A) Buffer overflow attack
B) Hardening
C) War dialing
D) Encryption
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) a hashing algorithm.
B) asymmetric key encryption.
C) symmetric key encryption.
D) public key encryption.
Correct Answer
verified
Multiple Choice
A) Demilitarized zone
B) Intrusion detection system
C) Intrusion prevention system
D) Firewall
Correct Answer
verified
Multiple Choice
A) the user of encrypted data.
B) the provider of encrypted data.
C) both the user and the provider of encrypted data.
D) either the user or the provider of encrypted data.
Correct Answer
verified
Multiple Choice
A) Asymmetric encryption
B) Encryption
C) Hashing
D) Symmetric encryption
Correct Answer
verified
Multiple Choice
A) stateful packet filtering.
B) employee training.
C) a firewall.
D) a demilitarized zone.
Correct Answer
verified
Multiple Choice
A) Access control list
B) Deep packet inspection
C) Stateful packet filtering
D) Static packet filtering
Correct Answer
verified
Multiple Choice
A) Authentication
B) Authorization
C) Encryption
D) Intrusion detection
Correct Answer
verified
Multiple Choice
A) Training
B) Controlling physical access
C) Controlling remote access
D) Host and application hardening
Correct Answer
verified
Multiple Choice
A) Access control list
B) Internet protocol
C) Packet switching protocol
D) Transmission control protocol
Correct Answer
verified
Multiple Choice
A) Passwords should be changed at regular intervals.
B) Passwords should be no more than 8 characters in length.
C) Passwords should contain a mixture of upper and lowercase letters,numbers and characters.
D) Passwords should not be words found in dictionaries.
Correct Answer
verified
Multiple Choice
A) change management.
B) hardening.
C) patch management.
D) defense in depth
Correct Answer
verified
Multiple Choice
A) Deep packet inspection
B) Hardening
C) Intrusion detection
D) War dialing
Correct Answer
verified
Multiple Choice
A) Encrypted packets cannot be examined by a firewall.
B) Encryption protects the confidentiality of information while in storage.
C) Encryption protects the privacy of information during transmission.
D) Encryption provides for both authentication and non-repudiation.
Correct Answer
verified
Multiple Choice
A) Encryption
B) Decryption
C) Filtering
D) Hardening
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) preventive control.
B) detective control.
C) corrective control.
D) standard control.
Correct Answer
verified
Multiple Choice
A) Developing and documenting policies
B) Effectively communicating policies to all outsiders
C) Designing and employing appropriate control procedures to implement policies
D) Monitoring the system and taking corrective action to maintain compliance with policies
Correct Answer
verified
Multiple Choice
A) Asymmetric encryption
B) Hashing encryption
C) Public key encryption
D) Symmetric encryption
Correct Answer
verified
Showing 41 - 60 of 82
Related Exams