Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Computer science help! Question 1 Organizations should have policies about what information personnel may reveal to others. Organizations should have policies about what information personnel

Computer science help!

Question 1

Organizations should have policies about what information personnel may reveal to others.

Organizations should have policies about what information personnel may reveal to others

True

False

Question 2

Defense in Depth refers to the use of multiple network security measures.

True

False

Question 3

Firewalls are typically placed somewhere in the middle of a network.

True

False

Question 4

If a server is compromised, it can send malicious code to any computer that connects to it.

True

False

Question 5

Encryption is all you need to ensure security from system to system.

True

False

Question 6

A network firewall and a personal firewall have identical goals and function.

True

False

Question 7

If you do the right thing as a network administrator, you can always guarantee security on a network.

True

False

Question 8

The acronym WEP stands for Wired Equivalent Privacy.

1. The acronym WEP stands for Wired Equivalent Privacy

True

False

Question 9

Information cannot be secured over wireless network tranmissions.

True

False

Question 10

Using your car to steal network components is referred to as war driving.

True

False

Question 11

Encryption algorithms require ____ to encrypt and decrypt data.

A. plaintext

B. passwords

C. ciphertext

D. keys

Question 12

TLS (Transport Layer Security) uses ______ to authenticate and encrypt web communications.

A. transpositional ciphers

B. Secure Socket Layer (SSL)

C. public key encryption

D. symmetric key encryption

Question 13

Remapping user data to unrecognizable data is a form of ______ .

A. verification

B. nonrepudiation

C. authentication

D. encryption

Question 14

File shares need _____ to control what systems and users are allowed to access particular resources.

A. security features

B. disk space

C. more cowb

D. unique folder names

Question 15

In wireless networking, SSID stands for:

A. System Sharing Information Directory

B. Security System Identifier

C. System Security Information Dashboard

D. Service Set Identifier

Question 16

_____ are the parts of computer programs that promote security by authenticating, enforcing access control and encrypting data.

A. security threads

B. crypto-systems

C. hardware controls

D. software controls

Question 17

Communicating devices can have multiple ____, however, they will always maintain the same _____.

A. port numbers, IP address

B. MAC addresses; IP address

C. IP address; port number

D. IP addresses; MAC address

Question 18

Monitoring network traffic / eavesdropping can be used to _____ .

A. capture useful information

B. attack victims and take over their connections

C. engage in pre-attack reconnaissance

D. all of the above

Question 19

The ____ protocol was found to have serious security flaws and is not recommended for use today.

A. HTTP

B. WPA

C. Ethernet

D. WEP

Question 20

A network's bandwidth refers to _____ .

A. how far apart the frequency bands are for your wireless transmission system

B. how fast the data is traveling from your laptop to the Internet

C. how far apart the antennas are on your wireless access point

D. how much data can pass through a network in a given time period

Question 21

Suppose I encrypted a document by shifting all letters up by 5 (i.e. CAT becomes HFY). This is referred to as a/an:

A. alphabet cipher

B. transpositional cipher

C. public key cipher

D. shift cipher

Question 22

_____ is used to dynamically allocate and assign IP addresses to computers joining a newtwork.

A. a routing table

B. DHCP

C. HTTP

D. NAT

Question 23

A port scan can reveal _____ .

A. the usernames and passwords circulating on a network

B. what computers are on a network

C. the presence of a security device, such as a network firewall

D. what websites are being accessed by users on the network

Question 24

A strategic use of various methods for obtaining confidential information from people is referred to as _______ .

A. eavesdropping

B. social engineering

C. software engineering

D. reverse psychology

Question 25

Secure ID cards (also called RSA cards) are one of many methods used to provide _____ .

A. authentication

B. nonrepudiation

C. password complexity

D. encryption

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design For Mere Mortals

Authors: Michael J Hernandez

4th Edition

978-0136788041

More Books

Students also viewed these Databases questions

Question

3. Did you seek anyones advice?

Answered: 1 week ago

Question

7. What traps should she avoid?

Answered: 1 week ago

Question

5. What decision-making model would you advocate to this person?

Answered: 1 week ago