backup b. Differential backup; Incremental backup c. Ineremental backup; Incremental backup d. Differential backup; Differential backup 2. To digitally singe an email, the will be used, while to verify a digital signature, the will be used. a. Sender private key; Sender public key b. Sender public key; Sender private key c. Recipient private key; Recipient public key d. Recipient public key; Recipient private key 3. What firewall mechanism do you use to dictate what traffic is allowed and what traffic is denied? a. Every firewall is different b. Firewall rules c. Written policy d. Firewalls do that automatically 4. If both Bluetooth deviees have a screen to display a 6 -digit number and can acecpt a yeso response. which Association Model should you use? a. Passkcy Entry b. Numeric Comparison c. Out of Band (OOB) d. Just Works 5. What type of systems do you put in the DMZ? a. A DMZ has no servers, just client PCs b. Servers with sensitive data only c. Public access systems d. Firewalls 6. How many cookie repositories are on your PC ? a. One shared by all browsers b. Each browser has at least two c. One per browser installed d. One for each type of cookie 7. Which of the following is one of the things your browser sends to the web server each time you connect? a. Browsers only receive information, they don't send it b. Username and password c. Amount of RAM installed d. OS and version 8. To stop an attack, an Intrusion Protection System must also be: a. Intrusion Detection System (IDS) b. Domain Name System (DNS) c. Internet Service Provider (1SP) d. Intrusion Protection System 9. is malware that must insert itself into other exccutable code. While , is malware that is self-standing and self-propagating in nature. a. Trojan borse; spyware b. Vinus; worm c. Cryptojackine; worm 10. What is the encryption specification for Wi-Fi used to improve Wi-Fi sccurity? a. WEP b. WPA c. WPA2 11. Which type of algorithm always gives a fixed length output? a. SymmetricAlgorith b. AsymmetricAlgorithm c. No algorithms do that d. One-Way Hash Algorithm 12. Why was the cookie initially invented? a. To give web communication a form of statefulness b. To make web communications have no statefulness c. To make shopping carts work d. All of the above 13. Which of the following is not provided by virtual private network (VPN): a. Malware protectice b. Pocket encryption c. Source authentication d. All of the above 14. How does exploit software differ from a valnerability seanner? a. Exploit software exploits the target system b. Vulnerability scanners produce a lot of false negatives c. Vulnenability scanner reports are much more reliable d. They are the sume thing 15. To make backups more secure, what do you increase a. The amount of distance scpurating data backups b. The number of integrity checks on the data c. The number of people with secess to the backups 16. If the protocol acronym ends with "S", such as FIPS, it uses a. SSLAIS b. SSH c. Both SSL/TIS and SSH d. Do not use any other protocols 17. To encrypt an email message, the will be used, while to decrypt the encrypted cmail message, will be used. a. Sender private key; Sender public key b. Sender public key; Sender private key c. Recipient private key; Recipient public key d. Recipient public key; Recipient private key 18. To prove nonrepudiation, which two facts must you prove? a. When the document was sent b. Who sent the document c. The document was not tampered (received document is identical to sent document) d. b. and c. 19. Which of the following are examples of Active Content? a. Active X b. Java c. Java Script d. B and C c. All of the above 20. MAC address filtering allows preconfigured MAC address to connect to the access point. Which of the following is a feature of this technology? a. Easy to manage in small office b. Hard to manage in a large organization c. Easy to spoof the MAC address d. a and b. e. All of the above

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

5. Understand how cultural values influence conflict behavior.

Answered: 1 week ago