Question
Complete the following sentence. A digital signature is a ____ A. hash value that has been encrypted with the senders private key B. hash value
Complete the following sentence. A digital signature is a ____
A. hash value that has been encrypted with the senders private key
B. hash value that has been encrypted with the senders public key
C. hash value that has been encrypted with the senders Session key
D. it is senders signature signed and scanned in a digital format
What type of key would you find within a browser's list of trusted root CA?
A. Private key
B. Symmetric key
C. Recovery key
D. Public key
Which of the following protocols offers native encryption?
A. IPSEC, SSH, PPTP, SSL, MPLS, L2F, and L2TP
B. IPSEC, SSH, SSL, TFTP
C. IPSEC, SSH, SSL, TLS
D. IPSEC, SSH, PPTP, SSL, MPLS, and L2TP
You've decided to authenticate the source who initiated a particular transfer while ensuring integrity of the data being transferred. You can do this by:
A. Having the sender encrypt the message with his private key.
B. Having the sender encrypt the hash with his private key.
C. Having the sender encrypt the message with his symmetric key.
D. Having the sender encrypt the hash with his public key.
The RSA algorithm is an example of what type of cryptography?
A. Asymmetric Key.
B. Symmetric Key.
C. Secret Key.
D. Private Key.
The DES algorithm is an example of what type of cryptography?
A. Secret Key
B. Two-key
C. Asymmetric Key
D. Public Key
Which of the following groups represents the leading source of computer crime losses?
A. Hackers
B. Industrial saboteurs
C. Foreign intelligence officers
D. Employees
Who is ultimately responsible for the security of computer based information systems within an organization?
A. The tech support team
B. The Operation Team.
C. The management team.
D. The training team.
What does "residual risk" mean?
A. The security risk that remains after controls have been implemented
B. Weakness of an assets which can be exploited by a threat
C. Risk that remains after risk assessment has has been performed
D. A security risk intrinsic to an asset being audited, where no mitigation has taken place.
When referring to the data structures of a packet, the term Protocol Data Unit (PDU) is used, what is the proper term to refer to a single unit of TCP data at the transport layer?
A. TCP segment.
B. TCP datagram.
C. TCP frame.
D. TCP packet.
How do you distinguish between a bridge and a router?
A. A bridge simply connects multiple networks, a router examines each packet to determine which network to forward it to.
B. "Bridge" and "router" are synonyms for equipment used to join two networks.
C. The bridge is a specific type of router used to connect a LAN to the global Internet.
D. The bridge connects multiple networks at the data link layer, while router connects multiple networks at the network layer.
ICMP and IGMP belong to which layer of the OSI model?
A. Datagram Layer.
B. Network Layer.
C. Transport Layer.
D. Data Link Layer.
Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet)?
A. 192.168.42.5
B. 192.166.42.5
C. 192.175.42.5
D. 192.1.42.5
Which one of the following authentication mechanisms creates a problem for mobile users?
A. Mechanisms based on IP addresses
B. Mechanism with reusable passwords
C. one-time password mechanism.
D. challenge response mechanism.
Which of the following media is MOST resistant to tapping?
A. microwave.
B. twisted pair.
C. coaxial cable.
D. fiber optic.
Which one of the following is usually not a benefit resulting from the use of firewalls?
A. reduces the risks of external threats from malicious hackers.
B. prevents the spread of viruses.
C. reduces the threat level on internal system.
D. allows centralized management and control of services.
What is the 802.11 standard related to?
A. Public Key Infrastructure (PKI)
B. Wireless network communications
C. Packet-switching technology
D. The OSI/ISO model
In the Open Systems Interconnect (OSI) Reference Model, at what level are TCP and UDP provided?
A. Transport
B. Network
C. Presentation
D. Application
Which of the following is TRUE regarding Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?
A. TCP is connection-oriented, UDP is not.
B. UDP provides for Error Correction, TCP does not.
C. UDP is useful for longer messages, rather than TCP.
D. TCP does not guarantee delivery of data, while UDP does guarantee data delivery.
Which of the following protocol is PRIMARILY used to provide confidentiality in a web based application thus protecting data sent across a client machine and a server?
SSL
B. FTP
C. SSH
D. S/MIME
Which of the following service is a distributed database that translate host name to IP address and IP address to host name?
A. DNS
B. FTP
C. SSH
D. SMTP
How many bits is the address space reserved for the source IP address within an IPv6 header?
A. 128
B. 32
C. 64
D. 256
What is the three way handshake sequence used to initiate TCP connections?
A. ACK, SYN/ACK, ACK
B. SYN, SYN/ACK, ACK
C. SYN, SYN, ACK/ACK
D. ACK, SYN/ACK, SYN
Layer 2 of the OSI model has two sublayers. What are those sublayers, and what are two IEEE standards that describe technologies at that layer?
A. LCL and MAC; IEEE 802.2 and 802.3
B. LCL and MAC; IEEE 802.1 and 802.3
C. Network and MAC; IEEE 802.1 and 802.3
D. LLC and MAC; IEEE 802.2 and 802.3
Briefly define and discuss what you understand by CIA in IT security
TCP connections are initiated with a 3-way handshake, what is the process of ending a TCP connection?
Define the following terms as it relates to IT security: availability, integrity, confidentiality, authentication and non-repudiation.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started