Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Organizations should have policies that specify which information personnel may reveal to others. Group of answer choices false true Question 2 Defense in Depth refers

Organizations should have policies that specify which information personnel may reveal to others.

Group of answer choices

false

true

Question 2

Defense in Depth refers to the use of multiple network security measures.

Group of answer choices

false

true

Question 3

If a server is compromised, it can send malicious code to any computer that connects to it.

Group of answer choices

true

false

Question 4

If you do the right thing as a network administrator, you can always guarantee security on a network.

Group of answer choices

false

true

Question 5

The acronym WEP stands for Wired Equivalent Privacy

Group of answer choices

true

false

Question 6

It is not possible to secure information over wireless networks.

Group of answer choices

false

true

Question 7

Encryption algorithms require ______ to encrypt and decrypt data.

Group of answer choices

ciphertext

plaintext

passwords

keys

Question 8

File shares need _______ to control what systems and users are allowed to access particular resources.

Group of answer choices

disk space

more cowbell

security features

unique folder names

Question 9

In wireless networking, SSID stands for:

Group of answer choices

Service Set Identifier

System Sharing Information Directory

System Security Information Dashboard

Security System Identifier

Question 10

_____ are the parts of computer programs that promote security by authenticating, enforcing access control, and encrypting data.

Group of answer choices

crypto-systems

software controls

security threads

hardware controls

Question 11

Monitoring network traffic / eavesdropping can be used to _______ .

Group of answer choices

engage in pre-attack reconnaissance

capture useful information

attack victims and take over their connections

all of the above

Question 12

The ______ protocol was found to have serious security flaws and is not recommended for use today.

Group of answer choices

Ethernet

WPA

WEP

HTTP

Question 13

A network's bandwidth refers to ______ .

Group of answer choices

how fast the data is traveling from your laptop to the Internet

data rate between two devices

how far apart the antennas are on your wireless access point

how far apart the frequency bands are for your wireless transmission system

Question 14

The strategic use of various methods for obtaining confidential informaiton from individuals is referred to as _____ .

Group of answer choices

eavesdropping

software engineering

social engineering

reverse psychology

Question 15

A port scan can reveal _______ .

Group of answer choices

what websites are being accessed by users on the network

the presence of a security device, such as a network firewall

what computers are on a network

the usernames and passwords circulating on a network

Question 16

Secure ID cards (also known as RSA cards) are one of many methods used to provide ______ .

Group of answer choices

password complexity

authentication

nonrepudiation

encryption

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Which element maintains the database of stored certificates

Answered: 1 week ago

Question

Does it avoid use of underlining?

Answered: 1 week ago