Filters
Question type

Study Flashcards

Network security _____.


A) protects information against dangers created by network connectivity
B) protects network hardware against dangers created by network connectivity
C) protects end users against dangers created by network connectivity
D) None of the above

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

The most popular implementation of asymmetric key encryption is _____.


A) Data Encryption Standard DES)
B) International Data Encryption Algorithm IDEA)
C) Advanced Encryption Standard AES)
D) Rivest,Shamir and Alderman RSA)

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

The most common control used to ensure availability of outgoing information is _____.


A) firewall
B) redundancy
C) encryption
D) de-militarized zone

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

An organization maintains multiple network connections to the Internet.This is an example of _____.


A) encryption
B) patching
C) modulation
D) redundancy

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Availability is defined as _____.


A) guarding against improper modification of information to ensure authenticity
B) maintaining restrictions on information to protect personal privacy
C) encrypting information
D) ensuring timely and reliable use of information

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 25 of 25

Related Exams

Show Answer