Filters
Question type

Study Flashcards

Which of the following is a Kerberos service that initially exchanges information with the client and server by using secret keys?


A) Authentication Server
B) Authentication Client
C) Key Distribution Center
D) Ticket Granting Service

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which tool can best identify active computers on a network?


A) Packet sniffer
B) Port scanner
C) Trap and trace
D) Honey pot

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the following is true about symmetric encryption?


A) Uses a secret key to encrypt and decrypt
B) Uses a private and public key
C) It is also known as public key encryption
D) It requires four keys to hold a conversation

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following biometric authentication systems is the most accepted by users?


A) Keystroke pattern recognition
B) Fingerprint recognition
C) Signature recognition
D) Retina pattern recognition

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which type of device allows only specific packets with a particular source,destination,and port address to pass through it.


A) Dynamic packet filtering firewall
B) Proxy server
C) Intrusion detection system
D) Application layer firewall

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

____________is a technology in which multiple real,routable external IP addresses are converted to special ranges of internal IP addresses,usually on a one-to-one basis.

Correct Answer

verifed

verified

Network-address tran...

View Answer

Acryptographic operation that involves simply rearranging the valueswithin a block based on an established pattern.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) F) and G)
L) A) and I)

Correct Answer

verifed

verified

Which technology employs sockets to map internal private network addresses to a public address using a one-to-many mapping?


A) Network-address translation
B) Screened-subnet firewall
C) Port-address translation
D) Private address mapping

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

The "something a person has" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.

A) True
B) False

Correct Answer

verifed

verified

What are NAT and PAT?Describe these technologies.

Correct Answer

verifed

verified

NAT is a method of converting multiple r...

View Answer

List the most common firewall implementation architectures.

Correct Answer

verifed

verified

Three architectural implementa...

View Answer

Technical controls alone,when properly configured,can secure an IT environment.

A) True
B) False

Correct Answer

verifed

verified

____________________ is the determination of actions that an entity can perform in a physical or logical area.

Correct Answer

verifed

verified

In which cipher method are values rearranged within a block to create the ciphertext?


A) Permutation
B) Vernam
C) Substitution
D) Monoalphabetic

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Was developed by Netscape in 1994 to provide security foronline e-commerce transactions.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) E) and G)
L) E) and J)

Correct Answer

verifed

verified

The Ticket Granting Service (TGS)is one of three services in the __________ system,andprovides tickets to clients who request services.

Correct Answer

verifed

verified

What is the next phase of the preattack data gathering process after an attacker has collected all of an organization's Internet addresses?


A) Footprinting
B) Content filtering
C) Deciphering
D) Fingerprinting

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

An integrated system of software,encryption methodologies,protocols,legal agreements,and third-party services that enables users to communicate securelythrough the use of digital certificates.


A) VPN
B) transport mode
C) SSL
D) PKI
E) digital certificate
F) asymmetric encryption
G) Vernam cipher
H) transposition cipher
I) content filter
J) footprinting

K) B) and J)
L) A) and I)

Correct Answer

verifed

verified

Describe in basic terms what an IDPS is.

Correct Answer

verifed

verified

Intrusion detection and prevention syste...

View Answer

Which of the following characteristics currently used today for authentication purposes is the LEAST unique?


A) Fingerprints
B) Iris
C) Retina
D) Face geometry

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 61

Related Exams

Show Answer