quiz3 - Question 1(1 point Question 1 Unsaved What security standard below was created to protect credit card data and transactions requiring network

quiz3 - Question 1(1 point Question 1 Unsaved What security...

  • Daytona State College
  • CET 1600
  • Test Prep
  • mikejonesa0001
  • 13
  • 100% (3) 3 out of 3 people found this document helpful

This preview shows page 1 - 3 out of 13 pages.

Question 1 (1 point) Question 1 Unsaved Question 1 options: Save Question 2 (1 point) Question 2 UnsavedQuestion 2 options: Save Question 3 (1 point) Question 3 Unsaved Question 3 options: Save Question 4 (1 point) Question 4 UnsavedQuestion 4 options: Save Question 5 (1 point) Question 5 UnsavedQuestion 5 options: Save Question 6 (1 point) Question 6 UnsavedQuestion 6 options: Save Question 7 (1 point) Question 7 UnsavedQuestion 7 options:What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls? CALEAHIPAAPCI DSSCAARA The Priority Code Point field in a frame consists of how many bits? A SecurID key chain fob from RSA security generates a password that changes how often? What authentication protocol sends authentication information in cleartext without encryption? What two types of agents are used to check compliance with network security policies? dissolvable agenttemporary agentpersistent agentpermanent agent What component of SIP is a server that responds to user agent clients' requests for session initiation and termination? The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
Image of page 1
Save Question 8 (1 point) Question 8 UnsavedWhen using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream? Question 8 options: Save Question 9 (1 point) Question 9 Unsaved Save Question 10 (1 point) Question 10 Unsaved Question 10 options: Save Question 11 (1 point) Question 11 Unsaved Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs. Question 11 options: 1 0 Save Question 12 (1 point) Question 12 Unsaved Question 12 options:EAPTLS WAP SSL Save Question 13 (1 point) Question 13 Unsaved Question 13 options: FCS FEC encryption assured forwarding prioritized forwarding scaled forwarding expedited forwarding
Image of page 2
Image of page 3

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture