Deck 19: Computer and Network Security Techniques

ملء الشاشة (f)
exit full mode
سؤال
SSL is designed to make use of TCP to provide .
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The WiFi standard known as Privacy with message integrity can be described as follows:

A)A way of ensuring the privacy of the individual using WiFi
B)A technique that ensures that the data transmitted using WiFi have not been altered
C)A way of providing mutual authentication between a user and an AS
D)None of the above
سؤال
Which of the following is not a central element of a typical antivirus scheme

A)detection
B)identification
C)removal
D)deterrence
سؤال
A security intrusion is defined as a successful attempt by a user to gain access to a system or system resource without proper authorization.
سؤال
The firewall cannot protect against attacks that the firewall
سؤال
IEEE 802.11i consists of two main functions: authentication and access control.
سؤال
The higher-layer protocols defined as part of SSL include:

A)handshake protocol
B)change cipher spec protocol
C)alert protocol
D)all of the above
سؤال
SSL performs encryption first,followed by computing a message authentication code.
سؤال
8,Generic decryption (GD)technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.
سؤال
A key logical component of an IDS is:

A)sensors
B)analyzers
C)user interface
D)all of the above
سؤال
IPSec provides authentication,encryption,and key exchange functions.
سؤال
IPSec transport mode provides protection primarily for:

A)the Internet layer
B)upper-layer protocols
C)network and link-layer protocols
D)all of the above
سؤال
Typically,a firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.
سؤال
Ipsec is based primarily upon the DES standard.
سؤال
Transport mode in IPSec provides protection to the entire IP packet.
سؤال
A stateful inspection firewall

A)applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet
B)controls TCP traffic by creating a directory of outbound TCP connections
C)acts as a relay of application-level traffic
D)sets up two TCP connections,one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host
سؤال
For VPNs,both authentication and are generally desired.
سؤال
IEEE 802.11i makes use of another standard that was designed to provide access control functions for LANs.The standard is .
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 19: Computer and Network Security Techniques
1
SSL is designed to make use of TCP to provide .
a reliable end-to-end secure service
2
The WiFi standard known as Privacy with message integrity can be described as follows:

A)A way of ensuring the privacy of the individual using WiFi
B)A technique that ensures that the data transmitted using WiFi have not been altered
C)A way of providing mutual authentication between a user and an AS
D)None of the above
B
3
Which of the following is not a central element of a typical antivirus scheme

A)detection
B)identification
C)removal
D)deterrence
D
4
A security intrusion is defined as a successful attempt by a user to gain access to a system or system resource without proper authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
5
The firewall cannot protect against attacks that the firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
6
IEEE 802.11i consists of two main functions: authentication and access control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
7
The higher-layer protocols defined as part of SSL include:

A)handshake protocol
B)change cipher spec protocol
C)alert protocol
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
8
SSL performs encryption first,followed by computing a message authentication code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
9
8,Generic decryption (GD)technology enables the antivirus program to easily detect even the most complex polymorphic viruses while maintaining fast scanning speeds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
10
A key logical component of an IDS is:

A)sensors
B)analyzers
C)user interface
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
11
IPSec provides authentication,encryption,and key exchange functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
12
IPSec transport mode provides protection primarily for:

A)the Internet layer
B)upper-layer protocols
C)network and link-layer protocols
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
13
Typically,a firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
14
Ipsec is based primarily upon the DES standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
15
Transport mode in IPSec provides protection to the entire IP packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
16
A stateful inspection firewall

A)applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet
B)controls TCP traffic by creating a directory of outbound TCP connections
C)acts as a relay of application-level traffic
D)sets up two TCP connections,one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
17
For VPNs,both authentication and are generally desired.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
18
IEEE 802.11i makes use of another standard that was designed to provide access control functions for LANs.The standard is .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.