Chapter 4 Review Questions
1. Which of the following is NOT an activity phase control?
c. resource control
2. Which of the following is NOT a motion detection method?
3. A lock that extends a solid metal bar into the doo
Chapter 2 Review Questions
1. Which of these is not an action that a virus can take?
a. transport itself through the network to another device
2. Which of the following is an attempt to influence a user by coercion?
Chapter 9 Review
1. Bluetooth falls under the category of _.
d. personal area network (PAN)
2. Which of these technologies is NOT found in a wireless broadband router?
a. wireless probe
3. Which of these is NOT a risk when a home wi
Chapter 1 Review Questions
1. Which of the following was used to describe attackers who would break into a computer
system without the owners permission and publicly disclose the vulnerability?
b. black hat hackers
2. Why can broker
Chapter 8 Review
1. Which Fibre Channel zone is the most restrictive?
a. FC hard zone
2. Which type of log can provide details regarding requests for specific files on a system?
b. access log
3. Which type of cloud is offered to all
Chapter 7 Review
1. Which of these would NOT be a filtering mechanism found in a firewall rule?
2. Which function does an Internet content filter NOT perform?
d. intrusion detection
3. How does a virtual LAN (VLAN) allow dev
Chapter 5 Review Questions
1. What is the latest version of the Secure Hash Algorithm?
2. Elliptic Curve Diffie-Hellman (ECDH) is an example of _?
a. in-band key exchange
3. Public key systems that generate random public ke
Chapter 10 Review
1. Each optional feature is found on mobile devices EXCEPT _.
c. operating system
2. Tablet computers are designed for _.
b. ease of use
3. Which of these is not a size of SD cards?
4. Mobile devices usi
Chapter 6 Review
1. _ performs a real-time lookup of a digital certificates status.
b. Online Certificate Status Protocol (OCSP)
2. Which of these is considered the weakest cryptographic transport protocol?
a. SSL v2.0
3. A digital