Question
Organizations should have policies that specify which information personnel may reveal to others. Group of answer choices false true Question 2 Defense in Depth refers
Organizations should have policies that specify which information personnel may reveal to others.
Group of answer choices
false
true
Question 2
Defense in Depth refers to the use of multiple network security measures.
Group of answer choices
false
true
Question 3
If a server is compromised, it can send malicious code to any computer that connects to it.
Group of answer choices
true
false
Question 4
If you do the right thing as a network administrator, you can always guarantee security on a network.
Group of answer choices
false
true
Question 5
The acronym WEP stands for Wired Equivalent Privacy
Group of answer choices
true
false
Question 6
It is not possible to secure information over wireless networks.
Group of answer choices
false
true
Question 7
Encryption algorithms require ______ to encrypt and decrypt data.
Group of answer choices
ciphertext
plaintext
passwords
keys
Question 8
File shares need _______ to control what systems and users are allowed to access particular resources.
Group of answer choices
disk space
more cowbell
security features
unique folder names
Question 9
In wireless networking, SSID stands for:
Group of answer choices
Service Set Identifier
System Sharing Information Directory
System Security Information Dashboard
Security System Identifier
Question 10
_____ are the parts of computer programs that promote security by authenticating, enforcing access control, and encrypting data.
Group of answer choices
crypto-systems
software controls
security threads
hardware controls
Question 11
Monitoring network traffic / eavesdropping can be used to _______ .
Group of answer choices
engage in pre-attack reconnaissance
capture useful information
attack victims and take over their connections
all of the above
Question 12
The ______ protocol was found to have serious security flaws and is not recommended for use today.
Group of answer choices
Ethernet
WPA
WEP
HTTP
Question 13
A network's bandwidth refers to ______ .
Group of answer choices
how fast the data is traveling from your laptop to the Internet
data rate between two devices
how far apart the antennas are on your wireless access point
how far apart the frequency bands are for your wireless transmission system
Question 14
The strategic use of various methods for obtaining confidential informaiton from individuals is referred to as _____ .
Group of answer choices
eavesdropping
software engineering
social engineering
reverse psychology
Question 15
A port scan can reveal _______ .
Group of answer choices
what websites are being accessed by users on the network
the presence of a security device, such as a network firewall
what computers are on a network
the usernames and passwords circulating on a network
Question 16
Secure ID cards (also known as RSA cards) are one of many methods used to provide ______ .
Group of answer choices
password complexity
authentication
nonrepudiation
encryption
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started