Filters
Question type

Study Flashcards

Digital key infrastructure is the entire set of hardware,software,and cryptosystems necessary to implement asymmetric key encryption in online commerce.

A) True
B) False

Correct Answer

verifed

verified

False

Which of the following characteristics currently used today for authentication purposes is NOT considered truly unique?


A) fingerprints
B) iris
C) retina
D) ID Cards

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A(n)____________________ is a private word or combination of characters known only by the user.

Correct Answer

verifed

verified

password

____ are scanning and analysis tools that are capable of scanning networks for very detailed information.


A) Port scanners
B) Content filters
C) Vulnerability scanners
D) Packet sniffers

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

____ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP/IP family of protocol standards,including use for VPNs.


A) Secure Hypertext Transfer Protocol
B) Secure Shell
C) IP Security
D) Secure Sockets Layer

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Port number ____ is commonly used for the Simple Mail Transfer Protocol service.


A) 25
B) 53
C) 68
D) 161

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

____ controls defend against threats from within the organization.


A) Firewall
B) Education and training
C) Patches and upgrades
D) Host ID

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

The trace function in a trap and trace scanning tool entices individuals who are illegally perusing the internal sections of a network,in order to determine who they are._________________________

A) True
B) False

Correct Answer

verifed

verified

Trap and Trace applications collect and analyze copies of packets from the network.

A) True
B) False

Correct Answer

verifed

verified

A firewall uses its ____ to decide whether or not to allow packets into the network.


A) configuration rules
B) access control list
C) rule base
D) network connections

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

____________________ or genetic authentication is not yet a cost-effective and socially accepted technology that can be included in the "something you are" category.

Correct Answer

verifed

verified

A dumb card is a category that includes ID and ATM cards with magnetic strips containing the digital PIN against which a user's input is compared.

A) True
B) False

Correct Answer

verifed

verified

Technical controls alone are adequately equipped to ensure a secure IT environment.

A) True
B) False

Correct Answer

verifed

verified

A ____ commonly combines a separate dedicated firewall such as an application proxy server with a packet filtering router.


A) packet filtering router
B) screened-host firewall
C) screened-subnet firewall
D) dual-homed host firewall

E) All of the above
F) None of the above

Correct Answer

verifed

verified

The "something you have" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.

A) True
B) False

Correct Answer

verifed

verified

What should you look for when selecting a firewall for your network?

Correct Answer

verifed

verified

1.What type of firewall technology offer...

View Answer

____________________ is the organized research of Internet addresses owned or controlled by a target organization,identified from public Internet data sources..

Correct Answer

verifed

verified

The transformation of individual components such as characters or bits of an unencrypted message into encrypted components is known as ____.


A) key
B) cryptosystem
C) cipher
D) steganography

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

____________________ is the confirmation of the identity of the entity accessing a logical or physical area.

Correct Answer

verifed

verified

Authentication

Fourth generation firewalls,known as ____,allow only specific packets with a particular source,destination,and port address to pass through it.


A) dynamic packet filtering firewalls
B) packet filtering firewalls
C) stateful inspection firewalls
D) application-level firewalls

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 133

Related Exams

Show Answer