Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The original unencrypted message or the results from successful decryption is th

ID: 3622560 • Letter: T

Question

The original unencrypted message or the results from successful decryption is the ____.
a. work factor c. keyspace
b. Plaintext d. cipher


____ 27. In a ____, you substitute one value for another.
a. transposition cipher c. substitution cipher
b. Keycipher d. encipher


____ 28. ____ are encrypted messages that can be independently verified by a central facility (registry) as authentic.
a. Digital signatures c. Public Keys
b. Digital certificates d. Private Keys


____ 29. In the firewall authentication process, which step follows the client making a request to access a resource?
a. The user is authenticated
b. The firewall intercepts the request and prompts the user for a name and password
c. The user accesses the desired resources
d. The request is checked against the firewall's rule base


____ 30. A(n) ____ sign-on is one in which the client, after being successfully authenticated, is allowed to access whatever resources the user needs.
a. specific c. standard
b. simple d. complex


____ 31. ____ transmits authentication packets unencrypted across the network.
a. Kerberos c. RADIUS
b. TACACS+ d. ACS


____ 32. What is a secure channel used by a VPN that runs through the Internet called?
a. Station c. Tunnel
b. Port d. Packet


____ 33. Information that passes to and from TCP/IP-based networks travels in manageable chunks called ____.
a. frames c. packets
b. datagrams d. PDUs


____ 34. A ____ is the value used by the cryptographic formula or algorithm to either produce or decrypt ciphertext.
a. cipher c. key
b. header d. lock


____ 35. With ____ keys, when the recipient receives the encrypted message, he or she can decrypt it using the private key.
a. symmetric c. asymmetric
b. simple d. IPSec


____ 36. What is the name of the hardware device specifically designed to terminate VPNs?
a. VPN Appliance c. VPN Firewall
b. VPN Endpoint d. VPN Router


____ 37. What is Novell's directory service used by BorderManager called?
a. Bindary c. Active Directory
b. NDS d. eDirectory


____ 38. In which mode does a VPN concentrator act like a hardware device enabling a secure site-to-site VPN connection?
a. Real c. Client
b. Network extension d. Server


____ 39. In a ____ configuration, each participant (that is, network, router, or computer) in the VPN has an approved relationship, called a security association (SA), with every other participant.
a. Mesh c. Mixed
b. Hub-and-spoke d. Hybrid


____ 40. ____ entails the preparation for and recovery from a disaster, whether natural or human-made.
a. Disaster recovery planning c. Incident response planning
b. Business continuity planning d. Business impact analysis


____ 41. A ____ requires that a contact person call each and every person on the roster.
a. sequential roster c. response roster
b. hierarchial roser d. strategy roster


____ 42. ____ is the transfer of live transactions to an off-site facility.
a. Remote Journaling c. Bare Metal Recovery
b. Electronic Vaulting d. none of the above


____ 43. A(n) ____ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.
a. intrusion c. reaction
b. detection d. none of the above


____ 44. ____ is the process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS.
a. Evasion c. Noise
b. False attack d. Tuning


____ 45. ____ represents the rules and configuration guidelines governing the implementation and operation of IDPSs within the organization.
a. Site policy c. Tuning
b. Site policy awareness d. Evasion


____ 46. ____ is an IDPS’s ability to dynamically modify its configuration in response to environmental activity.
a. Site policy awareness c. Confidence value
b. Site policy d. Tuning


____ 47. ____ is a value placed upon an IDPS’s ability to detect and identify certain types of attacks correctly.
a. Confidence value c. Tuning
b. Alarm filtering d. Site policy


____ 48. ____ identifies the network services and their software versions offered by the active host systems.
a. Fingerprinting c. Data collection
b. Footprinting d. Evasion


____ 49. ____ systems examine network traffic in order to identify problems related to the flow of traffic.
a. Network Behavior Analysis (NBA) c. WLAN
b. Passive mode d. None of the above


____ 50. ____ are typically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
a. Inline sensors c. Outline sensors
b. Passive mode sensors d. None of the above

Explanation / Answer

26. b) plain text 27. c. substitution cipher 28. a. Digital signatures 29. b. The firewall intercepts the request and prompts the user for a name and password 30. c. Standard 31. c. RADIUS 32. c. Tunnel 33. c. packets Note: One question per a post as per the Cramster rules. Please post the remaining in other posts.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote