Question: Computer science help! Question 1 Organizations should have policies about what information personnel may reveal to others. Organizations should have policies about what information personnel

Computer science help!

Question 1

Organizations should have policies about what information personnel may reveal to others.

Organizations should have policies about what information personnel may reveal to others

True

False

Question 2

Defense in Depth refers to the use of multiple network security measures.

True

False

Question 3

Firewalls are typically placed somewhere in the middle of a network.

True

False

Question 4

If a server is compromised, it can send malicious code to any computer that connects to it.

True

False

Question 5

Encryption is all you need to ensure security from system to system.

True

False

Question 6

A network firewall and a personal firewall have identical goals and function.

True

False

Question 7

If you do the right thing as a network administrator, you can always guarantee security on a network.

True

False

Question 8

The acronym WEP stands for Wired Equivalent Privacy.

1. The acronym WEP stands for Wired Equivalent Privacy

True

False

Question 9

Information cannot be secured over wireless network tranmissions.

True

False

Question 10

Using your car to steal network components is referred to as war driving.

True

False

Question 11

Encryption algorithms require ____ to encrypt and decrypt data.

A. plaintext

B. passwords

C. ciphertext

D. keys

Question 12

TLS (Transport Layer Security) uses ______ to authenticate and encrypt web communications.

A. transpositional ciphers

B. Secure Socket Layer (SSL)

C. public key encryption

D. symmetric key encryption

Question 13

Remapping user data to unrecognizable data is a form of ______ .

A. verification

B. nonrepudiation

C. authentication

D. encryption

Question 14

File shares need _____ to control what systems and users are allowed to access particular resources.

A. security features

B. disk space

C. more cowb

D. unique folder names

Question 15

In wireless networking, SSID stands for:

A. System Sharing Information Directory

B. Security System Identifier

C. System Security Information Dashboard

D. Service Set Identifier

Question 16

_____ are the parts of computer programs that promote security by authenticating, enforcing access control and encrypting data.

A. security threads

B. crypto-systems

C. hardware controls

D. software controls

Question 17

Communicating devices can have multiple ____, however, they will always maintain the same _____.

A. port numbers, IP address

B. MAC addresses; IP address

C. IP address; port number

D. IP addresses; MAC address

Question 18

Monitoring network traffic / eavesdropping can be used to _____ .

A. capture useful information

B. attack victims and take over their connections

C. engage in pre-attack reconnaissance

D. all of the above

Question 19

The ____ protocol was found to have serious security flaws and is not recommended for use today.

A. HTTP

B. WPA

C. Ethernet

D. WEP

Question 20

A network's bandwidth refers to _____ .

A. how far apart the frequency bands are for your wireless transmission system

B. how fast the data is traveling from your laptop to the Internet

C. how far apart the antennas are on your wireless access point

D. how much data can pass through a network in a given time period

Question 21

Suppose I encrypted a document by shifting all letters up by 5 (i.e. CAT becomes HFY). This is referred to as a/an:

A. alphabet cipher

B. transpositional cipher

C. public key cipher

D. shift cipher

Question 22

_____ is used to dynamically allocate and assign IP addresses to computers joining a newtwork.

A. a routing table

B. DHCP

C. HTTP

D. NAT

Question 23

A port scan can reveal _____ .

A. the usernames and passwords circulating on a network

B. what computers are on a network

C. the presence of a security device, such as a network firewall

D. what websites are being accessed by users on the network

Question 24

A strategic use of various methods for obtaining confidential information from people is referred to as _______ .

A. eavesdropping

B. social engineering

C. software engineering

D. reverse psychology

Question 25

Secure ID cards (also called RSA cards) are one of many methods used to provide _____ .

A. authentication

B. nonrepudiation

C. password complexity

D. encryption

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!