Quiz 7 - 07043 1.

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
1. 07-043   The system and processes used to issue and manage asymmetric keys and digital certificates.    Student  Response Value Correct Answer Feedback A.  Asymmetric  encryption 0%       B.  Certificate authority      C.  Digital signature      D.  Public key  infrastructure       Score: 0/4    2. 07-045   One way to circumvent the counterfeiting of public keys is by using    Score: 4/4    3. 07-054   It was 9:08 A.M. when Jiao Jan, the Network Administrator for Folding Squid Technologies, was  informed that the intrusion detection system had identified an ongoing attempt to breach network  security. By the time that Jiao had identified and blocked the attack, the hacker had accessed and  downloaded several files from the company's server. Using the notation for the time-based model  of security, in this case 
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  Score: 4/4    4. 07-058   Which of the following is commonly true of the default settings for most commercially available  wireless access points?    Score: 0/4    5. 07-015   Which of the following is  not  a requirement of effective passwords?    Score: 0/4 
Background image of page 2
  6. 07-040   These are used to create digital signatures.    Score: 4/4    7. 07-024   This determines which packets are allowed entry and which are dropped.    Score: 4/4    8. 07-020   The device that connects an organization's information system to the Internet is a   
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  Score: 4/4    9. 07-028   This processes involves the firewall examining the data in the body of an IP packet.    Score: 4/4    10. 07-038   Which of the following is  not  associated with asymmetric encryption?    Score: 4/4    11. 07-076   What three factors determine the strength of any encryption system? 
Background image of page 4
Student Response: Sample Correct Answer General Feedback: Score:   12. 07-066   Which of the following is the most effective method of protecting against social engineering attacks  on a computer system?    Score: 4/4    13. 07-064   Information technology managers are often in a bind when a new exploit is discovered in the wild.  They can respond by updating the affected software or hardware with new code provided by the  manufacturer, which runs the risk that a flaw in the update will break the system. Or they can wait  until the new code has been extensively tested, but that runs the risk that they will be compromised  by the exploit during the testing period. Dealing with these issues is referred to as    Score: 4/4 
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
  14. 07-016
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 30

Quiz 7 - 07043 1.

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online