Question
Computer science help! Question 1 Organizations should have policies about what information personnel may reveal to others. Organizations should have policies about what information personnel
Computer science help!
Question 1
Organizations should have policies about what information personnel may reveal to others.
Organizations should have policies about what information personnel may reveal to others
True
False
Question 2
Defense in Depth refers to the use of multiple network security measures.
True
False
Question 3
Firewalls are typically placed somewhere in the middle of a network.
True
False
Question 4
If a server is compromised, it can send malicious code to any computer that connects to it.
True
False
Question 5
Encryption is all you need to ensure security from system to system.
True
False
Question 6
A network firewall and a personal firewall have identical goals and function.
True
False
Question 7
If you do the right thing as a network administrator, you can always guarantee security on a network.
True
False
Question 8
The acronym WEP stands for Wired Equivalent Privacy.
1. The acronym WEP stands for Wired Equivalent Privacy
True
False
Question 9
Information cannot be secured over wireless network tranmissions.
True
False
Question 10
Using your car to steal network components is referred to as war driving.
True
False
Question 11
Encryption algorithms require ____ to encrypt and decrypt data.
A. plaintext
B. passwords
C. ciphertext
D. keys
Question 12
TLS (Transport Layer Security) uses ______ to authenticate and encrypt web communications.
A. transpositional ciphers
B. Secure Socket Layer (SSL)
C. public key encryption
D. symmetric key encryption
Question 13
Remapping user data to unrecognizable data is a form of ______ .
A. verification
B. nonrepudiation
C. authentication
D. encryption
Question 14
File shares need _____ to control what systems and users are allowed to access particular resources.
A. security features
B. disk space
C. more cowb
D. unique folder names
Question 15
In wireless networking, SSID stands for:
A. System Sharing Information Directory
B. Security System Identifier
C. System Security Information Dashboard
D. Service Set Identifier
Question 16
_____ are the parts of computer programs that promote security by authenticating, enforcing access control and encrypting data.
A. security threads
B. crypto-systems
C. hardware controls
D. software controls
Question 17
Communicating devices can have multiple ____, however, they will always maintain the same _____.
A. port numbers, IP address
B. MAC addresses; IP address
C. IP address; port number
D. IP addresses; MAC address
Question 18
Monitoring network traffic / eavesdropping can be used to _____ .
A. capture useful information
B. attack victims and take over their connections
C. engage in pre-attack reconnaissance
D. all of the above
Question 19
The ____ protocol was found to have serious security flaws and is not recommended for use today.
A. HTTP
B. WPA
C. Ethernet
D. WEP
Question 20
A network's bandwidth refers to _____ .
A. how far apart the frequency bands are for your wireless transmission system
B. how fast the data is traveling from your laptop to the Internet
C. how far apart the antennas are on your wireless access point
D. how much data can pass through a network in a given time period
Question 21
Suppose I encrypted a document by shifting all letters up by 5 (i.e. CAT becomes HFY). This is referred to as a/an:
A. alphabet cipher
B. transpositional cipher
C. public key cipher
D. shift cipher
Question 22
_____ is used to dynamically allocate and assign IP addresses to computers joining a newtwork.
A. a routing table
B. DHCP
C. HTTP
D. NAT
Question 23
A port scan can reveal _____ .
A. the usernames and passwords circulating on a network
B. what computers are on a network
C. the presence of a security device, such as a network firewall
D. what websites are being accessed by users on the network
Question 24
A strategic use of various methods for obtaining confidential information from people is referred to as _______ .
A. eavesdropping
B. social engineering
C. software engineering
D. reverse psychology
Question 25
Secure ID cards (also called RSA cards) are one of many methods used to provide _____ .
A. authentication
B. nonrepudiation
C. password complexity
D. encryption
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started