Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Encryption is the most reliable method of ensuring confidentiality on a netwo

ID: 3645410 • Letter: 1

Question

1. Encryption is the most reliable method of ensuring confidentiality on a network.
True
False
1. Controls are mechanisms that reduce or eliminate threats to network security.
Answer True
False
1. Crackers are casual hackers with a limited knowledge of computer security.
True
False
1. A patch is a software solution to correct a security hole.
Answer True
False
1. Decryption is the process of converting plaintext into ciphertext.
True
False
1. Cryptography can also be applied to entire disks. This is known as ____ encryption.


a. EFS

b. symmetric

c. whole disk

d. file system
1. A ___________ monitors the traffic coming in against known attack signatures to detect malicous packets that might signal an attack. If it detects an attack, it can then reset the connection or block the traffic from that source.


a. packet filtering firewall

b. anti-virus software

c. host-based IPS

d. network-based IPS
1. A ___________ is self-replicating malware that doesn

Explanation / Answer

1. True...Although encryption ban be broken but it is by far most reliable 2. True 3. True 4. True 5. False... Decryption is the the process of converting cipher text into plain text 6. Whole disk 7. Network based IPS 8. Worm 9. Distributed denial of service 10. Confidentiality 11. Integrity 12. Authentication 13. Disaster Recovery Plan 14. Trojan 15. Jerry's Public Key 16. Jerry's Private Key 17. Cracker 18. IP Spoofing 19. Network Address Translation 20. Computer Hacking