Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Complete the following sentence. A digital signature is a ____ A. hash value that has been encrypted with the senders private key B. hash value

Complete the following sentence. A digital signature is a ____

A. hash value that has been encrypted with the senders private key

B. hash value that has been encrypted with the senders public key

C. hash value that has been encrypted with the senders Session key

D. it is senders signature signed and scanned in a digital format

What type of key would you find within a browser's list of trusted root CA?

A. Private key

B. Symmetric key

C. Recovery key

D. Public key

Which of the following protocols offers native encryption?

A. IPSEC, SSH, PPTP, SSL, MPLS, L2F, and L2TP

B. IPSEC, SSH, SSL, TFTP

C. IPSEC, SSH, SSL, TLS

D. IPSEC, SSH, PPTP, SSL, MPLS, and L2TP

You've decided to authenticate the source who initiated a particular transfer while ensuring integrity of the data being transferred. You can do this by:

A. Having the sender encrypt the message with his private key.

B. Having the sender encrypt the hash with his private key.

C. Having the sender encrypt the message with his symmetric key.

D. Having the sender encrypt the hash with his public key.

The RSA algorithm is an example of what type of cryptography?

A. Asymmetric Key.

B. Symmetric Key.

C. Secret Key.

D. Private Key.

The DES algorithm is an example of what type of cryptography?

A. Secret Key

B. Two-key

C. Asymmetric Key

D. Public Key

Which of the following groups represents the leading source of computer crime losses?

A. Hackers

B. Industrial saboteurs

C. Foreign intelligence officers

D. Employees

Who is ultimately responsible for the security of computer based information systems within an organization?

A. The tech support team

B. The Operation Team.

C. The management team.

D. The training team.

What does "residual risk" mean?

A. The security risk that remains after controls have been implemented

B. Weakness of an assets which can be exploited by a threat

C. Risk that remains after risk assessment has has been performed

D. A security risk intrinsic to an asset being audited, where no mitigation has taken place.

When referring to the data structures of a packet, the term Protocol Data Unit (PDU) is used, what is the proper term to refer to a single unit of TCP data at the transport layer?

A. TCP segment.

B. TCP datagram.

C. TCP frame.

D. TCP packet.

How do you distinguish between a bridge and a router?

A. A bridge simply connects multiple networks, a router examines each packet to determine which network to forward it to.

B. "Bridge" and "router" are synonyms for equipment used to join two networks.

C. The bridge is a specific type of router used to connect a LAN to the global Internet.

D. The bridge connects multiple networks at the data link layer, while router connects multiple networks at the network layer.

ICMP and IGMP belong to which layer of the OSI model?

A. Datagram Layer.

B. Network Layer.

C. Transport Layer.

D. Data Link Layer.

Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet)?

A. 192.168.42.5

B. 192.166.42.5

C. 192.175.42.5

D. 192.1.42.5

Which one of the following authentication mechanisms creates a problem for mobile users?

A. Mechanisms based on IP addresses

B. Mechanism with reusable passwords

C. one-time password mechanism.

D. challenge response mechanism.

Which of the following media is MOST resistant to tapping?

A. microwave.

B. twisted pair.

C. coaxial cable.

D. fiber optic.

Which one of the following is usually not a benefit resulting from the use of firewalls?

A. reduces the risks of external threats from malicious hackers.

B. prevents the spread of viruses.

C. reduces the threat level on internal system.

D. allows centralized management and control of services.

What is the 802.11 standard related to?

A. Public Key Infrastructure (PKI)

B. Wireless network communications

C. Packet-switching technology

D. The OSI/ISO model

In the Open Systems Interconnect (OSI) Reference Model, at what level are TCP and UDP provided?

A. Transport

B. Network

C. Presentation

D. Application

Which of the following is TRUE regarding Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?

A. TCP is connection-oriented, UDP is not.

B. UDP provides for Error Correction, TCP does not.

C. UDP is useful for longer messages, rather than TCP.

D. TCP does not guarantee delivery of data, while UDP does guarantee data delivery.

Which of the following protocol is PRIMARILY used to provide confidentiality in a web based application thus protecting data sent across a client machine and a server?

SSL

B. FTP

C. SSH

D. S/MIME

Which of the following service is a distributed database that translate host name to IP address and IP address to host name?

A. DNS

B. FTP

C. SSH

D. SMTP

How many bits is the address space reserved for the source IP address within an IPv6 header?

A. 128

B. 32

C. 64

D. 256

What is the three way handshake sequence used to initiate TCP connections?

A. ACK, SYN/ACK, ACK

B. SYN, SYN/ACK, ACK

C. SYN, SYN, ACK/ACK

D. ACK, SYN/ACK, SYN

Layer 2 of the OSI model has two sublayers. What are those sublayers, and what are two IEEE standards that describe technologies at that layer?

A. LCL and MAC; IEEE 802.2 and 802.3

B. LCL and MAC; IEEE 802.1 and 802.3

C. Network and MAC; IEEE 802.1 and 802.3

D. LLC and MAC; IEEE 802.2 and 802.3

Briefly define and discuss what you understand by CIA in IT security

TCP connections are initiated with a 3-way handshake, what is the process of ending a TCP connection?

Define the following terms as it relates to IT security: availability, integrity, confidentiality, authentication and non-repudiation.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Databases 11th British National Conference On Databases Bncod 11 Keele Uk July 7 9 1993 Proceedings Lncs 696

Authors: Michael F. Worboys ,Anna F. Grundy

1993rd Edition

3540569219, 978-3540569213

More Books

Students also viewed these Databases questions

Question

6. What is accomplished by thinking beyond my own needs?

Answered: 1 week ago

Question

Classify delivery styles by type.

Answered: 1 week ago