Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

PLEASE HELP WITH THE FOLLOWING QUESTIONS: 1) Using an encrypted tunnel between a

ID: 3659228 • Letter: P

Question

PLEASE HELP WITH THE FOLLOWING QUESTIONS: 1) Using an encrypted tunnel between a computer (or remote network) and a private network is an example of using this type of network. A. Peer-to-peer B. Client/server C. Dial up D. Virtual Private Network (VPN) 2) What is one benefit of a VLAN? A. It allows remote users to connect to a local network via the Internet B. It reduces broadcast traffic on a LAN C. It protects the network against viruses D. It provides encryption services on networks that have no default encryption protocol 3) In this type of load balancing, one domain name is assigned to many servers, using different IP addresses. A. DNS load balancing B. Round robin C. Content switching D. Proxy 4) This term means to scramble, to mix up, to change data in such a way that the wrong people can't read it, but so the right people can unscramble it. A. Authentication B. Authorization C. Encryption D. Nonrepudiation 5) Which of the following is the result of running cleartext through an algorithm using a key? A. Key pair B. Plaintext C. Digital signature D. Ciphertext 6) Which type of algorithm is used when two different keys are used in encryption? A. Symmetric-key B. PKI C. Keyless D. asymmetric-key 7) Adding a digital signature to an encrypted message ensures that you are getting the message from the person you expect it to be from. A. TRUE B. FALSE 8) This type of malware pretends to do one thing while doing something evil? a. rootkit b. macro c. worm d. Trojan 9) This type of program monitors the types of web sites you frequent and uses that information to create targeted advertisements. a. spyware b. virus c. adware d. rootkit 10) What type of attack uses zombie computers to bring a network down under a massive number of requests? a. DDOS b. phishing c. social engineering d. man in the middle 11) This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual addresses of internal network hosts. a. firewall b. NAT c. DHCP d. DMZ 12) Which type of attack involves the attacker inserting himself into a conversation between two others? a. phishing b. man in the middle c. malware d. leeching 13) Which of the following is NOT a technique used to deal with malware? a. anti-virus b. patch management c. training d. wireless encryption 14) Viruses need human action to spread. a. true b. false 15) What is the difference between shared key cryptography (sometimes called symmetric key cryptography) and public key cryptography (sometimes called asymmetric key cryptography)? List one advantage of each. 16) For each situation below using public key cryptography, explain which key will be used. Specify both whose key is used and whether it is the public or private key. a. Alice sends Bob an encrypted message b. Bob reads the encrypted message from Alice c. Bob sends Alice an encrypted message d. Alice reads the encrypted message from Bob e. Alice digitally signs a message to Bob f. Bob verifies Alice

Explanation / Answer

1) D. Virtual Private Network (VPN) 2) B. It reduces broadcast traffic on a LAN 3) A. DNS load balancing 4) C. Encryption 5) D. Ciphertext 6) D. asymmetric-key 7) A. TRUE 8) d. Trojan 9) c. adware 10) a. DDOS 11) d. DMZ 12) b. man in the middle 13) c. training 14) a. true 15) public key cryptography is the most popular form of e-mail encryption and In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication. The shared secret can be a password, a passphrase, a big number or an array of randomly chosen bytes. 16) a. public key b. public key c. public key d. public key e. private key f. private key 17) The most recognized form of three-factor authentication is usually the retina scan 18) lock it down

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote