The original unencrypted message or the results from successful decryption is th
ID: 3622560 • Letter: T
Question
The original unencrypted message or the results from successful decryption is the ____.a. work factor c. keyspace
b. Plaintext d. cipher
____ 27. In a ____, you substitute one value for another.
a. transposition cipher c. substitution cipher
b. Keycipher d. encipher
____ 28. ____ are encrypted messages that can be independently verified by a central facility (registry) as authentic.
a. Digital signatures c. Public Keys
b. Digital certificates d. Private Keys
____ 29. In the firewall authentication process, which step follows the client making a request to access a resource?
a. The user is authenticated
b. The firewall intercepts the request and prompts the user for a name and password
c. The user accesses the desired resources
d. The request is checked against the firewall's rule base
____ 30. A(n) ____ sign-on is one in which the client, after being successfully authenticated, is allowed to access whatever resources the user needs.
a. specific c. standard
b. simple d. complex
____ 31. ____ transmits authentication packets unencrypted across the network.
a. Kerberos c. RADIUS
b. TACACS+ d. ACS
____ 32. What is a secure channel used by a VPN that runs through the Internet called?
a. Station c. Tunnel
b. Port d. Packet
____ 33. Information that passes to and from TCP/IP-based networks travels in manageable chunks called ____.
a. frames c. packets
b. datagrams d. PDUs
____ 34. A ____ is the value used by the cryptographic formula or algorithm to either produce or decrypt ciphertext.
a. cipher c. key
b. header d. lock
____ 35. With ____ keys, when the recipient receives the encrypted message, he or she can decrypt it using the private key.
a. symmetric c. asymmetric
b. simple d. IPSec
____ 36. What is the name of the hardware device specifically designed to terminate VPNs?
a. VPN Appliance c. VPN Firewall
b. VPN Endpoint d. VPN Router
____ 37. What is Novell's directory service used by BorderManager called?
a. Bindary c. Active Directory
b. NDS d. eDirectory
____ 38. In which mode does a VPN concentrator act like a hardware device enabling a secure site-to-site VPN connection?
a. Real c. Client
b. Network extension d. Server
____ 39. In a ____ configuration, each participant (that is, network, router, or computer) in the VPN has an approved relationship, called a security association (SA), with every other participant.
a. Mesh c. Mixed
b. Hub-and-spoke d. Hybrid
____ 40. ____ entails the preparation for and recovery from a disaster, whether natural or human-made.
a. Disaster recovery planning c. Incident response planning
b. Business continuity planning d. Business impact analysis
____ 41. A ____ requires that a contact person call each and every person on the roster.
a. sequential roster c. response roster
b. hierarchial roser d. strategy roster
____ 42. ____ is the transfer of live transactions to an off-site facility.
a. Remote Journaling c. Bare Metal Recovery
b. Electronic Vaulting d. none of the above
____ 43. A(n) ____ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.
a. intrusion c. reaction
b. detection d. none of the above
____ 44. ____ is the process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS.
a. Evasion c. Noise
b. False attack d. Tuning
____ 45. ____ represents the rules and configuration guidelines governing the implementation and operation of IDPSs within the organization.
a. Site policy c. Tuning
b. Site policy awareness d. Evasion
____ 46. ____ is an IDPS’s ability to dynamically modify its configuration in response to environmental activity.
a. Site policy awareness c. Confidence value
b. Site policy d. Tuning
____ 47. ____ is a value placed upon an IDPS’s ability to detect and identify certain types of attacks correctly.
a. Confidence value c. Tuning
b. Alarm filtering d. Site policy
____ 48. ____ identifies the network services and their software versions offered by the active host systems.
a. Fingerprinting c. Data collection
b. Footprinting d. Evasion
____ 49. ____ systems examine network traffic in order to identify problems related to the flow of traffic.
a. Network Behavior Analysis (NBA) c. WLAN
b. Passive mode d. None of the above
____ 50. ____ are typically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
a. Inline sensors c. Outline sensors
b. Passive mode sensors d. None of the above
Explanation / Answer
26. b) plain text 27. c. substitution cipher 28. a. Digital signatures 29. b. The firewall intercepts the request and prompts the user for a name and password 30. c. Standard 31. c. RADIUS 32. c. Tunnel 33. c. packets Note: One question per a post as per the Cramster rules. Please post the remaining in other posts.
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.